San Antonio / Raleigh / Ottawa / Baltimore / Paris / Nuremberg / Las Vegas / Washington / D.C. / Miami Beach / Canary / San Diego / /
Company
IBM / Tokyo Research Laboratory / ACM Press / IEEE Press / /
Country
Germany / France / United States / Canada / /
Currency
USD / / /
Facility
National Institute of Standards and Technology / Visual Studio / /
IndustryTerm
communications security / similar systems / everyday internet life / software instruction / marker processing vulnerability / /
OperatingSystem
Windows Vista / Mac OS X / Linux / FreeBSD / Microsoft Windows / Leopard / /
Organization
USENIX Association / National Institute of Standards and Technology / Free Software Foundation / Katholieke Universiteit Leuven / Address Space Layout Randomization ASLR / /
Person
Nathanael Paul / Hiroaki Etoh / Jonathan Walpole / Mark Dowd / Tyler Durden / Nora Sovarel / Aaron Grier / Dan Boneh / Angelos D. Keromytis / Wouter Joosen / Dave Maier / Darren Mutz / David Litchfield / Stephanie Forrest / Ben Pfaff / Matthew Page / David Evans / Perry Wagle / Kunikazu Yoda / Crispin Cowan / Steve Beattie / Qian Zhang / Derek Soeder / David H. Ackley / Frederik Valeur / R. Sekar / Eu J. Goh / Sandeep Bhatkar / Elena G. Barrantes / Phrack / Frank Piessens / William Robertson / Gerardo Richarte / Andreas Krennmair / Ryan F. Day / Hovav Shacham / Nagendra Modadugu / Eric Walthinsen / Peat Bakke / Daniel C. Duvarney / Alexander Sotirov / Yoav Weiss / Gaurav S. Kc / Steven Alexander / Darko Stefanovi / Brandon Bray / Dino D. Zovi / Calton Pu / Heather Hinton / Hans Van den Eynden / Christopher Kruegel / Vassilis Prevelakis / John Johansen / Yves Younan / Michael Howard / Tom Krazit / Sven Lachmund Thomas Walter Katholieke / Raoul Strackx Yves Younan Pieter / Jonathan Corbet / /
Position
General / Solar Designer / manager / the indirect pointer / memory manager / /
Product
SQL injection / /
ProgrammingLanguage
R / C / SQL / C++ / /
ProvinceOrState
Texas / Maryland / Nevada / Florida / North Carolina / California / Ontario / /
PublishedMedium
The USENIX Magazine / Lecture Notes in Computer Science / /
Technology
weak encryption / JPEG / Linux / operating systems / mobile devices / encryption / XOR encryption / /