1![Full version of an extended abstract published in Proceedings of ACM CCS 2007, ACM Press, The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham∗ hovav@cs. Full version of an extended abstract published in Proceedings of ACM CCS 2007, ACM Press, The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham∗ hovav@cs.](https://www.pdfsearch.io/img/ce38b81413370d8025bc47fce3e6cc78.jpg) | Add to Reading ListSource URL: hovav.netLanguage: English - Date: 2018-06-10 15:29:33
|
---|
2![Intro x86 Part 2: More Examples and Analysis Xeno Kovah – xkovah at gmail 1 Intro x86 Part 2: More Examples and Analysis Xeno Kovah – xkovah at gmail 1](https://www.pdfsearch.io/img/7d25e6e82edfffb7825cb17531cadd67.jpg) | Add to Reading ListSource URL: opensecuritytraining.infoLanguage: English - Date: 2015-12-12 15:49:39
|
---|
3![](/pdf-icon.png) | Add to Reading ListSource URL: www.connectsystems.com- Date: 2018-08-08 14:44:43
|
---|
4![Will appear in the 2009 IEEE Symposium on Security and Privacy Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Will appear in the 2009 IEEE Symposium on Security and Privacy Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki](https://www.pdfsearch.io/img/a5ea84748e932038268f5e822ed3da4d.jpg) | Add to Reading ListSource URL: css.csail.mit.eduLanguage: English - Date: 2016-01-29 11:49:40
|
---|
5![Muen An x86/64 Separation Kernel for High Assurance Reto Buerki Adrian-Ken Rueegsegger Muen An x86/64 Separation Kernel for High Assurance Reto Buerki Adrian-Ken Rueegsegger](https://www.pdfsearch.io/img/6a7074aae6a7ad54a1f00a140b32742f.jpg) | Add to Reading ListSource URL: www.ada-switzerland.chLanguage: English - Date: 2017-10-08 15:04:38
|
---|
6![Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl](https://www.pdfsearch.io/img/4e5f0eafca4ed7c7b3730d53a4fc4b67.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-06-09 13:30:54
|
---|
7![State of the Port to x86_64 April 2017 April 3 , 2017
Update Topics State of the Port to x86_64 April 2017 April 3 , 2017
Update Topics](https://www.pdfsearch.io/img/5f825a1531ac358b0bbd5709ea520609.jpg) | Add to Reading ListSource URL: www.vmssoftware.comLanguage: English - Date: 2018-01-16 05:58:14
|
---|
8![State of the Port to x86 March 2016 March 11, 2016
State of the Port to x86 State of the Port to x86 March 2016 March 11, 2016
State of the Port to x86](https://www.pdfsearch.io/img/c6a55410933a10c14cb8fe402d971904.jpg) | Add to Reading ListSource URL: www.vmssoftware.comLanguage: English - Date: 2018-01-16 06:12:04
|
---|
9![Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa](https://www.pdfsearch.io/img/f620b413060f3c4996df3f8b046ad776.jpg) | Add to Reading ListSource URL: users.elis.ugent.beLanguage: English - Date: 2009-07-23 13:04:51
|
---|