http://yifan.lu
1 day ago
-
Yifan Lu
▲ | last seven years hacking every last bit of the Vita from exploiting the kernel to extracting hardware keys with AES fault injections . In |
http://matt.might.net
1 day ago
-
Matt Might
▲ | pdf ] Matthew Might, Yannis Smaragdakis and David Van Horn. "Resolving and exploiting the k -CFA paradox: Illuminating functional vs . object-oriented program analysis." |
▲ | Might and Yannis Smaragdakis and David Van Horn}, title = {Resolving and exploiting the k-CFA paradox: Illuminating functional vs. object-oriented program analysis.}, |
http://lackingrhoticity.blogspot.de
1 day ago
-
Lacking Rhoticity
▲ | while. We've finally published our findings on the Project Zero blog: Exploiting the DRAM rowhammer bug to gain kernel privileges . Posted by Mark |
http://nwb.sh
1 day ago
-
nwb.sh
▲ | swapfile 2023-03-08 — Hello World Boot Sector 2023-03-08 — Exploiting LCD refresh with Arduino ↑ Back to Top All of this site's |
http://blog.cryptographyengineering.com
1 day ago
-
A Few Thoughts on Cryptographic Engineering – Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds.
▲ | the Darmstadt folks. It’s now 2024, and Chinese authorities are exploiting it. So clearly it was not an easy fix. Some of |
▲ | Will Apple even fix this, given that Chinese authorities are now exploiting it? And here we find the hundred billion dollar question: if |
▲ | ID (or phone number) is not guessable. The big question in exploiting this vulnerability is whether it’s possible to assemble a complete |
▲ | rainbow table, so that’s a good indicator that they’re exploiting this vulnerability. Well that sucks. What can we, or rather Apple, |
▲ | approaches to collecting and/or generating those lists. As an aside, exploiting these dictionaries can be done in three different ways: You can |
http://raesene.github.io
1 day ago
-
Raesene's Ramblings
▲ | the default admin.conf credential created by Kubeadm. October 29th, 2023 Exploiting CVE-2023-5044 Recently several new CVEs in the ingress nginx |
http://tech.gotinder.com
2 days ago
-
Tinder Tech Blog - Medium
▲ | Tinder Author: Tasha Ramesh, Staff Software Engineer Tinder Aug 15, 2022 Exploiting GitHub Actions on open source projects Exploiting GitHub Actions on open |
http://blog.erlend.sh
1 day ago
-
Open Indie
▲ | failing to pay off their VC debts even after years of exploiting the free labor and data of their users. Discord, carrying on |
http://yousefamar.com
2 days ago
-
Yousef Amar
▲ | to raise £1.5M in EPSRC funding. Multimodal 3D reconstruction Paper Exploiting complementarity between different depth-sensing modalities for incremental dense scene reconstruction. |
http://lucasfcosta.com
1 day ago
-
Lucas F. Costa
▲ | at London, United Kingdom 🇬🇧 5th of August, 2022 How and why exploiting uncertainty makes products more profitable Lucas Fernandes da Costa at London, |