×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
michael-scovetta documents
Technology
Modern Kernel Pool Exploitation: Attacks and Techniques
Technology
Systematic Detection of Capability Leaks in Stock Android Smartphones
Technology
Android Attacks
Technology
Consumer Password Worst Practices
Technology
The Listening: Email Client Backdoor
Technology
Strategic Surprise
Technology
Exploitation and State Machines
Entertainment & Humor
Don't Give Credit: Hacking Arcade Machines
Technology
Smooth CoffeeScript
Technology
HTML5 Web Security
Technology
If You Don't Like the Game, Hack the Playbook... (Zatko)
Technology
High Assurance Systems (Fisher)
Technology
PROCEED and Crowd-Sourced Formal Verification
Technology
Beyond Passwords (Guidorizzi)
Technology
Anomaly Detection at Multiple Scales (Waltzman)
Technology
DARPA: Cyber Analytical Framework (Kaufman)
Technology
The Ceylon Type System
Technology
Attacking the WebKit Heap
Technology
Stackjacking
Technology
Windows Services Hacking
Technology
DEFCON 18- These Aren't the Permissions You're Looking For
Next >