|
|
| | Encoding Bitwise Functions as Polynomials (leviathansecurity.com) | |
1 point by peter_d_sherman on May 7, 2024 | past | 1 comment
|
| | Attackers can decloak routing-based VPNs (leviathansecurity.com) | |
446 points by dsr_ on May 6, 2024 | past | 232 comments
|
| | The Problem with RELRO/ASLR in Statically-Linked Executables or Lack Thereof (leviathansecurity.com) | |
2 points by alyptik on Dec 15, 2018 | past | 1 comment
|
| | Misunderstandings About the Need for RELRO/ASLR in Statically-Linked Executables (leviathansecurity.com) | |
1 point by alyptik on Nov 5, 2018 | past
|
| | ASLR Protection for Statically Linked Executables (leviathansecurity.com) | |
2 points by DiabloD3 on July 5, 2018 | past
|
| | ASLR Protection for Statically Linked Executables (leviathansecurity.com) | |
4 points by paulypluto on June 27, 2018 | past
|
| | Automated Analysis of Firefox/Tor Payload (leviathansecurity.com) | |
5 points by leviaders on Dec 1, 2016 | past
|
| | The Case of the Modified Binaries (leviathansecurity.com) | |
193 points by pcwalton on Oct 24, 2014 | past | 72 comments
|
| | The Case of the Modified Binaries (leviathansecurity.com) | |
2 points by ryanburk on Oct 24, 2014 | past
|
| | What can you do with an Android application with no permissions? (leviathansecurity.com) | |
138 points by AndrewDucker on April 11, 2012 | past | 47 comments
|
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|