TE
TechEcho
Home
24h Top
Newest
Best
Ask
Show
Jobs
English
GitHub
Twitter
Back to Profile
Submissions by 2510c39011c5
1
Developer's Browsing History Left in Unitialized Memory of Game Boy DynaMike
2 points
by
2510c39011c5
almost 10 years ago
no comments
2
Verified correctness and security of OpenSSL HMAC [pdf]
2 points
by
2510c39011c5
almost 10 years ago
no comments
3
Analysis of an encrypted HDD [pdf]
26 points
by
2510c39011c5
about 10 years ago
7 comments
4
Surgery’s Far Frontier: Head Transplants
4 points
by
2510c39011c5
about 10 years ago
3 comments
5
ISIS seizes Syria's ancient Palmyra
1 points
by
2510c39011c5
about 10 years ago
no comments
6
Nop Hopping: Hiding Functionality in Alignment
35 points
by
2510c39011c5
about 10 years ago
no comments
7
Google App Engine Java security sandbox bypasse
1 points
by
2510c39011c5
about 10 years ago
no comments
8
Lenovo exposes users to privilege escalation attack risk
7 points
by
2510c39011c5
about 10 years ago
no comments
9
DEFCON 23 to host Internet of Things slaughterfest
4 points
by
2510c39011c5
about 10 years ago
no comments
10
In-Console-Able
1 points
by
2510c39011c5
about 10 years ago
no comments
11
Polynomial-Time Hierarchy Is Infinite Under a Random Oracle
34 points
by
2510c39011c5
about 10 years ago
11 comments
12
Android Backup Agent Arbitrary Code Execution (with timing attack)
2 points
by
2510c39011c5
about 10 years ago
no comments
13
Utilizing LLVM TableGen to Generate SSH Configs
22 points
by
2510c39011c5
about 10 years ago
3 comments
14
Modern Objective-C Exploitation Techniques
1 points
by
2510c39011c5
about 10 years ago
no comments
15
A Tale of Two Exploits
44 points
by
2510c39011c5
about 10 years ago
6 comments
← Previous
Next →