×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [attack payload]
Dom based xss
430 views
Malware, Viruses, Worms Nick Feamster CS 6262 Spring 2009
220 views
Advanced Buffer Overflow Technique Greg Hoglund. Attack Theory Formalize the Attack Method Re-Use of Attack Code Separate the Deployment from the Payload
220 views
ClubHack Magazine issue April 2012
9.595 views
HTTP Parameter Pollution Vulnerabilities in Web Applications (Black Hat EU 2011)
5.651 views
Shellshock and more: Case studies on DDoS attacks and mitigation strategies in Asia Pacific & Japan (APJ)
1.072 views
apr2012
9 views
Tamper Evident Microprocessors Adam Waksman Simha Sethumadhavan Computer Architecture & Security Technologies Lab (CASTL) Department of Computer Science
224 views
Turning a SCADA Vulnerability into a Successful Attack ICSJWG 2011 Spring Conference Dallas, Texas May 2-5, 2011 SCADAhacker.com Think like a hacker …
215 views
Defenses, Application-Level Attacks, etc. Nick Feamster CS 7260 April 4, 2007
222 views