Methodology for Static Reverse Engineering of Windows Kernel Drivers Reverse Engineering |
- Methodology for Static Reverse Engineering of Windows Kernel Drivers
- Bug in New Function ExAllocatePoolZero Results in Security Vulnerability and Crashes
- Reverse engineering 3D Movie Maker - using Ghidra scripting to recover the C++ class hierarchy
- anyone can help me in this ?!
- Fuzzing popular Rust library in 5 min using cargo-fuzz / libfuzzer
- On the practical security of white-box cryptography [PDF, Ph.D. thesis]
Methodology for Static Reverse Engineering of Windows Kernel Drivers Posted: 06 Oct 2020 08:57 AM PDT |
Bug in New Function ExAllocatePoolZero Results in Security Vulnerability and Crashes Posted: 06 Oct 2020 09:05 AM PDT |
Reverse engineering 3D Movie Maker - using Ghidra scripting to recover the C++ class hierarchy Posted: 05 Oct 2020 04:02 PM PDT |
Posted: 06 Oct 2020 02:20 PM PDT |
Fuzzing popular Rust library in 5 min using cargo-fuzz / libfuzzer Posted: 06 Oct 2020 05:50 AM PDT |
On the practical security of white-box cryptography [PDF, Ph.D. thesis] Posted: 05 Oct 2020 11:04 PM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment