Tags
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
See more
Presentations
(5)Likes
(9)HKG15-211: Advanced Toolchain Usage Part 4
Linaro
•
9 years ago
How to Root 10 Million Phones with One Exploit
Jiahong Fang
•
8 years ago
CODE BLUE 2014 : Joy of a bug hunter by Masato Kinugawa
CODE BLUE
•
8 years ago
Symbolic Execution And KLEE
Shauvik Roy Choudhary, Ph.D.
•
14 years ago
Optimizing for developer happiness
Chad Dickerson
•
12 years ago
Model-Driven Development of Semantic Mashup Applications with the Open-Source InfoGrid Internet Graph Database
InfoGrid.org
•
14 years ago
HBase and Hadoop at Adobe
Cosmin Lehene
•
13 years ago
Trees In The Database - Advanced data structures
Lorenzo Alberton
•
14 years ago
Tags
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
See more