![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
17th USENIX Security Symposium 2008: San Jose, California, USA - WOOT
- Dan Boneh, Tal Garfinkel, Dug Song:
2nd USENIX Workshop on Offensive Technologies, WOOT'08, San Jose, CA, USA, July 28, 2008, Proceedings. USENIX Association 2008 - Mark Daniel, Jake Honoroff, Charlie Miller:
Engineering Heap Overflow Exploits with JavaScript. - Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen, Kimmo Halunen, Rauli Puuperä, Juha Röning:
Experiences with Model Inference Assisted Fuzzing. - Will Drewry, Tavis Ormandy:
Insecure Context Switching: Inoculating Regular Expressions for Survivability. - Marco Cova, Christopher Kruegel, Giovanni Vigna:
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. - Elizabeth Stinson, John C. Mitchell:
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. - Aaron Portnoy, Ali Rizvi-Santiago:
Reverse Engineering Python Applications. - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta:
Exploitable Redirects on the Web: Identification, Prevalence, and Defense. - Matt Miller:
Modeling the Trust Boundaries Created by Securable Objects.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.