Implementing Oblivious Hashing Using Overlapped Instruction Encodings ACM Multimedia and Security 07 Dallas, TX (USA) September 20-21, 2007 Mariusz H.
1 Intro x86 Part 4: Inline Assembly, Read The Fun Manual, Choose Your Own Adventure Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release:
Intermediate Intel x86: Assembly, Architecture, Applications, and Alliteration Xeno Kovah – 2010 xkovah at gmail.
Introduction to Intel x86 Assembly, Architecture, Applications, & Alliteration Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348.
Intro x86 Part 3: Linux Tools & Analysis Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348. Distribution Unlimited.
1 Intro x86 Part 2: More Examples and Analysis Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348. Distribution Unlimited.
1 SQLrand: Preventing SQL Injection Attacks Stephen W. Boyd & Angelos D. Keromytis Columbia University Elia Gaglio 809477 & Mirco Tonin 804425 Seminario.
Python for Scientific Computing
Advanced topics in X86 assembly by Istvan Haller.
keygening-malwarebytes
Intro x86 Part 3: Linux Tools & Analysis
Introduction to Intel x86 Assembly, Architecture, Applications, & Alliteration