Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2010.Thesis (Master's) -- Bilkent University, 2010.Includes bibliographical references leaves 49-53.Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of software systems and networks. A recent exploitation technique, called Return-Oriented Programming (ROP), has lately attracted a considerable attention from academia. ROP attacks utilize short code sequences each ending with a free-branch instruction, i.e. an instruction that allows the attacker to contr...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
In this thesis, we propose a novel secure key agreement protocol that uses biometrics with unordered...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Cryptographic algorithms are widely used in daily life in order to ensure data confidentiality and p...
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science o...
RÉSUMÉ: La programmation orientée retour (ROP) est une technique par laquelle un attaquant peut intr...
Despite the numerous prevention and protection mechanisms that have been introduced into modern oper...
If vulnerabilities in software allow to alter the behaviour of a program, traditional virus scanners...
Cache-based side-channel attacks are increasingly exposing the weaknesses of many cryptographic libr...
Architectural enhancements are a set of modifications in a general-purpose processor to improve the ...
Today there are many techniques that allows to exploit vulnerabilities of an application; there are ...
L'isolation des processus est la contrainte de sécurité la plus importante imposée par les systèmes ...
Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona...
Submitted by Geyciane Santos (geyciane_thamires@hotmail.com) on 2015-06-17T15:20:30Z No. of bitstre...
Reverse engineering is fundamental for understanding the inner workings of new malware, exploring ne...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
In this thesis, we propose a novel secure key agreement protocol that uses biometrics with unordered...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
Cryptographic algorithms are widely used in daily life in order to ensure data confidentiality and p...
Ankara : The Department of Computer Engineering and the Graduate School of Engineering and Science o...
RÉSUMÉ: La programmation orientée retour (ROP) est une technique par laquelle un attaquant peut intr...
Despite the numerous prevention and protection mechanisms that have been introduced into modern oper...
If vulnerabilities in software allow to alter the behaviour of a program, traditional virus scanners...
Cache-based side-channel attacks are increasingly exposing the weaknesses of many cryptographic libr...
Architectural enhancements are a set of modifications in a general-purpose processor to improve the ...
Today there are many techniques that allows to exploit vulnerabilities of an application; there are ...
L'isolation des processus est la contrainte de sécurité la plus importante imposée par les systèmes ...
Treballs Finals de Grau d'Enginyeria Informàtica, Facultat de Matemàtiques, Universitat de Barcelona...
Submitted by Geyciane Santos (geyciane_thamires@hotmail.com) on 2015-06-17T15:20:30Z No. of bitstre...
Reverse engineering is fundamental for understanding the inner workings of new malware, exploring ne...
Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2010Includes bibliograp...
In this thesis, we propose a novel secure key agreement protocol that uses biometrics with unordered...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...