|
|
| | The Shape of Software Security (cyber-itl.org) | |
1 point by juliend2 on May 15, 2020 | past | 1 comment
|
| | Evolution of Android Binary Hardening (cyber-itl.org) | |
1 point by bauc on Dec 16, 2019 | past
|
| | Binary Hardening in IoT Products (cyber-itl.org) | |
1 point by gsreenivas on Oct 15, 2019 | past
|
| | Binary Hardening in IoT Products (cyber-itl.org) | |
2 points by sp332 on Aug 26, 2019 | past
|
| | Fortify Source: A Deeper Dive into Function Hardening on Linux and OS X (cyber-itl.org) | |
4 points by ievans on Aug 20, 2019 | past
|
| | A look at home routers, and a surprising bug in Linux/MIPS (cyber-itl.org) | |
140 points by walterbell on Dec 15, 2018 | past | 79 comments
|
| | Build Safety of Software in 28 Popular Home Routers (Dec 2018) [pdf] (cyber-itl.org) | |
3 points by walterbell on Dec 15, 2018 | past
|
| | A look at home routers, and a surprising bug in Linux/MIPS (cyber-itl.org) | |
4 points by walterbell on Dec 15, 2018 | past | 2 comments
|
| | Software Application Risks on the OS X Continuum (2016) (cyber-itl.org) | |
1 point by walterbell on March 23, 2018 | past
|
| | How risky is the software you use? (shmooncon18 slides) [pdf] (cyber-itl.org) | |
1 point by 68c12c16 on Jan 21, 2018 | past
|
| | Fortify Source: A Deeper Dive into Function Hardening on Linux and OS X (cyber-itl.org) | |
1 point by _qc3o on Dec 11, 2016 | past
|
|
![](s.gif)
Join us for AI Startup School this June 16-17 in San Francisco!
Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|