|
|
| | Encoding Bitwise Functions as Polynomials (leviathansecurity.com) | | 1 point by peter_d_sherman on May 7, 2024 | past | 1 comment | |
| | Attackers can decloak routing-based VPNs (leviathansecurity.com) | | 446 points by dsr_ on May 6, 2024 | past | 232 comments | |
| | The Problem with RELRO/ASLR in Statically-Linked Executables or Lack Thereof (leviathansecurity.com) | | 2 points by alyptik on Dec 15, 2018 | past | 1 comment | |
| | Misunderstandings About the Need for RELRO/ASLR in Statically-Linked Executables (leviathansecurity.com) | | 1 point by alyptik on Nov 5, 2018 | past | |
| | ASLR Protection for Statically Linked Executables (leviathansecurity.com) | | 2 points by DiabloD3 on July 5, 2018 | past | |
| | ASLR Protection for Statically Linked Executables (leviathansecurity.com) | | 4 points by paulypluto on June 27, 2018 | past | |
| | Automated Analysis of Firefox/Tor Payload (leviathansecurity.com) | | 5 points by leviaders on Dec 1, 2016 | past | |
| | The Case of the Modified Binaries (leviathansecurity.com) | | 193 points by pcwalton on Oct 24, 2014 | past | 72 comments | |
| | The Case of the Modified Binaries (leviathansecurity.com) | | 2 points by ryanburk on Oct 24, 2014 | past | |
| | What can you do with an Android application with no permissions? (leviathansecurity.com) | | 138 points by AndrewDucker on April 11, 2012 | past | 47 comments | |
|

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|