HN
Paper
All
Show
Ask
Jobs
Top
Today
Last 7 days
Last months
This year
Statistics
All
Show
Ask
Jobs
Top stories
Today
Last 7 days
Last months
This year
Statistics
Stories by
pedro84
Hearing your touch: A new acoustic side channel on smartphones
2 points
pedro84
2019-04-04T02:43:40Z
arxiv.org
The Rule of 2
1 points
pedro84
2019-04-04T01:11:29Z
chromium.googlesource.com
Thunderclap: Modern computers are vulnerable to malicious peripheral devices
2 points
pedro84
2019-02-27T15:59:20Z
thunderclap.io
The Missing Security Primer for Bare Metal Cloud Services
4 points
pedro84
2019-02-26T15:31:03Z
eclypsium.com
Master of Web Puppets: Abusing Web Browsers for Persistence [pdf]
3 points
pedro84
2019-02-25T19:47:23Z
www.ndss-symposium.org
Article 13: “badness” rate
2 points
pedro84
2019-02-17T22:38:45Z
twitter.com
GZ-Sort: A utility for sorting big files
1 points
pedro84
2019-02-15T03:48:02Z
kmkeen.com
A monologue followed by some dialogue on pagination
1 points
pedro84
2019-02-13T15:58:19Z
bubblin.io
CVE-2019-5736: Escape from Docker and Kubernetes Containers to Root on Host
2 points
pedro84
2019-02-13T13:20:31Z
blog.dragonsector.pl
Privilege Escalation in Ubuntu Linux (dirty_sock Exploit)
2 points
pedro84
2019-02-13T13:19:47Z
shenaniganslabs.io
Reverse RDP Attack: Code Execution on RDP Clients
5 points
pedro84
2019-02-05T15:17:40Z
research.checkpoint.com
How do you cut a monolith in half? (2017)
1 points
pedro84
2019-01-28T14:09:17Z
programmingisterrible.com
SCP client multiple vulnerabilities
2 points
pedro84
2019-01-14T15:26:22Z
www.openwall.com
Modlishka. Reverse Proxy. Phishing NG
1 points
pedro84
2019-01-07T00:47:09Z
github.com
AVX512 VBMI – remove spaces from text
152 points
pedro84
2019-01-05T22:40:18Z
0x80.pl
The Docker Bench for Security – Best Practices Script
1 points
pedro84
2019-01-03T14:04:55Z
www.kitploit.com
On building a verifiable log, part 1: core ideas
1 points
pedro84
2018-11-27T23:45:01Z
www.bbva.com
Flip 3 bits at once and your ECC protection has been Rowhammer'd
3 points
pedro84
2018-11-21T16:26:52Z
www.theregister.co.uk
A Systematic Evaluation of Transient Execution Attacks and Defenses
1 points
pedro84
2018-11-19T14:16:08Z
arxiv.org
Researchers Created Fake 'Master' Fingerprints to Unlock Smartphones
6 points
pedro84
2018-11-15T18:00:31Z
motherboard.vice.com
1
2
3
4