DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Foreshadow
Foreshadow
2020 Sonicwall Cyber Threat Report
Internet Security Threat Report Volume 24 | February 2019
Systematization of Vulnerability Discovery Knowledge: Review
Viewed Through the Prism of Clausewitzian Strategy
2019 Sonicwall Cyber Threat Report
Indicative Guidelines for Chemical Safety and Security in Small and Medium-Sized Enterprises to Foster the Peaceful Uses of Chemistry
Morpheus Adaptive Defenses for Tomorrow’S Secure Systems
Controlling Cyberwarfare International Laws of Armed Conflict and Human Rights in the Cyber Realm
Digital Dependence: Cybersecurity in the 21St Century
Toward Data-Driven Discovery of Software Vulnerabilities
Transversal Technical Cybersecurity Challenges Report
Sonicwall Cyber Threat Report
Security Now! #677 - 08-21-18 the Foreshadow Flaw
Old Wine in New Bottles: the Nature of Conflict in the 21St Century
Security Now! #741 - 11-19-19 TPM-FAIL
Heuristic Futures: Reading the Digital Humanities Through Science Fiction
Security Now! #714 - 05-14-19 Android 'Q'
Reviving Foreshadow (Extended Version)
Top View
St Luke's- 192.168.9.0 Vulnerability Scanner
Control-Flow Security
Estimating Software Vulnerability Counts in the Context of Cyber Risk
Anti-War and the Cyber Triangle Strategic Implications of Cyber Operations and Cyber Security for the State
Cyber Lawyers Bootcamp Offensive Cyber Activities Reading Materials
A Curriculum Guide for Reading Mentors TABLE of CONTENTS
Criminal Charges As a Response to Nation-State Malicious Cyber Activity
Cross-Privilege-Boundary Data Sampling
New Models for Understanding and Reasoning About Speculative Execution Attacks
On the Spectre and Meltdown Processor Security Vulnerabilities
Uncanny Warfare: Law of War on the Cutting-Edge Table of Contents a Letter from the United Nations Society Executive 3 Letter from Your Chairs
Understanding the Evolution of Android App Vulnerabilities
Webroot Threat Report
Meltdown and Spectre
Cybersecurity Report 2020
On the Spectre and Meltdown Processor Security Vulnerabilities
Universiv International
DATA INSECURITY: How One of the Worst Computer Defects Ever Sacrificed Security for Speed
Memory, Interpellation, and Assemblage: Multivalent Subjectivity
Unpacking Cyberterrorism Discourse
Cyber Threat Landscape
Arxiv:2007.07428V1 [Cs.CR] 15 Jul 2020
Updated Guidance for Vulnerabilities Affecting Modern Processors
Extracting the Keys to the Intel SGX Kingdom with Transient Out-Of-Order Execution
Leaky Processors
2020 Webroot Threat Report US FINAL.Pdf
Italian Information Security Association 2013 Report
2019 Cyber Threatscape Report I Accenture
Italian Information Security Association 2012 Report
Leaky Processors
Part 4 Slides: Transient Execution Attacks and Mitigations
Cyber War Methods and Practice 07 Jul 2019
The Dawn of Kinetic Cyber
Arxiv:1907.03407V5 [Cs.SE] 31 Mar 2021 Akinori Ihara Wakayama University, Japan E-Mail:
[email protected]
2 Bodin Chinthanet Et Al
Cyber-Enabled Economic Warfare: an Evolving Challenge
Verfassungsschutzbericht 2019
Security Threat Landscape
FORESHADOW: Extracting the Keys to the Intel SGX Kingdom
Speculative Dereferencing of Registers: Reviving Foreshadow
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow
2020 Global Threat Report Crowdstrike Global Threat Report 2020 2
SGX-SSD: a Policy-Based Versioning SSD with Intel SGX
Sonicwall Capture Labs Threat Network
New Models for Understanding and Reasoning About Speculative Execution Attacks
2019 Sonicwall Cyber Threat Report
Introduction to Cyber-Warfare: a Multidisciplinary Approach