Hacker News new | past | comments | ask | show | jobs | submit | from login
Encoding Bitwise Functions as Polynomials (leviathansecurity.com)
1 point by peter_d_sherman 11 months ago | past | 1 comment
Attackers can decloak routing-based VPNs (leviathansecurity.com)
446 points by dsr_ 11 months ago | past | 232 comments
The Problem with RELRO/ASLR in Statically-Linked Executables or Lack Thereof (leviathansecurity.com)
2 points by alyptik on Dec 15, 2018 | past | 1 comment
Misunderstandings About the Need for RELRO/ASLR in Statically-Linked Executables (leviathansecurity.com)
1 point by alyptik on Nov 5, 2018 | past
ASLR Protection for Statically Linked Executables (leviathansecurity.com)
2 points by DiabloD3 on July 5, 2018 | past
ASLR Protection for Statically Linked Executables (leviathansecurity.com)
4 points by paulypluto on June 27, 2018 | past
Automated Analysis of Firefox/Tor Payload (leviathansecurity.com)
5 points by leviaders on Dec 1, 2016 | past
The Case of the Modified Binaries (leviathansecurity.com)
193 points by pcwalton on Oct 24, 2014 | past | 72 comments
The Case of the Modified Binaries (leviathansecurity.com)
2 points by ryanburk on Oct 24, 2014 | past
What can you do with an Android application with no permissions? (leviathansecurity.com)
138 points by AndrewDucker on April 11, 2012 | past | 47 comments

Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: