Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
from
login
Encoding Bitwise Functions as Polynomials
(
leviathansecurity.com
)
1 point
by
peter_d_sherman
11 months ago
|
past
|
1 comment
Attackers can decloak routing-based VPNs
(
leviathansecurity.com
)
446 points
by
dsr_
11 months ago
|
past
|
232 comments
The Problem with RELRO/ASLR in Statically-Linked Executables or Lack Thereof
(
leviathansecurity.com
)
2 points
by
alyptik
on Dec 15, 2018
|
past
|
1 comment
Misunderstandings About the Need for RELRO/ASLR in Statically-Linked Executables
(
leviathansecurity.com
)
1 point
by
alyptik
on Nov 5, 2018
|
past
ASLR Protection for Statically Linked Executables
(
leviathansecurity.com
)
2 points
by
DiabloD3
on July 5, 2018
|
past
ASLR Protection for Statically Linked Executables
(
leviathansecurity.com
)
4 points
by
paulypluto
on June 27, 2018
|
past
Automated Analysis of Firefox/Tor Payload
(
leviathansecurity.com
)
5 points
by
leviaders
on Dec 1, 2016
|
past
The Case of the Modified Binaries
(
leviathansecurity.com
)
193 points
by
pcwalton
on Oct 24, 2014
|
past
|
72 comments
The Case of the Modified Binaries
(
leviathansecurity.com
)
2 points
by
ryanburk
on Oct 24, 2014
|
past
What can you do with an Android application with no permissions?
(
leviathansecurity.com
)
138 points
by
AndrewDucker
on April 11, 2012
|
past
|
47 comments
Join us for
AI Startup School
this June 16-17 in San Francisco!
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: