×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [push ebp]
Implementing Oblivious Hashing Using Overlapped Instruction Encodings ACM Multimedia and Security 07 Dallas, TX (USA) September 20-21, 2007 Mariusz H
212 views
1 Intro x86 Part 4: Inline Assembly, Read The Fun Manual, Choose Your Own Adventure Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release:
217 views
Intermediate Intel x86: Assembly, Architecture, Applications, and Alliteration Xeno Kovah – 2010 xkovah at gmail
254 views
Introduction to Intel x86 Assembly, Architecture, Applications, & Alliteration Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348
246 views
Intro x86 Part 3: Linux Tools & Analysis Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348. Distribution Unlimited
224 views
1 Intro x86 Part 2: More Examples and Analysis Xeno Kovah – 2009/2010 xkovah at gmail Approved for Public Release: 10-3348. Distribution Unlimited
223 views
1 SQLrand: Preventing SQL Injection Attacks Stephen W. Boyd & Angelos D. Keromytis Columbia University Elia Gaglio 809477 & Mirco Tonin 804425 Seminario
216 views
Python for Scientific Computing
62 views
Advanced topics in X86 assembly by Istvan Haller
233 views
keygening-malwarebytes
19 views
Intro x86 Part 3: Linux Tools & Analysis
49 views
Introduction to Intel x86 Assembly, Architecture, Applications, & Alliteration
89 views
Next >