×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of tsukasa-oi
Stealthy Rootkit : How bad guy fools live memory forensics? - PacSec 2009
1.713 views
Creating Secure VM (Comarison between Intel and AMD, and one more thing...) - AVTokyo 2009
1.112 views
Lack of System Registers and two simple anti-forensic attacks - AVTokyo 2009
650 views
Farewell, Stagefright bugs!
1.079 views