Downloads

Name Date Author Size DL's Rating Get
Virtual Machine RE-Building 28 Dec 2006 : 14:26 Maximus 282.34kB 2044
0/5 : Not rated
Using Memory Errors to Attack a Virtual Machine 02 Mar 2008 : 01:26 Sudhakar Govindavajhala & Andrew W. Appel 534.08kB 833
0/5 : Not rated
Thwarting Virtual Machine Detection 06 Apr 2014 : 05:14 Tom Liston 493.38kB 531
0/5 : Not rated
The Cluster Computing Virtualization in Windows 20 Apr 2007 : 10:57 Ashkbiz Danehkar 101.30kB 779
0/5 : Not rated
Stealthy Deployment and Execution of In-Guest Kernel Agents 30 Jul 2009 : 10:50 Tzi-cker Chiueh + Matthew Conover + Maohua Lu + Bruce Montague 147.97kB 493
0/5 : Not rated
Statically Analyzing HyperUnpackMe2 25 Apr 2007 : 13:10 Rolf Rolles 0B 1208
0/5 : Not rated
Software Attacks Against Intel(R) VT-d Technology 19 May 2011 : 14:07 Rafal Wojtczuk, Joanna Rutkowska 465.63kB 461
0/5 : Not rated
RISC Machine Documentation 12 Mar 2012 : 07:02 Deathway 360.67kB 1062
0/5 : Not rated
Ring-0 Crackme 12 Oct 2006 : 13:57 Dereko 987.20kB 1635
0/5 : Not rated
Reversing a Simple Virtual Machine 02 Sep 2006 : 16:46 Maximus 237.01kB 3623
0/5 : Not rated
Lightweight Approach to Hypervisor Control-Flow Integrity 04 Jun 2010 : 15:20 Zhi Wang + Xuxian Jiang 192.00kB 431
0/5 : Not rated
Introduction to Modern Code Virtualization 05 Feb 2014 : 13:27 Nooby 1.26MB 1311
0/5 : Not rated
Introducing Software Virtualization Solution 23 Sep 2007 : 01:28 Altiris 678.49kB 998
0/5 : Not rated
Inside Code Virtualizer 1.0.1.0 17 Feb 2007 : 12:34 Scherzo 574.66kB 2434
0/5 : Not rated
Hardware Architecture for Implementing Protection Rings 02 Sep 2006 : 16:41 Michael D.Schroeder 3.57MB 1715
0/5 : Not rated
Fine Grain Cross-VM Attacks on Xen and VMware 17 Sep 2014 : 02:46 Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar 717.97kB 366
0/5 : Not rated
Detecting the Presence of Virtual Machines Using the Local Data Table 13 Feb 2008 : 08:12 Danny Quist & Val Smith 288.86kB 960
0/5 : Not rated
Dealing with Virtualization 06 Sep 2008 : 10:31 Boris Lau 1.40MB 1287
0/5 : Not rated
Cross-VM Side Channels and Their Use to Extract Private Keys 28 Oct 2012 : 08:22 Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart 992.00kB 535
0/5 : Not rated
Creating Code Obfuscation Virtual Machines 24 Feb 2010 : 14:25 Craig Smith 157.82MB 3428
0/5 : Not rated
Cloudburst 30 Jul 2009 : 11:51 Immunity Inc 239.97MB 1094
0/5 : Not rated
Attacks on More Virtual Machine Emulators 01 Sep 2007 : 00:31 Peter Ferrie 1.30MB 1262
0/5 : Not rated
An Improved VM-Based Software Protection 22 Jul 2012 : 07:42 Huaijun Wang, Dingyi Fang, Zhanyong Tang, Xin Song 319.64kB 1088
0/5 : Not rated
An Efficient Virtual Machine Based Software Protection 04 Dec 2011 : 12:21 Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg 141.51kB 655
0/5 : Not rated
A No-Frills Introduction to Lua 5.1 VM Instructions 03 Nov 2013 : 09:44 Kein-Hong Man 200.23kB 440
0/5 : Not rated
A Glance at Virtual Machine Monitor 20 Apr 2007 : 11:00 Ashkbiz Danehkar 24.46kB 996
0/5 : Not rated
A Comparison of Software and Hardware Techniques for x86 Virtualization 28 Aug 2010 : 17:03 Keith Adams + Ole Agesen 129.96kB 807
0/5 : Not rated
Return to Category List 32476 download(s) from 27 files