Downloads

Name Date Author Size DL's Rating Get
Virtual Machine RE-Building 28 Dec 2006 : 14:26 Maximus 282.34kB 1992
0/5 : Not rated
Using Memory Errors to Attack a Virtual Machine 02 Mar 2008 : 01:26 Sudhakar Govindavajhala & Andrew W. Appel 534.08kB 801
0/5 : Not rated
Thwarting Virtual Machine Detection 06 Apr 2014 : 05:14 Tom Liston 493.38kB 499
0/5 : Not rated
The Cluster Computing Virtualization in Windows 20 Apr 2007 : 10:57 Ashkbiz Danehkar 101.30kB 750
0/5 : Not rated
Stealthy Deployment and Execution of In-Guest Kernel Agents 30 Jul 2009 : 10:50 Tzi-cker Chiueh + Matthew Conover + Maohua Lu + Bruce Montague 147.97kB 467
0/5 : Not rated
Statically Analyzing HyperUnpackMe2 25 Apr 2007 : 13:10 Rolf Rolles 0B 1171
0/5 : Not rated
Software Attacks Against Intel(R) VT-d Technology 19 May 2011 : 14:07 Rafal Wojtczuk, Joanna Rutkowska 465.63kB 435
0/5 : Not rated
RISC Machine Documentation 12 Mar 2012 : 07:02 Deathway 360.67kB 1020
0/5 : Not rated
Ring-0 Crackme 12 Oct 2006 : 13:57 Dereko 987.20kB 1605
0/5 : Not rated
Reversing a Simple Virtual Machine 02 Sep 2006 : 16:46 Maximus 237.01kB 3553
0/5 : Not rated
Lightweight Approach to Hypervisor Control-Flow Integrity 04 Jun 2010 : 15:20 Zhi Wang + Xuxian Jiang 192.00kB 398
0/5 : Not rated
Introduction to Modern Code Virtualization 05 Feb 2014 : 13:27 Nooby 1.26MB 1259
0/5 : Not rated
Introducing Software Virtualization Solution 23 Sep 2007 : 01:28 Altiris 678.49kB 956
0/5 : Not rated
Inside Code Virtualizer 1.0.1.0 17 Feb 2007 : 12:34 Scherzo 574.66kB 2355
0/5 : Not rated
Hardware Architecture for Implementing Protection Rings 02 Sep 2006 : 16:41 Michael D.Schroeder 3.57MB 1685
0/5 : Not rated
Fine Grain Cross-VM Attacks on Xen and VMware 17 Sep 2014 : 02:46 Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar 717.97kB 344
0/5 : Not rated
Detecting the Presence of Virtual Machines Using the Local Data Table 13 Feb 2008 : 08:12 Danny Quist & Val Smith 288.86kB 924
0/5 : Not rated
Dealing with Virtualization 06 Sep 2008 : 10:31 Boris Lau 1.40MB 1239
0/5 : Not rated
Cross-VM Side Channels and Their Use to Extract Private Keys 28 Oct 2012 : 08:22 Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart 992.00kB 505
0/5 : Not rated
Creating Code Obfuscation Virtual Machines 24 Feb 2010 : 14:25 Craig Smith 157.82MB 3342
0/5 : Not rated
Cloudburst 30 Jul 2009 : 11:51 Immunity Inc 239.97MB 1029
0/5 : Not rated
Attacks on More Virtual Machine Emulators 01 Sep 2007 : 00:31 Peter Ferrie 1.30MB 1235
0/5 : Not rated
An Improved VM-Based Software Protection 22 Jul 2012 : 07:42 Huaijun Wang, Dingyi Fang, Zhanyong Tang, Xin Song 319.64kB 1048
0/5 : Not rated
An Efficient Virtual Machine Based Software Protection 04 Dec 2011 : 12:21 Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg 141.51kB 622
0/5 : Not rated
A No-Frills Introduction to Lua 5.1 VM Instructions 03 Nov 2013 : 09:44 Kein-Hong Man 200.23kB 409
0/5 : Not rated
A Glance at Virtual Machine Monitor 20 Apr 2007 : 11:00 Ashkbiz Danehkar 24.46kB 961
0/5 : Not rated
A Comparison of Software and Hardware Techniques for x86 Virtualization 28 Aug 2010 : 17:03 Keith Adams + Ole Agesen 129.96kB 770
0/5 : Not rated
Return to Category List 31374 download(s) from 27 files