Downloads

Name Date Author Size DL's Rating Get
Virtual Machine RE-Building 28 Dec 2006 : 14:26 Maximus 282.34kB 2013
0/5 : Not rated
Using Memory Errors to Attack a Virtual Machine 02 Mar 2008 : 01:26 Sudhakar Govindavajhala & Andrew W. Appel 534.08kB 814
0/5 : Not rated
Thwarting Virtual Machine Detection 06 Apr 2014 : 05:14 Tom Liston 493.38kB 512
0/5 : Not rated
The Cluster Computing Virtualization in Windows 20 Apr 2007 : 10:57 Ashkbiz Danehkar 101.30kB 763
0/5 : Not rated
Stealthy Deployment and Execution of In-Guest Kernel Agents 30 Jul 2009 : 10:50 Tzi-cker Chiueh + Matthew Conover + Maohua Lu + Bruce Montague 147.97kB 475
0/5 : Not rated
Statically Analyzing HyperUnpackMe2 25 Apr 2007 : 13:10 Rolf Rolles 0B 1189
0/5 : Not rated
Software Attacks Against Intel(R) VT-d Technology 19 May 2011 : 14:07 Rafal Wojtczuk, Joanna Rutkowska 465.63kB 441
0/5 : Not rated
RISC Machine Documentation 12 Mar 2012 : 07:02 Deathway 360.67kB 1034
0/5 : Not rated
Ring-0 Crackme 12 Oct 2006 : 13:57 Dereko 987.20kB 1615
0/5 : Not rated
Reversing a Simple Virtual Machine 02 Sep 2006 : 16:46 Maximus 237.01kB 3585
0/5 : Not rated
Lightweight Approach to Hypervisor Control-Flow Integrity 04 Jun 2010 : 15:20 Zhi Wang + Xuxian Jiang 192.00kB 406
0/5 : Not rated
Introduction to Modern Code Virtualization 05 Feb 2014 : 13:27 Nooby 1.26MB 1276
0/5 : Not rated
Introducing Software Virtualization Solution 23 Sep 2007 : 01:28 Altiris 678.49kB 968
0/5 : Not rated
Inside Code Virtualizer 1.0.1.0 17 Feb 2007 : 12:34 Scherzo 574.66kB 2390
0/5 : Not rated
Hardware Architecture for Implementing Protection Rings 02 Sep 2006 : 16:41 Michael D.Schroeder 3.57MB 1696
0/5 : Not rated
Fine Grain Cross-VM Attacks on Xen and VMware 17 Sep 2014 : 02:46 Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar 717.97kB 349
0/5 : Not rated
Detecting the Presence of Virtual Machines Using the Local Data Table 13 Feb 2008 : 08:12 Danny Quist & Val Smith 288.86kB 940
0/5 : Not rated
Dealing with Virtualization 06 Sep 2008 : 10:31 Boris Lau 1.40MB 1251
0/5 : Not rated
Cross-VM Side Channels and Their Use to Extract Private Keys 28 Oct 2012 : 08:22 Yinqian Zhang, Michael K. Reiter, Ari Juels, Thomas Ristenpart 992.00kB 515
0/5 : Not rated
Creating Code Obfuscation Virtual Machines 24 Feb 2010 : 14:25 Craig Smith 157.82MB 3367
0/5 : Not rated
Cloudburst 30 Jul 2009 : 11:51 Immunity Inc 239.97MB 1043
0/5 : Not rated
Attacks on More Virtual Machine Emulators 01 Sep 2007 : 00:31 Peter Ferrie 1.30MB 1243
0/5 : Not rated
An Improved VM-Based Software Protection 22 Jul 2012 : 07:42 Huaijun Wang, Dingyi Fang, Zhanyong Tang, Xin Song 319.64kB 1067
0/5 : Not rated
An Efficient Virtual Machine Based Software Protection 04 Dec 2011 : 12:21 Amir Averbuch, Michael Kiperberg, Nezer Jacob Zaidenberg 141.51kB 637
0/5 : Not rated
A No-Frills Introduction to Lua 5.1 VM Instructions 03 Nov 2013 : 09:44 Kein-Hong Man 200.23kB 422
0/5 : Not rated
A Glance at Virtual Machine Monitor 20 Apr 2007 : 11:00 Ashkbiz Danehkar 24.46kB 973
0/5 : Not rated
A Comparison of Software and Hardware Techniques for x86 Virtualization 28 Aug 2010 : 17:03 Keith Adams + Ole Agesen 129.96kB 782
0/5 : Not rated
Return to Category List 31766 download(s) from 27 files