«
Expand/Collapse
442 items tagged "runtime"
Related tags:
java [+],
vulnerability [+],
microsoft [+],
vulnerable [+],
ships [+],
microsoft visual c [+],
implementation [+],
hyperion [+],
executables [+],
encrypter [+],
dlls [+],
crypter [+],
client [+],
random key [+],
proof of concept [+],
net [+],
msvc [+],
libraries [+],
encryption [+],
concept implementation [+],
code execution [+],
environment [+],
java runtime environment [+],
oracle java [+],
oracle [+],
remote [+],
cve [+],
yves alexis [+],
wincc [+],
vulnerabilities [+],
sun java runtime environment [+],
sun java runtime [+],
sun [+],
simatic [+],
siemens simatic [+],
siemens [+],
security java [+],
runtime libraries [+],
reconfigurable processors [+],
processor cores [+],
processor [+],
private location [+],
ogg directshow filters [+],
microsoft live meeting [+],
integrity verification [+],
integrity [+],
hardware hacking [+],
firmware [+],
dominik meyer tags [+],
chaos communication camp [+],
alexis [+],
Hardware [+],
zdi,
web application,
usa,
tom brosch,
source code,
slides,
service privilege,
service,
sap netweaver,
sap,
safer use,
runtime optimization,
problem,
privilege escalation vulnerability,
php,
patching,
packers,
os x,
optimized c,
optimization,
ntlm authentication,
netweaver,
net runtime optimization service,
multiple,
misc,
mccoy,
maik morgenstern,
mac os x,
mac os,
lua,
lead,
kernel,
jon mccoy,
java runtime,
java developer kit,
integer overflow vulnerability,
integer overflow,
input validation,
inefficiency,
hp ux,
hidden,
hacks,
hacking,
greg hoglund,
freeciv,
facebook,
exploit,
escalation,
decompilation,
command execution,
cmm,
buffer overflow vulnerability,
brosch,
bloat,
black hat,
authors,
audio,
arduino,
application asp
-
-
16:00
»
SecuriTeam
Siemens SIMATIC WinCC Flexible (Runtime) suffers from multiple vulnerabilities.
-
-
18:39
»
Packet Storm Security Recent Files
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
-
18:39
»
Packet Storm Security Misc. Files
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
-
-
16:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
17:00
»
SecuriTeam
Oracle Java SE is prone to a remote vulnerability in Java Runtime Environment.
-
-
14:11
»
Packet Storm Security Recent Files
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
-
14:11
»
Packet Storm Security Tools
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
-
14:11
»
Packet Storm Security Misc. Files
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
-
-
21:32
»
SecDocs
Authors:
Dominik Meyer Tags:
hardware hacking Event:
Chaos Communication Camp 2011 Abstract: The talk will give the audience an introduction to the world of runtime reconfigurable processors. The current state of the art in processor performance improvements are multicore-processor systems. These systems offer a number of homogeneous and static processor cores for the parallel distribution of computational tasks. Another approach are reconfigurable processors or reconfigurable multicore processor systems, which can adapt to program needs on the fly during runtime. This is done through swapping different kinds of functional units in and out or by giving the processor freely available space for hardware configuration. After years of just being a research field such systems can be seen in the wild. For example the HC1 architecture from Convey or the combination of an Intel Atom processor with an Altera FPGA. The talk will introduce the audience to the field of reconfigurable processors. It will classify the different kinds of such processors and describe some architectures briefly. At the end general security issues are explained.