mssun / cuhk-beamer
Beamer template with CUHK colors.
☆12Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for cuhk-beamer
- Morula is a secure replacement of Zygote to fortify weakened ASLR on Android☆15Updated 10 years ago
- Source code for our "What the App is That? Deception and Countermeasures in the Android User Interface" paper☆19Updated 9 years ago
- ☆10Updated 10 years ago
- ☆16Updated 9 years ago
- reproduce the experiment in the report.☆27Updated 9 years ago
- Android markets list including official and third-party from China, Russia, ...☆18Updated 10 years ago
- AntiTaintDroid - Escaping Taint Analysis (and stealing private information) on Android for Fun and Profit☆43Updated 6 years ago
- ☆34Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Updated last year
- Linux group_info refcounter overflow use afer free☆11Updated 10 years ago
- Public forum for detailed planning of a VLDB-like ongoing submission model for IEEE S&P☆15Updated 7 years ago
- An Android port of the general purpose honggfuzz fuzzer☆17Updated 9 years ago
- Android anti-root detection Proof of Concept☆43Updated 9 years ago
- ☆19Updated 9 years ago
- CVE-2014-4321 exploit☆19Updated 9 years ago
- cve-2014-4323 poc☆23Updated 9 years ago
- A general-purpose, easy-to-use fuzzer with interesting analysis options. Supports feedback-driven code coverage modes.☆22Updated 6 years ago
- Exploit Android MSM8974 Chipset☆13Updated 9 years ago
- Small script to unpack the bootloader image format present in Nexus 5 devices☆38Updated 8 years ago
- CVE-2014-4322 Exploit☆22Updated 8 years ago
- K-Hunt: Pinpointing Insecure Crypto Keys☆44Updated 6 years ago
- Running TaintDroid from the command line and analyze output☆17Updated 12 years ago
- Update Readonly Properties☆10Updated 6 years ago
- JNI method enumeration in ELF files☆50Updated 8 years ago
- A collection of useful functions to write an exploit in OCaml☆16Updated 10 years ago
- LG On Screen Phone authentication bypass PoC (CVE-2014-8757)☆15Updated 9 years ago
- Various presentations and related materials☆7Updated 8 years ago