Skip to main content
  • Home
  • About
  • Collaborate
  • Analyze
  • Discover

Search form

Home
  • Log in
  • Register

Repository

Bibliography

  • ‘Trojan Source’ Bug Threatens the Security of All Code (Krebs on Security)
  • 'Nothing's Going to Last Forever': An Oral History of the LØpht (Part Four- Fisher paper)
  • Thirty Minutes Or Less: An Oral History of the LØpht, Part Three
  • ‘Microsoft Was Freaking Out‘: An Oral History of the LØpht -Part Two - Fisher Paper)
  • ‘We Got to Be Cool About This‘: An Oral History of the L0pht (Part One - Fisher paper)
  • 'Drive It Like You Stole It': When Bug Bounties Went Boom (Part Three - Fisher paper)
  • Uprising in the Valley: When Bug Bounties Went Boom (Part Two - Fisher paper)
  • Lawyers, Bugs, and Money: When Bug Bounties Went Boom (Part One - Fisher paper)
  • Windows of Vulnerability: A Case Study Analysis (IEEE paper)
  • VeriSign iDefense offers US$48,000 for Vista, Internet Explorer 7 vulnerabilities (Chickowski paper)
  • Quarterly Vulnerability Challenge (iDefense Labs)
  • Motives of Code Red Bug Hunters Questioned (PC World paper)

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • next ›
  • last »
Need help with PECE?
Join the PECE Slack channel