diff options
| author | Andrey Konovalov | 2018-07-10 22:09:27 +0200 |
|---|---|---|
| committer | GitHub | 2018-07-10 22:09:27 +0200 |
| commit | c04ca75ea33b0807f6b26ae543d387a21494dff2 (patch) | |
| tree | c3b41f8e3800d2955e1cf4805cbcd886267866dd | |
| parent | cd044963704ef2aebe1cac7465c6a8886fe409e1 (diff) | |
Update README.md
| -rw-r--r-- | README.md | 2 |
1 files changed, 1 insertions, 1 deletions
| @@ -54,7 +54,7 @@ Pull requests are welcome. | |||
| 54 | 54 | ||
| 55 | [2015: "Kernel Data Attack is a Realistic Security Threat"](https://www.eecis.udel.edu/~hnw/paper/kerneldata.pdf) [whitepaper] | 55 | [2015: "Kernel Data Attack is a Realistic Security Threat"](https://www.eecis.udel.edu/~hnw/paper/kerneldata.pdf) [whitepaper] |
| 56 | 56 | ||
| 57 | [2015: "From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel"](https://loccs.sjtu.edu.cn/~romangol/download/papers/gossip_ccs2015.pdf) [whitepaper] | 57 | [2015: "From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel"](http://repository.root-me.org/Exploitation%20-%20Syst%C3%A8me/Unix/EN%20-%20From%20collision%20to%20exploitation%3A%20Unleashing%20Use-After-Free%20vulnerabilities%20in%20Linux%20Kernel.pdf) [whitepaper] |
| 58 | 58 | ||
| 59 | [2015: "Linux Kernel Exploitation" by Patrick Biernat](http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/23/13_lecture.pdf) [slides] | 59 | [2015: "Linux Kernel Exploitation" by Patrick Biernat](http://security.cs.rpi.edu/courses/binexp-spring2015/lectures/23/13_lecture.pdf) [slides] |
| 60 | 60 | ||
