summaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorAndrey Konovalov2018-06-27 16:56:02 +0200
committerGitHub2018-06-27 16:56:02 +0200
commit74f4b347d7d48d1e7e4a417c1d92486285f6b6c8 (patch)
tree196f8287336a24822d250be6c8ac1c7826f69195 /README.md
parent4f95fc05c46da55af1af99f01ef452adb36f20ca (diff)
Update README.md
Diffstat (limited to '')
-rw-r--r--README.md20
1 files changed, 17 insertions, 3 deletions
diff --git a/README.md b/README.md
index 55440d0..65ad359 100644
--- a/README.md
+++ b/README.md
@@ -318,6 +318,8 @@ Pull requests are welcome.
318 318
319[2018, Linux Conf AU: "The State of Kernel Self Protection" by Kees Cook](https://outflux.net/slides/2018/lca/kspp.pdf) [slides] 319[2018, Linux Conf AU: "The State of Kernel Self Protection" by Kees Cook](https://outflux.net/slides/2018/lca/kspp.pdf) [slides]
320 320
321[2017, HitB: "Shadow-Box: The Practical and Omnipotent Sandbox" by Seunghun Han](http://conference.hitb.org/hitbsecconf2017ams/materials/D1T2%20-%20Seunghun%20Han%20-%20Shadow-Box%20-%20The%20Practical%20and%20Omnipotent%20Sandbox.pdf) [slides]
322
321[2017: "Towards Linux Kernel Memory Safety"](https://arxiv.org/pdf/1710.06175.pdf) [whitepaper] 323[2017: "Towards Linux Kernel Memory Safety"](https://arxiv.org/pdf/1710.06175.pdf) [whitepaper]
322 324
323[2017: "Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel"](https://events.linuxfoundation.org/sites/events/files/slides/nakamura_20170831_1.pdf) [slides] 325[2017: "Proposal of a Method to Prevent Privilege Escalation Attacks for Linux Kernel"](https://events.linuxfoundation.org/sites/events/files/slides/nakamura_20170831_1.pdf) [slides]
@@ -338,6 +340,8 @@ Pull requests are welcome.
338 340
339[2016: "Randomizing the Linux kernel heap freelists" by Thomas Garnier](https://medium.com/@mxatone/randomizing-the-linux-kernel-heap-freelists-b899bb99c767#.3csq8t23s) [article] 341[2016: "Randomizing the Linux kernel heap freelists" by Thomas Garnier](https://medium.com/@mxatone/randomizing-the-linux-kernel-heap-freelists-b899bb99c767#.3csq8t23s) [article]
340 342
343[2015: "RAP: RIP ROP"](https://pax.grsecurity.net/docs/PaXTeam-H2HC15-RAP-RIP-ROP.pdf) [slides]
344
341[2015: "Protecting Commodity Operating Systems through Strong Kernel Isolation" by Vasileios Kemerlis](http://www.cs.columbia.edu/~angelos/Papers/theses/vpk_thesis.pdf) [whitepaper] 345[2015: "Protecting Commodity Operating Systems through Strong Kernel Isolation" by Vasileios Kemerlis](http://www.cs.columbia.edu/~angelos/Papers/theses/vpk_thesis.pdf) [whitepaper]
342 346
343[2014: "Kernel Self-Protection through Quantified Attack Surface Reduction" by Anil Kurmus](https://publikationsserver.tu-braunschweig.de/servlets/MCRFileNodeServlet/digibib_derivate_00036154/Diss_Kurmus_Anil.pdf) [whitepaper] 347[2014: "Kernel Self-Protection through Quantified Attack Surface Reduction" by Anil Kurmus](https://publikationsserver.tu-braunschweig.de/servlets/MCRFileNodeServlet/digibib_derivate_00036154/Diss_Kurmus_Anil.pdf) [whitepaper]
@@ -351,7 +355,9 @@ Pull requests are welcome.
351[2009, Phrack: "Linux Kernel Heap Tampering Detection" by Larry Highsmith](http://phrack.org/archives/issues/66/15.txt) [article] 355[2009, Phrack: "Linux Kernel Heap Tampering Detection" by Larry Highsmith](http://phrack.org/archives/issues/66/15.txt) [article]
352 356
353 357
354## Fuzzing & detectors 358## Vulnerability discovery
359
360[2018: "Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking" by Mateusz Jurczyk](https://j00ru.vexillium.org/papers/2018/bochspwn_reloaded.pdf) [whitepaper]
355 361
356[2018, BlackHat: "New Compat Vulnerabilities In Linux Device Drivers"](https://www.blackhat.com/docs/asia-18/asia-18-Ding-New-Compat-Vulnerabilities-In-Linux-Device-Drivers.pdf) [slides] 362[2018, BlackHat: "New Compat Vulnerabilities In Linux Device Drivers"](https://www.blackhat.com/docs/asia-18/asia-18-Ding-New-Compat-Vulnerabilities-In-Linux-Device-Drivers.pdf) [slides]
357 363
@@ -391,6 +397,8 @@ Pull requests are welcome.
391 397
392[2010: "Automatic Bug-finding Techniques for Linux Kernel" by Jiri Slaby](https://www.fi.muni.cz/~xslaby/sklad/teze.pdf) [whitepaper] 398[2010: "Automatic Bug-finding Techniques for Linux Kernel" by Jiri Slaby](https://www.fi.muni.cz/~xslaby/sklad/teze.pdf) [whitepaper]
393 399
400[2009, DEF CON 11: "Opensource Kernel Auditing and Exploitation" by Silvio Cesare](https://www.youtube.com/watch?v=sNh2TD6Tf9Q&feature=youtu.be) [video]
401
394 402
395## Fuzzers 403## Fuzzers
396 404
@@ -451,6 +459,8 @@ https://github.com/jiayy/android_vuln_poc-exp
451 459
452https://github.com/brl/grlh 460https://github.com/brl/grlh
453 461
462https://github.com/externalist/exploit_playground
463
454 464
455## Practice 465## Practice
456 466
@@ -501,6 +511,10 @@ http://www.openwall.com/lkrg/
501 511
502https://github.com/IAIK/meltdown 512https://github.com/IAIK/meltdown
503 513
514https://github.com/nforest/droidimg
515
516https://github.com/a13xp0p0v/kconfig-hardened-check
517
504 518
505### Misc 519### Misc
506 520
@@ -508,8 +522,6 @@ https://github.com/Fuzion24/AndroidKernelExploitationPlayground
508 522
509https://github.com/ReverseLab/kernel-pwn-challenge 523https://github.com/ReverseLab/kernel-pwn-challenge
510 524
511https://github.com/NoviceLive/research-rootkit
512
513https://github.com/djrbliss/libplayground 525https://github.com/djrbliss/libplayground
514 526
515[pwnable.kr tasks](http://pwnable.kr/play.php) (syscall, rootkit, softmmu, towelroot, kcrc, exynos) 527[pwnable.kr tasks](http://pwnable.kr/play.php) (syscall, rootkit, softmmu, towelroot, kcrc, exynos)
@@ -531,3 +543,5 @@ https://github.com/kmcallister/alameda
531https://github.com/01org/jit-spray-poc-for-ksp 543https://github.com/01org/jit-spray-poc-for-ksp
532 544
533https://forums.grsecurity.net/viewforum.php?f=7 545https://forums.grsecurity.net/viewforum.php?f=7
546
547https://grsecurity.net/research.php