summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--README.md68
1 files changed, 66 insertions, 2 deletions
diff --git a/README.md b/README.md
index 185901c..a4c9503 100644
--- a/README.md
+++ b/README.md
@@ -52,6 +52,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
52 52
53### Exploitation 53### Exploitation
54 54
55[2025: "Extending Kernel Race Windows Using '/dev/shm'" by Faith](https://faith2dxy.xyz/2025-11-28/extending_race_window_fallocate/) [article]
56
55[2025: "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System"](https://kylebot.net/papers/ret2entry.pdf) [paper] 57[2025: "System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System"](https://kylebot.net/papers/ret2entry.pdf) [paper]
56 58
57[2025: "Linux Kernel Exploitation for Beginners" by Kevin Massey](https://rvasec.com/slides/2025/Massey_Linux_Kernel_Exploitation_For_Beginners.pdf) [slides] [[video](https://www.youtube.com/watch?v=YfjHCt4SzQc)] 59[2025: "Linux Kernel Exploitation for Beginners" by Kevin Massey](https://rvasec.com/slides/2025/Massey_Linux_Kernel_Exploitation_For_Beginners.pdf) [slides] [[video](https://www.youtube.com/watch?v=YfjHCt4SzQc)]
@@ -415,6 +417,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
415 417
416### Info-leaks 418### Info-leaks
417 419
420[2025: "Vulnerabilities in the /proc Component of the CAN BCM Protocol in the Linux kernel" by Anderson Nascimento](https://allelesecurity.com/wp-content/uploads/2025/12/Presentation_307.pdf) [slides] [CVE-2023-52922] [CVE-2025-38003] [CVE-2025-38004]
421
418[2025: "Use-after-free in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)"](https://allelesecurity.com/use-after-free-vulnerability-in-can-bcm-subsystem-leading-to-information-disclosure-cve-2023-52922/) [article] [CVE-2023-52922] 422[2025: "Use-after-free in CAN BCM subsystem leading to information disclosure (CVE-2023-52922)"](https://allelesecurity.com/use-after-free-vulnerability-in-can-bcm-subsystem-leading-to-information-disclosure-cve-2023-52922/) [article] [CVE-2023-52922]
419 423
420[2025: "KernelSnitch: Side-Channel Attacks on Kernel Data Structures" by Lukas Maar et al.](https://lukasmaar.github.io/papers/ndss25-kernelsnitch.pdf) [paper] [[slides](https://i.blackhat.com/Asia-25/Asia-25-Maar-KernelSnitch.pdf)] 424[2025: "KernelSnitch: Side-Channel Attacks on Kernel Data Structures" by Lukas Maar et al.](https://lukasmaar.github.io/papers/ndss25-kernelsnitch.pdf) [paper] [[slides](https://i.blackhat.com/Asia-25/Asia-25-Maar-KernelSnitch.pdf)]
@@ -474,6 +478,26 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
474 478
475### LPE 479### LPE
476 480
481[2025: "A tale of challenging MTE: Rooting Google Pixel with kernel MTE enabled in one shot" by Yong Wang](https://github.com/ThomasKing2014/slides/blob/master/2025/poc2025.pdf) [slides] [CVE-UNKNOWN]
482
483[2025: "CVE-2025-38352 (Part 1) - In-the-wild Android Kernel Vulnerability Analysis + PoC" by Faith](https://faith2dxy.xyz/2025-12-22/cve_2025_38352_analysis/) [article] [CVE-2025-38352]
484
485[2025: "CVE-2025-38352 (Part 2) - Extending The Race Window Without a Kernel Patch" by Faith](https://faith2dxy.xyz/2025-12-24/cve_2025_38352_analysis_part_2/) [article] [CVE-2025-38352]
486
487[2025: "CVE-2025-38352 (Part 3) - Uncovering Chronomaly" by Faith](https://faith2dxy.xyz/2026-01-03/cve_2025_38352_analysis_part_3/) [article] [exploit](https://github.com/farazsth98/chronomaly) [CVE-2025-38352]
488
489[2025: "Dangling pointers, fragile memory—from an undisclosed vulnerability to Pixel 9 Pro privilege escalation"](https://dawnslab.jd.com/Pixel_9_Pro_EoP/) [article] [CVE-2025-6349] [CVE-2025-8045]
490
491[2025: "Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers" by Xingyu Jin and Martijn Bogaard](https://powerofcommunity.net/2025/slide/x-84592.pdf) [slides] [CVE-2024-44068] [CVE‑2025‑23244] [CVE-2025-8109] [CVE-2024-49739]
492
493[2025: "Déjà Vu in Linux io_uring: Breaking Memory Sharing Again After Generations of Fixes" by Pumpkin Chang](https://u1f383.github.io/slides/talks/2025_Hexacon-Deja_Vu_in_Linux_io_uring_Breaking_Memory_Sharing_Again_After_Generations_of_Fixes.pdf) [slides] [[video](https://www.youtube.com/watch?v=Ry4eOgLCo90)] [CVE-2025-21836]
494
495[2025: "CUDA de Grâce" by Valentina Palmiotti and Samuel Lovejoy](https://docs.google.com/presentation/d/1FgfURpMyHhnflGWtxeq8ClPPaB5ZDCzT/edit?usp=sharing) [slides] [[video](https://www.youtube.com/watch?v=Lvz2_ZHj3lo)] [CVE-UNKNOWN]
496
497[2025: "An RbTree Family Drama: Exploiting a Linux Kernel 0-day Through Red-Black Tree Transformations" by Savino Dicanosa and William Liu](https://storage.googleapis.com/static.cor.team/assets/rbtree_family_drama_hexacon_2025.pdf) [slides] [[video](https://www.youtube.com/watch?v=C-52Gwmce3w)] [CVE-2025-38001]
498
499[2025: "Race Condition Symphony: From Tiny Idea to Pwnie" by Hyunwoo Kim and Wongi Lee](https://powerofcommunity.net/2025/slide/h-3938a.pdf) [slides] [CVE-2024-50264]
500
477[2025: "Exploiting CVE-2025-21479 on a Samsung S23" by XploitBengineer](https://xploitbengineer.github.io/CVE-2025-21479) [article] [CVE-2025-21479] 501[2025: "Exploiting CVE-2025-21479 on a Samsung S23" by XploitBengineer](https://xploitbengineer.github.io/CVE-2025-21479) [article] [CVE-2025-21479]
478 502
479[2025: "LPE via refcount imbalance in the af_unix of Ubuntu's Kernel" by kylebot](https://ssd-disclosure.com/lpe-via-refcount-imbalance-in-the-af_unix-of-ubuntus-kernel/) [article] [CVE-UNKNOWN] 503[2025: "LPE via refcount imbalance in the af_unix of Ubuntu's Kernel" by kylebot](https://ssd-disclosure.com/lpe-via-refcount-imbalance-in-the-af_unix-of-ubuntus-kernel/) [article] [CVE-UNKNOWN]
@@ -520,7 +544,7 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
520 544
521[2025: "Kernel-Hack-Drill: Environment For Developing Linux Kernel Exploits" by Alexander Popov](https://a13xp0p0v.github.io/img/Alexander_Popov-Kernel_Hack_Drill-Zer0Con.pdf) [slides] [CVE-2024-50264] 545[2025: "Kernel-Hack-Drill: Environment For Developing Linux Kernel Exploits" by Alexander Popov](https://a13xp0p0v.github.io/img/Alexander_Popov-Kernel_Hack_Drill-Zer0Con.pdf) [slides] [CVE-2024-50264]
522 546
523[2025: "Linux kernel hfsplus slab-out-of-bounds Write" by Attila Szasz](https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/) [article] [CVE-2025-0927] 547[2025: "Linux kernel hfsplus slab-out-of-bounds Write" by Attila Szasz](https://ssd-disclosure.com/ssd-advisory-linux-kernel-hfsplus-slab-out-of-bounds-write/) [article] [slides](https://drive.google.com/file/d/1Z_0jgLpGmcC3VO-jGxR-vwAAc9F9Ovcu/view) [CVE-2025-0927]
524 548
525[2025: "CVE-2024-53141: an OOB Write Vulnerability in Netfiler Ipset" by Pumpkin Chang](https://u1f383.github.io/linux/2025/01/07/cve-2024-53141-an-oob-write-vulnerability-in-netfilter-ipset.html) [article] [CVE-2024-53141] 549[2025: "CVE-2024-53141: an OOB Write Vulnerability in Netfiler Ipset" by Pumpkin Chang](https://u1f383.github.io/linux/2025/01/07/cve-2024-53141-an-oob-write-vulnerability-in-netfilter-ipset.html) [article] [CVE-2024-53141]
526 550
@@ -656,6 +680,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
656 680
657[2023: "CVE-2023-0386 analysis and exploitation" by chenaotian](https://github.com/chenaotian/CVE-2023-0386) [article] [CVE-2023-0386] 681[2023: "CVE-2023-0386 analysis and exploitation" by chenaotian](https://github.com/chenaotian/CVE-2023-0386) [article] [CVE-2023-0386]
658 682
683[2022: "How we use Dirty Pipe to get reverse root shell on Android Emulator and Pixel 6" by LiN and YingMuo](https://hitcon.org/2022/slides/How%20we%20use%20Dirty%20Pipe%20to%20get%20reverse%20root%20shell%20on%20Android%20Emulator%20and%20Pixel%206.pdf) [slides] [[video](https://www.youtube.com/watch?v=gyku4QyV5eM)] [CVE-2022-0847]
684
659[2022: "Linux kernel io_uring module pbuf_ring vulnerability and privilege escalation 0day"](https://dawnslab.jd.com/linux-5.19-rc2_pbuf_ring_0day/) [article [CVE-UNKNOWN] 685[2022: "Linux kernel io_uring module pbuf_ring vulnerability and privilege escalation 0day"](https://dawnslab.jd.com/linux-5.19-rc2_pbuf_ring_0day/) [article [CVE-UNKNOWN]
660 686
661[2022: "CVE-2022-1015: A validation flaw in Netfilter leading to Local Privilege Escalation" by Yordan Stoychev](https://anatomic.rip/cve-2022-1015/) [article] [CVE-2022-1015] 687[2022: "CVE-2022-1015: A validation flaw in Netfilter leading to Local Privilege Escalation" by Yordan Stoychev](https://anatomic.rip/cve-2022-1015/) [article] [CVE-2022-1015]
@@ -738,6 +764,10 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
738 764
739[2022: "Linux Kernel PWN | 02 CVE-2009-1897"](https://blog.wohin.me/posts/linux-kernel-pwn-02/) [article] [CVE-2009-1897] 765[2022: "Linux Kernel PWN | 02 CVE-2009-1897"](https://blog.wohin.me/posts/linux-kernel-pwn-02/) [article] [CVE-2009-1897]
740 766
767[2021: "Typhoon Mangkhut: One-click Remote Universal Root Formed with Two Vulnerabilities"](https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Typhoon-Mangkhut-One-Click-Remote-Universal-Root-Formed-With-Two-Vulnerabilities.pdf) [slides] [[video](https://www.youtube.com/watch?v=a1vyt6iWmS4)] [CVE-2020-0423]
768
769[2021: "Analysis and Exploitation of CVE-2021-28664 for Android Privilege Escalation" by Bernard Lampe](https://www.bernardlampe.com/pub/Grayshift-CVE-2021-28664.pdf) [slides] [CVE-2021-28664]
770
741[2021: "Your Trash Kernel Bug, My Precious 0-day" by Zhenpeng Lin](https://zplin.me/talks/BHEU21_trash_kernel_bug.pdf) [slides] [CVE-2021-3715] 771[2021: "Your Trash Kernel Bug, My Precious 0-day" by Zhenpeng Lin](https://zplin.me/talks/BHEU21_trash_kernel_bug.pdf) [slides] [CVE-2021-3715]
742 772
743[2021: "[CVE-2021-42008] Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver"](https://syst3mfailure.io/sixpack-slab-out-of-bounds) [article] [CVE-2021-42008] 773[2021: "[CVE-2021-42008] Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver"](https://syst3mfailure.io/sixpack-slab-out-of-bounds) [article] [CVE-2021-42008]
@@ -1070,6 +1100,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
1070 1100
1071### Other 1101### Other
1072 1102
1103[2025: "mediatek? more like media-rekt, amirite." by hypr](https://blog.coffinsec.com/0days/2025/12/15/more-like-mediarekt-amirite.html) [article]
1104
1073[2025: "Dissecting a 1-Day Vulnerability in Linux's XFRM Subsystem" by Shreyas Penkar](https://streypaws.github.io/posts/Dissecting-a-1-Day-Vulnerability-in-Linux-XFRM-Subsystem/) [article] [CVE-2025-39965] [[trigger](https://github.com/Shreyas-Penkar/CVE-2025-39965)] 1105[2025: "Dissecting a 1-Day Vulnerability in Linux's XFRM Subsystem" by Shreyas Penkar](https://streypaws.github.io/posts/Dissecting-a-1-Day-Vulnerability-in-Linux-XFRM-Subsystem/) [article] [CVE-2025-39965] [[trigger](https://github.com/Shreyas-Penkar/CVE-2025-39965)]
1074 1106
1075[2025: "A Quick Note on CVE-2025-38617" by Pumpkin Chang](https://u1f383.github.io/linux/2025/08/27/a-quick-note-on-CVE-2025-38617.html) [article] [CVE-2025-38617] 1107[2025: "A Quick Note on CVE-2025-38617" by Pumpkin Chang](https://u1f383.github.io/linux/2025/08/27/a-quick-note-on-CVE-2025-38617.html) [article] [CVE-2025-38617]
@@ -1229,6 +1261,18 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
1229 1261
1230## Finding Bugs 1262## Finding Bugs
1231 1263
1264[2025: "Build a Fake Phone, Find Real Bugs" by Romain Malmain](https://media.ccc.de/v/39c3-build-a-fake-phone-find-real-bugs-qualcomm-gpu-emulation-and-fuzzing-with-libafl-qemu) [video] [[code](https://github.com/rmalmain/39C3-build-a-fake-phone-find-real-bugs)]
1265
1266[2025: "A Modular Approach To Power Management Fuzzing"](https://lpc.events/event/19/contributions/2087/attachments/1897/4063/PM_USB_LPC_25.pdf) [slides] [[video](https://www.youtube.com/watch?v=TNMcqQsqgr4)]
1267
1268[2025: "KFuzzTest: Targeted Fuzzing of Internal Kernel Functions" by Ethan Graham](https://lpc.events/event/19/contributions/2196/attachments/1929/4123/KFuzzTest%20LPC%2012.12.2025.pdf) [slides] [[video](https://www.youtube.com/watch?v=B7plrw_5w4Q)]
1269
1270[2025: "SYZOS: Practical KVM fuzzing" by Alexander Potapenko](https://lpc.events/event/19/contributions/2217/attachments/1889/4069/SYZOS%20for%20LPC%202025.pdf) [slides] [[video](https://www.youtube.com/watch?v=sY27jwn9bLY)]
1271
1272[2025: "DNAFuzz: Descriptor-Aware Fuzzing for USB Drivers"](http://www.wingtecher.com/themes/WingTecherResearch/assets/papers/DNAFuzz_Camera_Ready.pdf) [paper]
1273
1274[2025: "Slice: SAST + LLM Interprocedural Context Extractor" by Caleb Gross](https://noperator.dev/posts/slice/) [article]
1275
1232[2025: "KNighter: Transforming Static Analysis with LLM-Synthesized Checkers"](https://arxiv.org/pdf/2503.09002) [paper] [[code](https://github.com/ise-uiuc/KNighter)] 1276[2025: "KNighter: Transforming Static Analysis with LLM-Synthesized Checkers"](https://arxiv.org/pdf/2503.09002) [paper] [[code](https://github.com/ise-uiuc/KNighter)]
1233 1277
1234[2025: "SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic Execution"](https://www.cs.ucr.edu/~zhiyunq/pub/ccs25_syzspec.pdf) [paper] 1278[2025: "SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic Execution"](https://www.cs.ucr.edu/~zhiyunq/pub/ccs25_syzspec.pdf) [paper]
@@ -1656,6 +1700,10 @@ See [xairy.io/trainings/](https://xairy.io/trainings/).
1656 1700
1657[2024: "Notes on the 'slab: Introduce dedicated bucket allocator' series" by Julien Voisin](https://dustri.org/b/notes-on-the-slab-introduce-dedicated-bucket-allocator-series.html) [article] 1701[2024: "Notes on the 'slab: Introduce dedicated bucket allocator' series" by Julien Voisin](https://dustri.org/b/notes-on-the-slab-introduce-dedicated-bucket-allocator-series.html) [article]
1658 1702
1703[2023: "Modern LInux Kernel Mitigations" by Ray Veldkamp and Matthew Kurz](https://www.youtube.com/watch?v=kNCtWCcixsU) [video]
1704
1705[2023: "An abridged history of Linux kernel hardening" by Russell Currey](https://www.youtube.com/watch?v=n7oUA2b15P8) [video]
1706
1659[2023: "Exploring Linux's New Random Kmalloc Caches" by sam4k](https://sam4k.com/exploring-linux-random-kmalloc-caches/) [article] 1707[2023: "Exploring Linux's New Random Kmalloc Caches" by sam4k](https://sam4k.com/exploring-linux-random-kmalloc-caches/) [article]
1660 1708
1661[2023: "Toolchain security features status update"](https://outflux.net/slides/2023/lpc/features.pdf) [slides] [[video](https://www.youtube.com/watch?v=OEFFqhP5sts)] 1709[2023: "Toolchain security features status update"](https://outflux.net/slides/2023/lpc/features.pdf) [slides] [[video](https://www.youtube.com/watch?v=OEFFqhP5sts)]
@@ -1963,6 +2011,10 @@ https://github.com/zhuowei/cheese
1963 2011
1964https://github.com/FreeXR/eureka_panther-adreno-gpu-exploit-1 [CVE-2025-21479] 2012https://github.com/FreeXR/eureka_panther-adreno-gpu-exploit-1 [CVE-2025-21479]
1965 2013
2014https://github.com/polygraphene/DirtyPipe-Android [CVE-2022-0847]
2015
2016https://github.com/SpiralBL0CK/CVE-2023-1206-CVE-2025-40040-CVE-2024-49882
2017
1966 2018
1967## Tools 2019## Tools
1968 2020
@@ -2093,6 +2145,8 @@ https://github.com/kzall0c/vock [[demo video](https://www.youtube.com/watch?v=Qv
2093 2145
2094https://github.com/bcoles/rootkit-signal-hunter 2146https://github.com/bcoles/rootkit-signal-hunter
2095 2147
2148https://github.com/mellow-hype/mt7622-qemu-vm
2149
2096 2150
2097## Practice 2151## Practice
2098 2152
@@ -2125,7 +2179,7 @@ WMCTF 2025 (wm_easyker): [writeup](https://blog.xmcve.com/2025/09/22/WMCTF2025-W
2125 2179
2126STAR Labs Summer Pwnables 2025 (paradox_engine): [writeup](https://u1f383.github.io/linux/2025/09/01/starlabs-summer-pwnables-linux-kernel-challenge-writeup.html) 2180STAR Labs Summer Pwnables 2025 (paradox_engine): [writeup](https://u1f383.github.io/linux/2025/09/01/starlabs-summer-pwnables-linux-kernel-challenge-writeup.html)
2127 2181
2128BlackHat MEA 2025 Quals: [writeup](https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326) 2182BlackHat MEA 2025 Quals (Kinc): [writeup1](https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326), [writeup 2](https://blog.bushwhackers.ru/blackhat-mea-ctf-qualification-kinc/)
2129 2183
2130corCTF 2025 (corphone): [writeup](https://u1f383.github.io/android/2025/09/08/corCTF-2025-corphone.html) 2184corCTF 2025 (corphone): [writeup](https://u1f383.github.io/android/2025/09/08/corCTF-2025-corphone.html)
2131 2185
@@ -2135,6 +2189,8 @@ TsukuCTF 2025 (easy_kernel, xcache, new_era): [writeup](https://iwancof.github.i
2135 2189
2136LACTF 2025 (messenger): [writeup](https://terawhiz.github.io/2025/2/oob-write-to-page-uaf-lactf-2025/) 2190LACTF 2025 (messenger): [writeup](https://terawhiz.github.io/2025/2/oob-write-to-page-uaf-lactf-2025/)
2137 2191
2192AVSS 2024 Final: [writeups](https://blog.xmcve.com/2024/10/25/AVSS-2024-Final-Writeup)
2193
2138crewCTF 2024 (kUlele): [writeup](https://n132.github.io/2024/08/14/kUlele.html) 2194crewCTF 2024 (kUlele): [writeup](https://n132.github.io/2024/08/14/kUlele.html)
2139 2195
2140HITCON CTF QUAL 2024 (Halloween): [writeup](https://u1f383.github.io/ctf/2024/07/16/hitcon-ctf-qual-2024-pwn-challenge-part-1-halloween-and-v8sbx.html) 2196HITCON CTF QUAL 2024 (Halloween): [writeup](https://u1f383.github.io/ctf/2024/07/16/hitcon-ctf-qual-2024-pwn-challenge-part-1-halloween-and-v8sbx.html)
@@ -2330,6 +2386,12 @@ https://github.com/0xor0ne/awesome-list/
2330 2386
2331## Misc 2387## Misc
2332 2388
2389[2025: "Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit" by MatheuZSec](https://blog.kyntra.io/Singularity-A-final-boss-linux-kernel-rootkit) [article]
2390
2391[2025: "Exploiting a 13-years old bug on QEMU"](https://kqx.io/post/qemu-nday/) [article]
2392
2393[2025: "LinkPro: eBPF rootkit analysis" by Théo Letailleur](https://www.synacktiv.com/en/publications/linkpro-ebpf-rootkit-analysis) [article]
2394
2333[2025: "The anatomy of a bug: 6 Months at STAR Labs" by Gerrard Tai](https://gerrardtai.com/anatomy-of-a-bug) [article] 2395[2025: "The anatomy of a bug: 6 Months at STAR Labs" by Gerrard Tai](https://gerrardtai.com/anatomy-of-a-bug) [article]
2334 2396
2335[2025: "Qualcomm DSP Kernel Internals" by Shreyas Penkar](https://streypaws.github.io/posts/DSP-Kernel-Internals/) [article] 2397[2025: "Qualcomm DSP Kernel Internals" by Shreyas Penkar](https://streypaws.github.io/posts/DSP-Kernel-Internals/) [article]
@@ -2358,6 +2420,8 @@ https://github.com/0xor0ne/awesome-list/
2358 2420
2359[2025: "Linux KASLR Entropy" by Pumpkin Chang](https://u1f383.github.io/linux/2025/01/02/linux-kaslr-entropy.html) [article] 2421[2025: "Linux KASLR Entropy" by Pumpkin Chang](https://u1f383.github.io/linux/2025/01/02/linux-kaslr-entropy.html) [article]
2360 2422
2423[2024: "Binder Internals"](https://androidoffsec.withgoogle.com/posts/binder-internals/) [article]
2424
2361[2024: "Linternals: Exploring The mm Subsystem via mmap" by Samuel Page](https://sam4k.com/linternals-exploring-the-mm-subsystem-part-1/) [article] [[part 2](https://sam4k.com/linternals-exploring-the-mm-subsystem-part-2/)] 2425[2024: "Linternals: Exploring The mm Subsystem via mmap" by Samuel Page](https://sam4k.com/linternals-exploring-the-mm-subsystem-part-1/) [article] [[part 2](https://sam4k.com/linternals-exploring-the-mm-subsystem-part-2/)]
2362 2426
2363[2024: "Approaches to determining the attack surface for fuzzing the Linux kernel" by Pavel Teplyuk and Aleksey Yakunin](https://www.e3s-conferences.org/articles/e3sconf/pdf/2024/61/e3sconf_uesf2024_03005.pdf) [paper] 2427[2024: "Approaches to determining the attack surface for fuzzing the Linux kernel" by Pavel Teplyuk and Aleksey Yakunin](https://www.e3s-conferences.org/articles/e3sconf/pdf/2024/61/e3sconf_uesf2024_03005.pdf) [paper]