diff options
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 13 |
1 files changed, 13 insertions, 0 deletions
| @@ -363,6 +363,8 @@ Pull requests are welcome. | |||
| 363 | 363 | ||
| 364 | ## Defensive | 364 | ## Defensive |
| 365 | 365 | ||
| 366 | [2019: "Kernel Self-Protection Project" by Kees Cook](https://outflux.net/slides/2019/lss/kspp.pdf) [slides] | ||
| 367 | |||
| 366 | [2019: "Touch but don’t look - Running the Kernel in Execute-only memory" by Rick Edgecombe](https://linuxplumbersconf.org/event/4/contributions/283/attachments/357/588/Touch_but_dont_look__Running_the_kernel_in_execute_only_memory-presented.pdf) [slides] | 368 | [2019: "Touch but don’t look - Running the Kernel in Execute-only memory" by Rick Edgecombe](https://linuxplumbersconf.org/event/4/contributions/283/attachments/357/588/Touch_but_dont_look__Running_the_kernel_in_execute_only_memory-presented.pdf) [slides] |
| 367 | 369 | ||
| 368 | [2019: "Breaking and Protecting Linux Kernel Stack" by Elena Reshetova](https://www.youtube.com/watch?v=FacpjoQbMhU) [video] | 370 | [2019: "Breaking and Protecting Linux Kernel Stack" by Elena Reshetova](https://www.youtube.com/watch?v=FacpjoQbMhU) [video] |
| @@ -371,6 +373,8 @@ Pull requests are welcome. | |||
| 371 | 373 | ||
| 372 | [2019: "Mitigation for the Kernel Space Mirroring Attack (内核镜像攻击的缓解措施)"](http://c0reteam.org/2019/01/02/ksma) [article] | 374 | [2019: "Mitigation for the Kernel Space Mirroring Attack (内核镜像攻击的缓解措施)"](http://c0reteam.org/2019/01/02/ksma) [article] |
| 373 | 375 | ||
| 376 | [2018: "The State of Kernel Self Protection" by Kees Cook](https://outflux.net/slides/2018/lss/kspp.pdf) [slides] | ||
| 377 | |||
| 374 | [2018: "Android Kernel Control Flow Integrity Analysis (分析)"](http://c0reteam.org/2018/09/17/kcfi) [article] | 378 | [2018: "Android Kernel Control Flow Integrity Analysis (分析)"](http://c0reteam.org/2018/09/17/kcfi) [article] |
| 375 | 379 | ||
| 376 | [2018: "Overview and Recent Developments: Kernel Self-Protection Project" by Kees Cook](https://outflux.net/slides/2018/lss-eu/kspp.pdf) [slides] | 380 | [2018: "Overview and Recent Developments: Kernel Self-Protection Project" by Kees Cook](https://outflux.net/slides/2018/lss-eu/kspp.pdf) [slides] |
| @@ -430,6 +434,9 @@ Pull requests are welcome. | |||
| 430 | 434 | ||
| 431 | ## Vulnerability discovery | 435 | ## Vulnerability discovery |
| 432 | 436 | ||
| 437 | [2019: "A gentle introduction to Linux Kernel fuzzing" by | ||
| 438 | Marek Majkowski](https://blog.cloudflare.com/a-gentle-introduction-to-linux-kernel-fuzzing/) [article] | ||
| 439 | |||
| 433 | [2019: "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing"](https://www.usenix.org/system/files/woot19-paper_maier.pdf) [paper] | 440 | [2019: "Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing"](https://www.usenix.org/system/files/woot19-paper_maier.pdf) [paper] |
| 434 | 441 | ||
| 435 | [2019: "Case study: Searching for a vulnerability pattern in the Linux kernel" by Alexander Popov](https://a13xp0p0v.github.io/2019/08/10/cfu.html) [article] | 442 | [2019: "Case study: Searching for a vulnerability pattern in the Linux kernel" by Alexander Popov](https://a13xp0p0v.github.io/2019/08/10/cfu.html) [article] |
| @@ -525,6 +532,8 @@ https://github.com/ucsb-seclab/difuze | |||
| 525 | 532 | ||
| 526 | https://github.com/compsec-snu/razzer | 533 | https://github.com/compsec-snu/razzer |
| 527 | 534 | ||
| 535 | https://github.com/fgsect/unicorefuzz | ||
| 536 | |||
| 528 | 537 | ||
| 529 | ## Exploits | 538 | ## Exploits |
| 530 | 539 | ||
| @@ -588,6 +597,8 @@ https://github.com/bcoles/kernel-exploits | |||
| 588 | 597 | ||
| 589 | https://github.com/jollheef/lpe | 598 | https://github.com/jollheef/lpe |
| 590 | 599 | ||
| 600 | https://github.com/tangsilian/android-vuln | ||
| 601 | |||
| 591 | 602 | ||
| 592 | ## Practice | 603 | ## Practice |
| 593 | 604 | ||
| @@ -633,6 +644,8 @@ SECT CTF 2018 (Gh0st): [writeup](http://mslc.ctf.su/wp/sect-ctf-2018-gh0st/) | |||
| 633 | 644 | ||
| 634 | WCTF 2018 (cpf): [source, writeup, and exploit](https://github.com/cykorteam/cykor_belluminar_2018/tree/master/cpf) | 645 | WCTF 2018 (cpf): [source, writeup, and exploit](https://github.com/cykorteam/cykor_belluminar_2018/tree/master/cpf) |
| 635 | 646 | ||
| 647 | hxp CTF 2018 (Green Computing): [writeup](http://s3.eurecom.fr/nops/2018-12-10-hxp-ctf-2018-green-computing.html) | ||
| 648 | |||
| 636 | Insomni'hack teaser 2019 (1118daysober): [writeup 1](https://ctftime.org/writeup/12919), [writeup 2](https://github.com/EmpireCTF/empirectf/blob/master/writeups/2019-01-19-Insomni-Hack-Teaser/README.md#1118daysober) | 649 | Insomni'hack teaser 2019 (1118daysober): [writeup 1](https://ctftime.org/writeup/12919), [writeup 2](https://github.com/EmpireCTF/empirectf/blob/master/writeups/2019-01-19-Insomni-Hack-Teaser/README.md#1118daysober) |
| 637 | 650 | ||
| 638 | Security Fest 2019 (brainfuck64): [writeup](https://kileak.github.io/ctf/2019/secfest-brainfuck64/) | 651 | Security Fest 2019 (brainfuck64): [writeup](https://kileak.github.io/ctf/2019/secfest-brainfuck64/) |
