From 823f984a58faa321deb152eb3a17bd086b7b7d3e Mon Sep 17 00:00:00 2001 From: xe3qrh44r Date: Tue, 25 Jun 2024 11:51:51 +0800 Subject: Update README.md Add some articles about page spray--- README.md | 4 ++++ 1 file changed, 4 insertions(+) (limited to 'README.md') diff --git a/README.md b/README.md index b57c7ff..171341d 100644 --- a/README.md +++ b/README.md @@ -52,6 +52,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). ### Exploitation +[2024: "Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation"](https://arxiv.org/pdf/2406.02624) [paper] + [2024: "GhostRace: Exploiting and Mitigating Speculative Race Conditions"](https://www.vusec.net/projects/ghostrace/) [paper] [2024: "K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel"](https://www.ndss-symposium.org/wp-content/uploads/2024-935-paper.pdf) [paper] @@ -94,6 +96,8 @@ See [xairy.io/trainings/](https://xairy.io/trainings/). [2023: "Linux Kernel PWN | 05 ret2dir"](https://blog.wohin.me/posts/linux-kernel-pwn-05/) [article] +[2022: "Ret2page: The Art of Exploiting Use-After-Free Vulnerabilities in the Dedicated Cache"](https://i.blackhat.com/USA-22/Thursday/US-22-WANG-Ret2page-The-Art-of-Exploiting-Use-After-Free-Vulnerabilities-in-the-Dedicated-Cache.pdf) [slides] [[video](https://www.youtube.com/watch?v=HZk2egYDXxg)] + [2022: "Devils Are in the File Descriptors: It Is Time To Catch Them All" by Le Wu](https://i.blackhat.com/USA-22/Wednesday/US-22-Wu-Devils-Are-in-the-File.pdf) [slides] [[video](https://www.youtube.com/watch?v=dIVjQrqpKC0)] [2022: "FUSE for Linux Exploitation 101"](https://exploiter.dev/blog/2022/FUSE-exploit.html) [article] -- cgit v1.3