mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-21 09:13:07 +08:00
Updated document structure, reformatted multiple chapters, updated chapter and section intros. Separated hardening features into two. Other changes suggested at the meeting,
This commit is contained in:
@@ -1154,9 +1154,385 @@
|
||||
\verb https://facebookmicrosites.github.io/bpf/blog/2020/02/19/bpf-portability-and-co-re.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{ubuntu_caps}{manual}{}
|
||||
\entry{mem_page_arch}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=47635127541392c1419dbc4a4d3153c6}{%
|
||||
family={Lameter},
|
||||
familyi={L\bibinitperiod},
|
||||
given={Christopher},
|
||||
giveni={C\bibinitperiod}}}%
|
||||
}
|
||||
\list{institution}{1}{%
|
||||
{Jump Trading LLC}%
|
||||
}
|
||||
\list{organization}{1}{%
|
||||
{The Linux Foundation Open Source Summit}%
|
||||
}
|
||||
\strng{namehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{fullhash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{bibnamehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{authorbibnamehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{authornamehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{authorfullhash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{1}
|
||||
\field{month}{12}
|
||||
\field{title}{Memory Management 101: Introduction to Memory Management in Linux}
|
||||
\field{year}{2017}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{page_faults}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=28efc25c8eae7f3d05fad64c4679158f}{%
|
||||
family={Breaker},
|
||||
familyi={B\bibinitperiod},
|
||||
given={Doug},
|
||||
giveni={D\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{fullhash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{bibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{authorbibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{authornamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{authorfullhash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{19}
|
||||
\field{month}{8}
|
||||
\field{title}{Understanding page faults and memory swap-in/outs}
|
||||
\field{year}{2019}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{mem_arch_proc}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=c6b49e9e6fbe96fdd89720e842dc0b03}{%
|
||||
family={Bajo},
|
||||
familyi={B\bibinitperiod},
|
||||
given={Marcos\bibnamedelima Sánchez},
|
||||
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{fullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{bibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{authorbibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{authornamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{authorfullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{23}
|
||||
\field{month}{5}
|
||||
\field{title}{Stack-based Buffer Overflow - Part 1}
|
||||
\field{year}{2021}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{8664_params_abi_p18}{manual}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=871f02558cb7234c22cde24811cf53a7}{%
|
||||
family={al.},
|
||||
familyi={a\bibinitperiod},
|
||||
given={H.J.\bibnamedelimi Lu},
|
||||
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
|
||||
prefix={et},
|
||||
prefixi={e\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\field{extraname}{1}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{28}
|
||||
\field{month}{1}
|
||||
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
|
||||
\field{year}{2018}
|
||||
\field{dateera}{ce}
|
||||
\field{pages}{18}
|
||||
\range{pages}{1}
|
||||
\verb{urlraw}
|
||||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{rop_prog_finder}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{ROPgadget Tool}
|
||||
\verb{urlraw}
|
||||
\verb https://github.com/JonathanSalwan/ROPgadget
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://github.com/JonathanSalwan/ROPgadget
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{network_layers}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=ed79ecb3ff4a83522b186b5e3fa37b0d}{%
|
||||
family={Alienor},
|
||||
familyi={A\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{fullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{bibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{authorbibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{authornamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{authorfullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{28}
|
||||
\field{month}{11}
|
||||
\field{title}{The Network Layers Explained [with examples]}
|
||||
\field{year}{2018}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.plixer.com/blog/network-layers-explained/
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.plixer.com/blog/network-layers-explained/
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{tcp_reliable}{online}{}
|
||||
\list{organization}{1}{%
|
||||
{IBM}%
|
||||
}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{19}
|
||||
\field{month}{4}
|
||||
\field{title}{Transmission Control Protocol}
|
||||
\field{year}{2022}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{tcp_handshake}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{Three-Way Handshake}
|
||||
\verb{urlraw}
|
||||
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{elf}{manual}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{ELF}
|
||||
\verb{urlraw}
|
||||
\verb https://wiki.osdev.org/ELF
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://wiki.osdev.org/ELF
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{plt_got_overlord}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=9724da855997a02e74ee77d11b4d64e2}{%
|
||||
family={Tomaschik},
|
||||
familyi={T\bibinitperiod},
|
||||
given={David},
|
||||
giveni={D\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{fullhash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{bibnamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{authorbibnamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{authornamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{authorfullhash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{19}
|
||||
\field{month}{3}
|
||||
\field{title}{GOT and PLT for pwning.}
|
||||
\field{year}{2017}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{plt_got_technovelty}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=4e4902d108d0796e7e54d06a47cfe1ee}{%
|
||||
family={Wienand},
|
||||
familyi={W\bibinitperiod},
|
||||
given={Ian},
|
||||
giveni={I\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{fullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{bibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{authorbibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{authornamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{authorfullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{11}
|
||||
\field{month}{5}
|
||||
\field{title}{PLT and GOT - the key to code sharing and dynamic libraries}
|
||||
\field{year}{2011}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{aslr_pie_intro}{online}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{aslr/pie intro}
|
||||
\verb{urlraw}
|
||||
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{relro_redhat}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=b77619d1671f5a819a9a13e8e0f51723}{%
|
||||
family={Sidhpurwala},
|
||||
familyi={S\bibinitperiod},
|
||||
given={Huzaifa},
|
||||
giveni={H\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||||
\strng{fullhash}{b77619d1671f5a819a9a13e8e0f51723}
|
||||
\strng{bibnamehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||||
\strng{authorbibnamehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||||
\strng{authornamehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||||
\strng{authorfullhash}{b77619d1671f5a819a9a13e8e0f51723}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{28}
|
||||
\field{month}{1}
|
||||
\field{title}{Hardening ELF binaries using Relocation Read-Only (RELRO)}
|
||||
\field{year}{2019}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{cet_windows}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=3de76fe0797950a06f4be8a7bf380d22}{%
|
||||
family={Yarden\bibnamedelima Shafir},
|
||||
familyi={Y\bibinitperiod\bibinitdelim S\bibinitperiod},
|
||||
given={Alex\bibnamedelima Ionescu},
|
||||
giveni={A\bibinitperiod\bibinitdelim I\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||||
\strng{fullhash}{3de76fe0797950a06f4be8a7bf380d22}
|
||||
\strng{bibnamehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||||
\strng{authorbibnamehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||||
\strng{authornamehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||||
\strng{authorfullhash}{3de76fe0797950a06f4be8a7bf380d22}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{1}
|
||||
\field{month}{5}
|
||||
\field{title}{R.I.P ROP: CET Internals in Windows 20H1}
|
||||
\field{year}{2020}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://windows-internals.com/cet-on-windows/
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://windows-internals.com/cet-on-windows/
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{cet_linux}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=b51b9464b5589cf5380e3b897d0a43b6}{%
|
||||
family={Larabel},
|
||||
familyi={L\bibinitperiod},
|
||||
given={Michael},
|
||||
giveni={M\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||||
\strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||||
\strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||||
\strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||||
\strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||||
\strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{21}
|
||||
\field{month}{7}
|
||||
\field{title}{Another Round Of Intel CET Patches, Still Working Toward Linux Kernel Integration}
|
||||
\field{year}{2021}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{ubuntu_caps}{manual}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{capabilities - overview of Linux capabilities}
|
||||
\verb{urlraw}
|
||||
@@ -1187,8 +1563,8 @@
|
||||
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||||
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||||
\field{extraname}{2}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{labelnamesource}{author}
|
||||
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
|
||||
\field{pages}{9}
|
||||
@@ -1201,8 +1577,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{ebpf_caps_intro}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{[PATCH v7 bpf-next 1/3] bpf, capability: Introduce CAP\_BPF}
|
||||
\verb{urlraw}
|
||||
@@ -1213,8 +1589,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{ebpf_caps_lwn}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{capability: introduce CAP\_BPF and CAP\_TRACING}
|
||||
\verb{urlraw}
|
||||
@@ -1225,8 +1601,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{unprivileged_ebpf}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{Reconsidering unprivileged BPF}
|
||||
\verb{urlraw}
|
||||
@@ -1237,8 +1613,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{cve_unpriv_ebpf}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability}
|
||||
\verb{urlraw}
|
||||
@@ -1249,8 +1625,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{unpriv_ebpf_ubuntu}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{Unprivileged eBPF disabled by default for Ubuntu 20.04 LTS, 18.04 LTS, 16.04 ESM}
|
||||
\verb{urlraw}
|
||||
@@ -1261,8 +1637,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{unpriv_ebpf_suse}{online}{}
|
||||
\field{sortinit}{8}
|
||||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{Security Hardening: Use of eBPF by unprivileged users has been disabled by default}
|
||||
\verb{urlraw}
|
||||
@@ -1273,8 +1649,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{unpriv_ebpf_redhat}{online}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{CVE-2022-0002}
|
||||
\verb{urlraw}
|
||||
@@ -1300,9 +1676,9 @@
|
||||
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\field{extraname}{1}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{extraname}{2}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{28}
|
||||
@@ -1340,8 +1716,8 @@
|
||||
\strng{authornamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||||
\strng{authorfullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||||
\field{extraname}{2}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{eventtitle}{Cyber Threats 2021: A year in Retrospect}
|
||||
\field{pages}{15}
|
||||
@@ -1354,8 +1730,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{ebpf_override_return}{online}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{BPF-based error injection for the kernel}
|
||||
\verb{urlraw}
|
||||
@@ -1366,8 +1742,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{code_kernel_open}{online}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{indextitle}{Linux kernel source code}
|
||||
\verb{urlraw}
|
||||
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/open.c#L1192
|
||||
@@ -1377,8 +1753,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{code_kernel_syscall}{online}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{indextitle}{Linux kernel source code}
|
||||
\verb{urlraw}
|
||||
\verb https://elixir.bootlin.com/linux/v5.11/source/include/linux/syscalls.h#L233
|
||||
@@ -1388,8 +1764,8 @@
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{fault_injection}{online}{}
|
||||
\field{sortinit}{9}
|
||||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{4}
|
||||
\field{month}{11}
|
||||
@@ -1403,137 +1779,6 @@
|
||||
\verb https://lwn.net/Articles/209257/
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{mem_page_arch}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=47635127541392c1419dbc4a4d3153c6}{%
|
||||
family={Lameter},
|
||||
familyi={L\bibinitperiod},
|
||||
given={Christopher},
|
||||
giveni={C\bibinitperiod}}}%
|
||||
}
|
||||
\list{institution}{1}{%
|
||||
{Jump Trading LLC}%
|
||||
}
|
||||
\list{organization}{1}{%
|
||||
{The Linux Foundation Open Source Summit}%
|
||||
}
|
||||
\strng{namehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{fullhash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{bibnamehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{authorbibnamehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{authornamehash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\strng{authorfullhash}{47635127541392c1419dbc4a4d3153c6}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{1}
|
||||
\field{month}{12}
|
||||
\field{title}{Memory Management 101: Introduction to Memory Management in Linux}
|
||||
\field{year}{2017}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{page_faults}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=28efc25c8eae7f3d05fad64c4679158f}{%
|
||||
family={Breaker},
|
||||
familyi={B\bibinitperiod},
|
||||
given={Doug},
|
||||
giveni={D\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{fullhash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{bibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{authorbibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{authornamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\strng{authorfullhash}{28efc25c8eae7f3d05fad64c4679158f}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{19}
|
||||
\field{month}{8}
|
||||
\field{title}{Understanding page faults and memory swap-in/outs}
|
||||
\field{year}{2019}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{mem_arch_proc}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=c6b49e9e6fbe96fdd89720e842dc0b03}{%
|
||||
family={Bajo},
|
||||
familyi={B\bibinitperiod},
|
||||
given={Marcos\bibnamedelima Sánchez},
|
||||
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{fullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{bibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{authorbibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{authornamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\strng{authorfullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{23}
|
||||
\field{month}{5}
|
||||
\field{title}{Stack-based Buffer Overflow - Part 1}
|
||||
\field{year}{2021}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{8664_params_abi_p18}{manual}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=871f02558cb7234c22cde24811cf53a7}{%
|
||||
family={al.},
|
||||
familyi={a\bibinitperiod},
|
||||
given={H.J.\bibnamedelimi Lu},
|
||||
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
|
||||
prefix={et},
|
||||
prefixi={e\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
|
||||
\field{extraname}{2}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{28}
|
||||
\field{month}{1}
|
||||
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
|
||||
\field{year}{2018}
|
||||
\field{dateera}{ce}
|
||||
\field{pages}{18}
|
||||
\range{pages}{1}
|
||||
\verb{urlraw}
|
||||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{write_helper_non_fault}{online}{}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
@@ -1626,77 +1871,6 @@
|
||||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{network_layers}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=ed79ecb3ff4a83522b186b5e3fa37b0d}{%
|
||||
family={Alienor},
|
||||
familyi={A\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{fullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{bibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{authorbibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{authornamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\strng{authorfullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{28}
|
||||
\field{month}{11}
|
||||
\field{title}{The Network Layers Explained [with examples]}
|
||||
\field{year}{2018}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.plixer.com/blog/network-layers-explained/
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.plixer.com/blog/network-layers-explained/
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{tcp_reliable}{online}{}
|
||||
\list{organization}{1}{%
|
||||
{IBM}%
|
||||
}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{19}
|
||||
\field{month}{4}
|
||||
\field{title}{Transmission Control Protocol}
|
||||
\field{year}{2022}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{tcp_handshake}{online}{}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{Three-Way Handshake}
|
||||
\verb{urlraw}
|
||||
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{rop_prog_finder}{online}{}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{ROPgadget Tool}
|
||||
\verb{urlraw}
|
||||
\verb https://github.com/JonathanSalwan/ROPgadget
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://github.com/JonathanSalwan/ROPgadget
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{glibc}{online}{}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
@@ -1709,88 +1883,16 @@
|
||||
\verb https://www.gnu.org/software/libc/
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{elf}{manual}{}
|
||||
\entry{canary_exploit}{online}{}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{ELF}
|
||||
\field{title}{Stack Canaries}
|
||||
\verb{urlraw}
|
||||
\verb https://wiki.osdev.org/ELF
|
||||
\verb https://ir0nstone.gitbook.io/notes/types/stack/canaries
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://wiki.osdev.org/ELF
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{plt_got_overlord}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=9724da855997a02e74ee77d11b4d64e2}{%
|
||||
family={Tomaschik},
|
||||
familyi={T\bibinitperiod},
|
||||
given={David},
|
||||
giveni={D\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{fullhash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{bibnamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{authorbibnamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{authornamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\strng{authorfullhash}{9724da855997a02e74ee77d11b4d64e2}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{19}
|
||||
\field{month}{3}
|
||||
\field{title}{GOT and PLT for pwning.}
|
||||
\field{year}{2017}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{plt_got_technovelty}{online}{}
|
||||
\name{author}{1}{}{%
|
||||
{{hash=4e4902d108d0796e7e54d06a47cfe1ee}{%
|
||||
family={Wienand},
|
||||
familyi={W\bibinitperiod},
|
||||
given={Ian},
|
||||
giveni={I\bibinitperiod}}}%
|
||||
}
|
||||
\strng{namehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{fullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{bibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{authorbibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{authornamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\strng{authorfullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labelnamesource}{author}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{day}{11}
|
||||
\field{month}{5}
|
||||
\field{title}{PLT and GOT - the key to code sharing and dynamic libraries}
|
||||
\field{year}{2011}
|
||||
\field{dateera}{ce}
|
||||
\verb{urlraw}
|
||||
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{aslr_pie_intro}{online}{}
|
||||
\field{sortinit}{1}
|
||||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||||
\field{labeltitlesource}{title}
|
||||
\field{title}{aslr/pie intro}
|
||||
\verb{urlraw}
|
||||
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
|
||||
\endverb
|
||||
\verb{url}
|
||||
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
|
||||
\verb https://ir0nstone.gitbook.io/notes/types/stack/canaries
|
||||
\endverb
|
||||
\endentry
|
||||
\entry{pie_exploit}{online}{}
|
||||
|
||||
Reference in New Issue
Block a user