<--- Back to Details
First PageDocument Content
X86 architecture / X86-64 / Kernel / Ioctl / Linux kernel / Thread / Architecture of Windows NT / Memory protection / Computer architecture / Software / Computing
Date: 2014-12-16 19:06:37
X86 architecture
X86-64
Kernel
Ioctl
Linux kernel
Thread
Architecture of Windows NT
Memory protection
Computer architecture
Software
Computing

KERNEL WARS: KERNEL-EXPLOITATION DEMYSTIFIED Introduction to kernel-mode vulnerabilities and exploitation

Add to Reading List

Source URL: www.blackhat.com

Download Document from Source Website

File Size: 414,93 KB

Share Document on Facebook

Similar Documents

Computer security / Computer hardware / Side-channel attacks / X86 architecture / Computing / Meltdown / Computer engineering / Pwnie Awards

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

DocID: 1xVgv - View Document

System software / Computer architecture / Software / Kernel / Xv6 / LLVM / Linux kernel

Hyperkernel: Push-Button Verification of an OS Kernel

DocID: 1xVeg - View Document

Computer architecture / Computing / Formal methods / Logic in computer science / Kernel / Linux kernel / L4 microkernel family / Mach / Verification / X86-64 / Formal verification / Satisfiability modulo theories

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

DocID: 1xUUc - View Document

Computer architecture / Computing / Computer hardware / Central processing unit / X86 architecture / Computer memory / Side-channel attacks / Virtual memory / Translation lookaside buffer / CPU cache / Meltdown / Spectre

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

DocID: 1xU6r - View Document

PDF Document

DocID: 1xPhq - View Document