<--- Back to Details
First PageDocument Content
Software bugs / Shellcode / Address space layout randomization / Kernel / Linux kernel / Architecture of Windows NT / Loadable kernel module / Integer overflow
Date: 2016-08-09 05:04:08
Software bugs
Shellcode
Address space layout randomization
Kernel
Linux kernel
Architecture of Windows NT
Loadable kernel module
Integer overflow

Exploitation techniques for NT kernel Adrien ‘Adr1’ Garin Introduction

Add to Reading List

Source URL: www.lse.epita.fr

Download Document from Source Website

File Size: 955,00 KB

Share Document on Facebook

Similar Documents

Computer security / Computer hardware / Side-channel attacks / X86 architecture / Computing / Meltdown / Computer engineering / Pwnie Awards

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

DocID: 1xVgv - View Document

System software / Computer architecture / Software / Kernel / Xv6 / LLVM / Linux kernel

Hyperkernel: Push-Button Verification of an OS Kernel

DocID: 1xVeg - View Document

Computer architecture / Computing / Formal methods / Logic in computer science / Kernel / Linux kernel / L4 microkernel family / Mach / Verification / X86-64 / Formal verification / Satisfiability modulo theories

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

DocID: 1xUUc - View Document

Computer architecture / Computing / Computer hardware / Central processing unit / X86 architecture / Computer memory / Side-channel attacks / Virtual memory / Translation lookaside buffer / CPU cache / Meltdown / Spectre

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

DocID: 1xU6r - View Document

PDF Document

DocID: 1xPhq - View Document