Newest Stories by fro
Home
Recent
Comments
Search
Login
1
When "ASLR" Is Not Really ASLR - The Case of Incorrect Assumptions and Bad Defaults
security
windows
insights.sei.cmu.edu
via
fro
22 days ago
|
cached
|
no comments
0
2
Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets
pdf
security
wp.internetsociety.org
via
fro
28 days ago
|
cached
|
no comments
0
1
On the Weaknesses of Function Table Randomization
pdf
security
ei.ruhr-uni-bochum.de
via
fro
28 days ago
|
cached
|
no comments
0
1
Feedback Control Can Make Data Structure Layout Randomization More Cost-Effective under Zero-day Attacks
pdf
security
link.springer.com
via
fro
1 month ago
|
cached
|
no comments
0
2
A kernel stack protection model against attacks from kernel execution units
pdf
security
reader.elsevier.com
via
fro
1 month ago
|
cached
|
no comments
0
2
Mitigating Privilege Escalation
pdf
security
media.proquest.com
via
fro
1 month ago
|
cached
|
1 comment
1
3
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity
pdf
security
arxiv.org
via
fro
1 month ago
|
cached
|
no comments
0
6
ASLR Protection for Statically Linked Executables
security
leviathansecurity.com
via
fro
2 months ago
|
cached
|
no comments
0
4
Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking
pdf
security
j00ru.vexillium.org
via
fro
2 months ago
|
cached
|
no comments
0
3
Smashing the Stack Protector for Fun and Profit
pdf
security
dke.maastrichtuniversity.nl
via
fro
2 months ago
|
cached
|
1 comment
1
1
BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation
pdf
security
ieeexplore.ieee.org
via
fro
2 months ago
|
cached
|
no comments
0
4
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
pdf
security
arxiv.org
via
fro
2 months ago
|
cached
|
no comments
0
1
Post-Spectre Threat Model Re-Think
browsers
security
chromium.googlesource.com
via
fro
2 months ago
|
cached
|
no comments
0
3
Block Oriented Programming: Automating Data-Only Attacks
pdf
security
arxiv.org
via
fro
2 months ago
|
cached
|
no comments
0
4
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
pdf
security
arxiv.org
via
fro
2 months ago
|
cached
|
1 comment
1
6
SEVered: Subverting AMD’s Virtual Machine Encryption
pdf
security
arxiv.org
via
fro
3 months ago
|
cached
|
no comments
0
8
System Management Mode Speculative Execution Attacks
security
blog.eclypsium.com
via
fro
3 months ago
|
cached
|
no comments
0
2
Throwhammer: Rowhammer Attacks over the Network and Defenses
pdf
security
cs.vu.nl
via
fro
3 months ago
|
cached
|
no comments
0
6
Position-independent Code Reuse
pdf
security
cs.vu.nl
via
fro
3 months ago
|
cached
|
1 comment
1
3
PULP: Inner-process Isolation based on the Program Counter and Data Memory Address
pdf
security
arxiv.org
via
fro
3 months ago
|
cached
|
no comments
0
3
MMap Vulnerabilities – Linux Kernel
linux
security
research.checkpoint.com
via
fro
3 months ago
|
cached
|
no comments
0
1
Exploiting CVE-2018-1038 - Total Meltdown
security
windows
blog.xpnsec.com
via
fro
4 months ago
|
cached
|
no comments
0
2
FINE-CFI: Fine-grained Control-Flow Integrity for Operating System Kernels
pdf
security
cs.wayne.edu
via
fro
4 months ago
|
cached
|
no comments
0
1
Breaking CFI: Exploiting CVE-2015-5122 using COOP
security
perception-point.io
via
fro
4 months ago
|
cached
|
no comments
0
15
Thwarting Return Oriented Programming (ROP) Attacks
pdf
openbsd
security
openbsd.org
via
fro
5 months ago
|
cached
|
6 comments
6
Page 2 >>