argp         posts     research     bugs

posts

» Paper notes: Reverse engineering x86 processor microcode 14 Sep 2017

» Paper notes: Telling your secrets without page faults 28 Aug 2017

» Paper notes: BinSim 21 Aug 2017

» Paper notes: ARTISTE 26 Apr 2016

» Paper notes: Towards automatic inference of kernel object semantics from binary code 20 Feb 2016

» Paper notes: Automating information flow analysis of low level code 04 Sep 2015

» Paper notes: Fuzzy stack hash 29 Dec 2014

» Paper notes: Enhancing symbolic execution with veritesting 23 Dec 2014

» Paper notes: Toward a foundational typed assembly language 19 Nov 2014

» Paper notes: Time-ordered event traces: a new debugging primitive for concurrency bugs 18 Nov 2014

» Paper notes: Interprocedural program analysis 17 Nov 2014

» Paper notes: A first step towards automated detection of buffer overrun vulnerabilities 12 Nov 2014

» Paper notes: Undangle 11 Nov 2014

» Paper notes: Efficiently detecting all dangling pointer uses in production servers 10 Nov 2014

» Paper notes: Type-based memory allocator hardening notes 07 Nov 2014

» Paper notes: Memory leak detection based on memory state transition graph 06 Nov 2014

» Paper notes: Path and context sensitive inter-procedural memory leak detection 05 Nov 2014

» Paper notes: A memory model for static analysis of C programs 04 Nov 2014

» Paper notes: Static program analysis assisted dynamic taint tracking 03 Nov 2014

» Heap Exploitation Abstraction by Example - OWASP 2012 17 Aug 2012

» Black Hat USA 2012: Owning Firefox's Heap 14 May 2012

» Pseudomonarchia jemallocum 16 Apr 2012

» The Linux kernel memory allocators from an exploitation perspective 03 Jan 2012

» May 2011 0day 24 May 2011

» Short Black Hat Europe 2011 review 21 Mar 2011

» Protecting the Core - Black Hat Europe 2011 27 Feb 2011

» Advisory: FreeBSD kernel NFS client local vulnerabilities 23 May 2010

» FreeBSD kernel exploitation mitigations 26 Apr 2010

» Black Hat Europe 2010 22 Apr 2010

» Quick kmdb cheatsheet 20 Feb 2010

» Exploit for CVE-2010-0453 07 Feb 2010

» First 2010 0day 06 Jan 2010

» Xmas 2009 0day 24 Dec 2009

» Advisory: Monkey HTTPd improper input validation vulnerability 14 Dec 2009

» Advisory: CoreHTTP web server off-by-one buffer overflow vulnerability 02 Dec 2009

» Advisory: Linux kernel SUNRPC off-by-two buffer overflow 01 Dec 2009

» Flickr is the new Bugtraq 26 Aug 2009

» ld-linuxv.so.1 rootkit 21 Aug 2009

» CVE-2008-3531: FreeBSD kernel stack overflow exploit development 04 Jul 2009

» FreeBSD kernel debugging 02 Jul 2009

» Exploiting the FreeBSD kernel memory allocator 12 Jun 2009

» Kernel stack-smashing protection in FreeBSD-8.0-current-200811 19 Nov 2008

» Privilege vs. permission 13 Nov 2008

» Linksys WRT54GL resurrection 20 Oct 2008

» Ελληνικός ιστός εμπιστοσύνης (ενημέρωση) 11 Sep 2008

» Διαγραμματική παράσταση του ελληνικού ιστού εμπιστοσύνης (ενημέρωση) 26 Aug 2008

» Διαγραμματική παράσταση του ελληνικού ιστού εμπιστοσύνης 11 May 2008

» Huskarl 15 Feb 2008

» Metakall 13 Aug 2007

» ACM SAC 2008 TRECK track 25 Jun 2007

» Google as a "trust authority" 20 Jun 2007

» Listening to research papers 04 Jun 2007

» The cost of authentication 23 May 2007

» Why I don't like network-layer security systems 05 May 2007

» irssi last.fm now playing script 28 Apr 2007

» netris hack 23 Apr 2007

» pykeynote 21 Apr 2007

» Vint Cerf's talk 05 Mar 2006

» DNS names as mobile phone numbers 22 Feb 2006

» Windows and Windows CE port of the Stanford IBE library 14 Feb 2006

» Not a new beginning 03 Feb 2006

» Datagram TLS and the Authorization eXchange Protocol (AXP) 30 Aug 2005

» RSA European Information Security Awards 2004 27 Nov 2004

» Let's make email more secure, a simple suggestion 02 Sep 2004

» ECC-LIB port for Windows and Windows CE 07 Feb 2004