This commit is contained in:
firmianay 2020-04-08 22:52:12 +08:00
parent 4623496dcf
commit 668306c51e
5 changed files with 3 additions and 15 deletions

View File

@ -73,3 +73,4 @@ CC BY-SA 4.0
- 2019-08-05 *鹏飞 ¥20
- 2019-10-02 Gk ¥66.6
- 2019-10-12 简单 ¥40.96
- 2020-04-05 jingle ¥200

View File

@ -210,13 +210,11 @@ GitHub 地址:<https://github.com/firmianay/CTF-All-In-One>
* [8.3 Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms](doc/8.3_rop_rootkits.md)
* [8.4 ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks](doc/8.4_ropdefender.md)
* [8.5 Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks](doc/8.5_dop.md)
* [8.6 Hacking Blind](doc/8.6_brop.md)
* [8.7 What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses](doc/8.7_jit-rop_defenses.md)
* [8.8 All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)](doc/8.8_dta_and_fse.md)
* [8.9 Symbolic Execution for Software Testing: Three Decades Later](doc/8.9_symbolic_execution.md)
* [8.10 AEG: Automatic Exploit Generation](doc/8.10_aeg.md)
* [8.11 Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software](doc/8.11_aslp.md)
* [8.12 ASLR on the Line: Practical Cache Attacks on the MMU](doc/8.12_aslr_on_the_line.md)
* [8.13 New Frontiers of Reverse Engineering](doc/8.13_reverse_engineering.md)
* [8.14 Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries](doc/8.14_detecting_memory_allocators.md)
* [8.15 EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning](doc/8.15_emu_vs_real.md)
@ -254,7 +252,7 @@ GitHub 地址:<https://github.com/firmianay/CTF-All-In-One>
* [8.47 Jump-Oriented Programming: A New Class of Code-Reuse Attack](doc/8.47_jop.md)
* [8.48 Reassembleable Disassembling](doc/8.48_uroboros.md)
* [8.49 Understanding Integer Overflow in C/C++](doc/8.49_ioc.md)
* [8.50 A Large-Scale Analysis of the Security of Embedded Firmwares](doc/8.50_large_scale_embedded.md)
* [8.51 CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices](doc/8.51_cryptorex.md)
* [九、附录](doc/9_appendix.md)
* [9.1 更多 Linux 工具](doc/9.1_Linuxtools.md)
* [9.2 更多 Windows 工具](doc/9.2_wintools.md)

View File

@ -1,5 +0,0 @@
# 8.12 ASLR on the Line: Practical Cache Attacks on the MMU
[paper](https://www.cs.vu.nl/~giuffrida/papers/anc-ndss-2017.pdf)
## 简介

View File

@ -1,7 +1,6 @@
# 8.50 A Large-Scale Analysis of the Security of Embedded Firmwares
# 8.51 CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
[paper](https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-costin.pdf)
## 简介

View File

@ -1,5 +0,0 @@
# 8.6 Hacking Blind
[paper](http://www.scs.stanford.edu/~sorbo/brop/bittau-brop.pdf)
## 简介