From 668306c51e1d394d4dac613935c5037a074f6235 Mon Sep 17 00:00:00 2001 From: firmianay Date: Wed, 8 Apr 2020 22:52:12 +0800 Subject: [PATCH] fix --- README.md | 1 + SUMMARY.md | 4 +--- doc/8.12_aslr_on_the_line.md | 5 ----- doc/{8.50_large_scale_embedded.md => 8.51_cryptorex.md} | 3 +-- doc/8.6_brop.md | 5 ----- 5 files changed, 3 insertions(+), 15 deletions(-) delete mode 100644 doc/8.12_aslr_on_the_line.md rename doc/{8.50_large_scale_embedded.md => 8.51_cryptorex.md} (58%) delete mode 100644 doc/8.6_brop.md diff --git a/README.md b/README.md index 3796d53..faf9bdb 100644 --- a/README.md +++ b/README.md @@ -73,3 +73,4 @@ CC BY-SA 4.0 - 2019-08-05 *鹏飞 ¥20 - 2019-10-02 Gk ¥66.6 - 2019-10-12 简单 ¥40.96 +- 2020-04-05 jingle ¥200 diff --git a/SUMMARY.md b/SUMMARY.md index b134df4..c13744e 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -210,13 +210,11 @@ GitHub 地址: * [8.3 Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms](doc/8.3_rop_rootkits.md) * [8.4 ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks](doc/8.4_ropdefender.md) * [8.5 Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks](doc/8.5_dop.md) - * [8.6 Hacking Blind](doc/8.6_brop.md) * [8.7 What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses](doc/8.7_jit-rop_defenses.md) * [8.8 All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask)](doc/8.8_dta_and_fse.md) * [8.9 Symbolic Execution for Software Testing: Three Decades Later](doc/8.9_symbolic_execution.md) * [8.10 AEG: Automatic Exploit Generation](doc/8.10_aeg.md) * [8.11 Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software](doc/8.11_aslp.md) - * [8.12 ASLR on the Line: Practical Cache Attacks on the MMU](doc/8.12_aslr_on_the_line.md) * [8.13 New Frontiers of Reverse Engineering](doc/8.13_reverse_engineering.md) * [8.14 Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries](doc/8.14_detecting_memory_allocators.md) * [8.15 EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning](doc/8.15_emu_vs_real.md) @@ -254,7 +252,7 @@ GitHub 地址: * [8.47 Jump-Oriented Programming: A New Class of Code-Reuse Attack](doc/8.47_jop.md) * [8.48 Reassembleable Disassembling](doc/8.48_uroboros.md) * [8.49 Understanding Integer Overflow in C/C++](doc/8.49_ioc.md) - * [8.50 A Large-Scale Analysis of the Security of Embedded Firmwares](doc/8.50_large_scale_embedded.md) + * [8.51 CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices](doc/8.51_cryptorex.md) * [九、附录](doc/9_appendix.md) * [9.1 更多 Linux 工具](doc/9.1_Linuxtools.md) * [9.2 更多 Windows 工具](doc/9.2_wintools.md) diff --git a/doc/8.12_aslr_on_the_line.md b/doc/8.12_aslr_on_the_line.md deleted file mode 100644 index 097e255..0000000 --- a/doc/8.12_aslr_on_the_line.md +++ /dev/null @@ -1,5 +0,0 @@ -# 8.12 ASLR on the Line: Practical Cache Attacks on the MMU - -[paper](https://www.cs.vu.nl/~giuffrida/papers/anc-ndss-2017.pdf) - -## 简介 diff --git a/doc/8.50_large_scale_embedded.md b/doc/8.51_cryptorex.md similarity index 58% rename from doc/8.50_large_scale_embedded.md rename to doc/8.51_cryptorex.md index efe796c..6e4468e 100644 --- a/doc/8.50_large_scale_embedded.md +++ b/doc/8.51_cryptorex.md @@ -1,7 +1,6 @@ -# 8.50 A Large-Scale Analysis of the Security of Embedded Firmwares +# 8.51 CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices [paper](https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-costin.pdf) ## 简介 - diff --git a/doc/8.6_brop.md b/doc/8.6_brop.md deleted file mode 100644 index 8a866ea..0000000 --- a/doc/8.6_brop.md +++ /dev/null @@ -1,5 +0,0 @@ -# 8.6 Hacking Blind - -[paper](http://www.scs.stanford.edu/~sorbo/brop/bittau-brop.pdf) - -## 简介