Aggregator
Automatically Discovering Windows Kernel Information Leak Vulnerabilities
author : fanxiaocao(@TinySecEx) and
高通加解密引擎提权漏洞解析
author : jiayy(@chengjia4574) from IceSword Lab , Qihoo 360
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
ChromeOS基于eCryptfs的用户数据安全保护机制
author : suezi(@suezi86) of IceSword Lab , Qihoo 360
Chrome OS基于EXT4 Encryption的用户数据安全保护机制
author : suezi(@suezi86) of IceSword Lab , Qihoo 360
随笔
author : https://weibo.com/jfpan
这是一篇随笔,Win10对虚拟化实施拦截的产品设的障碍越来越大,忍不住吐槽下。话说RS3改进PatchGuard的针对性很明显,但为什么昨天提到Dual-CR3呢?因为它
随笔(二):全补丁下再次利用CPU漏洞攻破KASLR
author : https://weibo.com/jfpan
12月初微博提到微软RS4的内核修改,介绍了其KVA Shadowing方案消除了多种已知硬件边信道攻击,无意中成了当时尚未公开的meltdown CPU漏洞补丁的最早(
A Kernel Vulnerability Detection Framework based on Hardware
利用一个竞态漏洞root三星s8的方法
author : zjq(@spinlock2014) of IceSword Lab , Qihoo 360
开启Win10RS4ARM64远程内核调试之旅
TLB 缓存延迟刷新漏洞 CVE-2018-18281 解析
author: [email protected] of IceSword Lab , Qihoo 360
PTRACE_TRACEME 本地提权漏洞解析
author: Gengjia Chen ([email protected]) of IceSword Lab, qihoo 360
窥探有方——调试Released SGX Enclave
author : suezi(@suezi86) of IceSword Lab , Qihoo 360
Intel Software Guard
LoongArch 研究小记(一)
author: xiongxiao ([email protected]), jiayy (chengjia4574@
CVE-2021-22555漏洞分析
CVE-2021-4034 pkexec 本地提权漏洞利用解析
CVE-2022-23222 eBPF verifier 提权漏洞利用分析
Linux 内核利用技巧 Slab UAF to Page UAF
author: 熊潇 of IceSword Lab
本文研究了内核编译选项 CONFI
CVE-2022-1015 nf_tables 提权漏洞分析
author: 莫兴远 of IceSword Lab