Skip to content

Kevin's Attic for Security Research

  • Profile
  • Links
  • Papers in Security

Categories

  • Anonymity (3)
  • Attack & Defense, Cyber Warfare (23)
  • Cryptography (3)
  • Digital Forensic & Investigation (7)
  • Insider Threats (1)
  • Malware (5)
  • Miscellaneous Stuff (13)
  • Network Security (8)
  • Papers in Security (7)
  • Security in Society (4)

Recent Posts

  • Compiler-assisted Code Randomization May 23, 2018
  • [Paper] Hacking in Darkness: ROP against Secure Enclaves (USENIX ’17) September 8, 2017
  • ELF Sections for Exception Handling September 5, 2017

Archives

Tags

  • anonymity
  • assembly visualizer
  • Attack
  • Bash
  • BGP
  • botnet
  • cgc
  • code reuse
  • cryptography
  • Cryptography Engineering
  • cyber grand challenge
  • darpa
  • Diffie-Hellman
  • digital forensic
  • digital forensics
  • Directory color
  • event
  • field
  • gadget
  • Heartbeat
  • Linux
  • Malware
  • maxmind
  • memory corruption
  • Microsoft
  • mitigation
  • model
  • network
  • North Korea
  • OpenSSL
  • paper
  • papers
  • Protocol
  • Redstar
  • registry
  • return oriented programming
  • Reversing
  • rop
  • software diversity
  • SSL
  • statistics
  • system security
  • TCP/IP
  • Tips
  • TLS
Previous Image
Next Image

high_view

Related

Posted on May 26, 2016Full size 400 × 219

Post navigation

Published inJuggling the Gadgets: Instruction Displacement to Mitigate Code Reuse Attack
Proudly powered by WordPress