Skip to content

Kevin's Attic for Security Research

  • Profile
  • Links
  • Papers in Security

Categories

  • Anonymity (3)
  • Attack & Defense, Cyber Warfare (23)
  • Cryptography (3)
  • Digital Forensic & Investigation (7)
  • Insider Threats (1)
  • Malware (5)
  • Miscellaneous Stuff (13)
  • Network Security (8)
  • Papers in Security (7)
  • Security in Society (4)

Recent Posts

  • Compiler-assisted Code Randomization May 23, 2018
  • [Paper] Hacking in Darkness: ROP against Secure Enclaves (USENIX ’17) September 8, 2017
  • ELF Sections for Exception Handling September 5, 2017

Archives

Tags

  • 3.20
  • anonymity
  • APT
  • BitTorrent
  • case study
  • cryptography
  • Cryptography Engineering
  • Cyber law
  • Cyber warfare
  • digital forensic
  • email
  • File System
  • Insider Threat
  • IP Finder
  • KMS
  • Linux
  • Malware
  • maxmind
  • memory forensic
  • Microsoft
  • model
  • NAS
  • network
  • NTFS
  • onion routing
  • PGP
  • Profiling
  • Protocol
  • registry
  • return oriented programming
  • root access
  • rop
  • Stuxnet
  • Tip
  • tor
  • Torrent
  • Translation
  • volatility
  • volume license
  • windows
  • 번역
  • 번역서
  • 악성코드
  • 암호학
  • 팁
Previous Image
Next Image

result

Related

Posted on May 26, 2016Full size 694 × 286

Post navigation

Published inJuggling the Gadgets: Instruction Displacement to Mitigate Code Reuse Attack
Proudly powered by WordPress