mirror of
				https://github.com/papers-we-love/papers-we-love.git
				synced 2025-06-13 12:54:28 +00:00 
			
		
		
		
	Add files via upload
- Classifies memory attacks into a hierarchy that is usable by both black- and white-hats. - An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them. Update README.md Include year in README Update README.md
This commit is contained in:
		
							parent
							
								
									d5122b2e6f
								
							
						
					
					
						commit
						a7e00370fe
					
				| @ -9,3 +9,6 @@ | ||||
| * :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)](macaroons-cookies-with-contextual-caveats.pdf) | ||||
| 
 | ||||
| * :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)](ids-evasion-ptacek-newsham.pdf) | ||||
| * :scroll: [SoK: Eternal War in Memory (2013)](sok-eternal-war-in-memory.pdf) | ||||
|    - Classifies memory attacks into a taxonomy that is usable by both black- and white-hats. | ||||
|    - An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them. | ||||
|  | ||||
							
								
								
									
										
											BIN
										
									
								
								security/sok-eternal-war-in-memory.pdf
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										
											BIN
										
									
								
								security/sok-eternal-war-in-memory.pdf
									
									
									
									
									
										Normal file
									
								
							
										
											Binary file not shown.
										
									
								
							
		Loading…
	
		Reference in New Issue
	
	Block a user