You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
|
3 months ago | |
---|---|---|
.. | ||
README.md | 3 months ago | |
ids-evasion-ptacek-newsham.pdf | 10 years ago | |
macaroons-cookies-with-contextual-caveats.pdf | 9 years ago | |
sok-eternal-war-in-memory.pdf | 8 years ago |
README.md
Security
-
Making Programs Forget: Enforcing Lifetime For Sensitive Data (2011)
-
A survey of coordinated attacks and collaborative intrusion detection (2010)
-
Zanzibar: Google’s Consistent, Global Authorization System (2019)
-
📜 Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)
-
📜 Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)
Hardware Security
-
- Flipping Bits in Memory Without Accessing Them: An Experimental Study of DRAM Disturbance Errors
-
📜 SoK: Eternal War in Memory (2013)
- Classifies memory attacks into a taxonomy that is usable by both black- and white-hats.
- An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them.