Attack & Defense, Cyber Warfare
an archive of posts in this category
May 23, 2018 | Compiler-assisted Code Randomization |
---|---|
Jul 31, 2016 | Cyber Grand Challenge by DARPA |
May 31, 2016 | Juggling the Gadgets: Instruction Displacement to Mitigate Code Reuse Attack |
Jan 16, 2016 | Code Reuse Attacks and Defenses |
Mar 1, 2015 | ROP Mitigation using orp |
Feb 16, 2015 | PE File Format |
Jan 13, 2015 | Looking at Redstar 3.0 (붉은별) closely |
Dec 23, 2014 | Rootkit module in Linux Kernel 3.2 |
Aug 25, 2014 | Attacks against SSL/TLS - BEAST/CRIME/BREACH |
Jul 5, 2014 | How to transfer PuTTY setting to linux |
Apr 12, 2014 | OpenSSL TLS Heartbeat Vulnerability |
Feb 18, 2014 | BGP Security |
Apr 11, 2013 | Security is a matter of Trust of Chain |
Mar 22, 2013 | Experiment on overwritten data location from a victim |
Jan 3, 2013 | Getting access to NAS for fun |
Jul 27, 2012 | Profiling Insider Threats - Pre-detection model |
Jul 16, 2012 | The Era of Cyber Sabotage & Warfare (Case Study: Stuxnet) |