Attack & Defense, Cyber Warfare
an archive of posts in this category
| May 23, 2018 | Compiler-assisted Code Randomization |
|---|---|
| Jul 31, 2016 | Cyber Grand Challenge by DARPA |
| May 31, 2016 | Juggling the Gadgets: Instruction Displacement to Mitigate Code Reuse Attack |
| Jan 16, 2016 | Code Reuse Attacks and Defenses |
| Mar 1, 2015 | ROP Mitigation using orp |
| Feb 16, 2015 | PE File Format |
| Jan 13, 2015 | Looking at Redstar 3.0 (붉은별) closely |
| Dec 23, 2014 | Rootkit module in Linux Kernel 3.2 |
| Aug 25, 2014 | Attacks against SSL/TLS - BEAST/CRIME/BREACH |
| Jul 5, 2014 | How to transfer PuTTY setting to linux |
| Apr 12, 2014 | OpenSSL TLS Heartbeat Vulnerability |
| Feb 18, 2014 | BGP Security |
| Apr 11, 2013 | Security is a matter of Trust of Chain |
| Mar 22, 2013 | Experiment on overwritten data location from a victim |
| Jan 3, 2013 | Getting access to NAS for fun |
| Jul 27, 2012 | Profiling Insider Threats - Pre-detection model |
| Jul 16, 2012 | The Era of Cyber Sabotage & Warfare (Case Study: Stuxnet) |