|
You are here |
blog.tst.sh | ||
| | | | |
offlinemark.com
|
|
| | | | | This post details my adventures with the Linux virtual memory subsystem, and my discovery of a creative way to taunt the OOM (out of memory) killer by accumulating memory in the kernel, rather than in userspace. Keep reading and you'll learn: Internal details of the Linux kernel's demand paging implementation How to exploit virtual memory [...] | |
| | | | |
blog.impalabs.com
|
|
| | | | | All recent Huawei devices ship with a security hypervisor, a defense-in-depth measure designed to enhance kernel security. Unlike other OEMs, Huawei encrypts this privileged piece of software, hence why it has received little to no public scrutiny. With this blog post, we aim to cast light on its inner-workings and provide an in-depth analysis of its implementation, from its entry point to the functions dedicated to protecting the kernel at runtime. | |
| | | | |
venam.net
|
|
| | | | | In this episode we'll tackle a topic that joins many parts of the systems and so is hard to fully cover. It has a relationship with everything in the system, it glues it together. We're going to be discussing processes on Unix. | |
| | | | |
shellsharks.com
|
|
| | | An introduction to x86 Intel assembly. | ||