Explore >> Select a destination


You are here

lwn.net
| | sergioprado.blog
4.4 parsecs away

Travel
| | This is the second part of the article about embedded Linux security.
| | itm4n.github.io
5.6 parsecs away

Travel
| | Whenever a "new" DLL hijacking / planting trick is posted on Twitter, it generates a lot of comments. "It's not a vulnerability!" or "There is a lot of hijackable DLLs on Windows..." are the most common reactions. Though, people often don't really speak about the same thing, hence the overall confusion which leads us nowhere. I don't pretend to know the ultimate truth but I felt the need to write this post in order to hopefully clarify some points.
| | www.riscure.com
4.9 parsecs away

Travel
| | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them.
| | lucidgypsy.com
18.1 parsecs away

Travel
| 1 post published by Lucid Gypsy on April 11, 2021