|
You are here |
lwn.net | ||
| | | | |
sergioprado.blog
|
|
| | | | | This is the second part of the article about embedded Linux security. | |
| | | | |
itm4n.github.io
|
|
| | | | | Whenever a "new" DLL hijacking / planting trick is posted on Twitter, it generates a lot of comments. "It's not a vulnerability!" or "There is a lot of hijackable DLLs on Windows..." are the most common reactions. Though, people often don't really speak about the same thing, hence the overall confusion which leads us nowhere. I don't pretend to know the ultimate truth but I felt the need to write this post in order to hopefully clarify some points. | |
| | | | |
www.riscure.com
|
|
| | | | | In this series of blog posts about Samsung's TEE OS we identify vulnerabilities in tee security and show how to exploit them. | |
| | | | |
lucidgypsy.com
|
|
| | | 1 post published by Lucid Gypsy on April 11, 2021 | ||