Dissecting QNX
暂无分享,去创建一个
[1] Hector Marco Gisbert,et al. On the Effectiveness of Full-ASLR on 64-bit Linux , 2014 .
[2] Ismael Ripoll,et al. Exploiting Linux and PaX ASLR’s weaknesses on 32-bit and 64-bit systems , 2016 .
[3] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[4] Daniel Martin Gomez. BlackBerry PlayBook Security: Part one , 2011 .
[5] Reducing the Effective Entropy of GS Cookies , 2007 .
[6] Bruce Schneier,et al. Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator , 1999, Selected Areas in Cryptography.
[7] Héctor Marco Gisbert. Cyber-security protection techniques to mitigate memory errors exploitation , 2016 .
[8] Hagen Fritsch. Buffer overflows on linux-x86-64 , 2009 .
[9] Hovav Shacham,et al. Welcome to the Entropics: Boot-Time Entropy in Embedded Devices , 2013, 2013 IEEE Symposium on Security and Privacy.
[10] Ismael Ripoll,et al. Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers , 2013, 2013 IEEE 12th International Symposium on Network Computing and Applications.
[11] Tanja Lange,et al. Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..