Skip to content

Commit a7e0037

Browse files
committed
Add files via upload
- Classifies memory attacks into a hierarchy that is usable by both black- and white-hats. - An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them. Update README.md Include year in README Update README.md
1 parent d5122b2 commit a7e0037

File tree

2 files changed

+3
-0
lines changed

2 files changed

+3
-0
lines changed

security/README.md

+3
Original file line numberDiff line numberDiff line change
@@ -9,3 +9,6 @@
99
* :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)](macaroons-cookies-with-contextual-caveats.pdf)
1010

1111
* :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)](ids-evasion-ptacek-newsham.pdf)
12+
* :scroll: [SoK: Eternal War in Memory (2013)](sok-eternal-war-in-memory.pdf)
13+
- Classifies memory attacks into a taxonomy that is usable by both black- and white-hats.
14+
- An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them.
263 KB
Binary file not shown.

0 commit comments

Comments
 (0)