Joe1sn's Cabin
计算机系统安全-板书
Back to Home
计算机系统安全-板书
Created
1990-09-26
|
Updated
2025-09-27
|
Post Views:
硬件安全
第一节课
第二节课
PUF:
https://www.puftech.com/index.do?introduce
Author:
Joe1sn
Link:
https://joe1sn.eu.org/1990/09/26/1d64d36c186dc96562565d0e0c2d50ecca86a0deace8b42b2aead214934a7a42/
Copyright Notice:
All articles on this blog are licensed under
CC BY-NC-SA 4.0
unless otherwise stated.
hardware
Previous
BUUCTF Pwn WriteUp
buu部分刷题记录 [HarekazeCTF2019]baby_rop 1.checksec() 12345Arch: amd64-64-littleRELRO: Partial RELROStack: No canary foundNX: NX enabledPIE: No PIE (0x400000) 2.IDA main 123456789int __cdecl main(int argc, const char **argv, const char **envp){ char v4; // [rsp+0h] [rbp-10h] system("echo -n \"What's your name? \""); __isoc99_scanf("%s", &v4); printf("Welcome to the Pwn World, %s!\n", &v4); return 0;} scan...
Related Articles
2025-10-14
CPU Meltdown 漏洞与论文
公众号:https://mp.weixin.qq.com/s/VsGaZ7LqFkziJRpxp0rEBQ 很经典一篇同时具有实践价值和学术研究价值的文章,原文名称:Meltdown: Reading Kernel Memory from User Space [1]。提前预告:由于没有找到合适的CPU所以复现是失败的 或许我们的公众号会有更多你感兴趣的内容 [复现]CPU Meltdown 漏洞与论文 很经典一篇同时具有实践价值和学术研究价值的文章,原文名称:Meltdown: Reading Kernel Memory from User Space [1]。提前预告:由于没有找到合适的CPU所以复现是失败的 摘要 写过论文都知道这部分就是对文章大概的描述,很关键的是这句 “Meltdown exploits side effects of out-of-order execution on modern processors to read arbitrary kernel-memory locations including personal data...
Joe1sn
Articles
79
Tags
38
Categories
9
Follow Me
Announcement
lue lue lue
Contents
1.
硬件安全
1.1.
第一节课
1.2.
第二节课
Recent Posts
【置顶】【编程】开发笔记
2098-12-31
windows内核驱动 12-内核hook-1.5
2026-04-11
windows内核驱动 11-内核hook-1
2026-03-15
windows内核驱动 10-对抗进程回调保护与注册表回调保护
2026-03-07
windows内核驱动 9-进程回调保护与注册表回调保护
2026-03-06
简