🦞🌯 Lobster Roll

Thread

Case study: Searching for a vulnerability pattern in the Linux kernel (a13xp0p0v.github.io)

Stories related to "Case study: Searching for a vulnerability pattern in the Linux kernel" across the full archive.

Case study: Searching for a vulnerability pattern in the Linux kernel (a13xp0p0v.github.io)
Manual vs. Automated Vulnerability Assessment: A Case Study (pages.cs.wisc.edu)
Abstract: "The dream of every software development team is to assess the security of their software using only a tool. In this paper, we attempt to evaluate and quantify the effectiveness of automated source code analysis tools by comparing such tools to the results of an in-depth manual evaluatio...
An EPYC escape: Case-study of a Linux KVM breakout (googleprojectzero.blogspot.com)
Case Study: Securing MMU-less Linux Using CHERI (arxiv.org)
MMU-less Linux variant lacks security because it does not have protection or isolation mechanisms. It also does not use MPUs as they do not fit with its software model because of the design drawbacks of MPUs (\ie coarse-grained protection with fixed number of protected regions). We secure the existi...
CVE-2021-4440: A Linux CNA Case Study (grsecurity.net)
Case Study: An Auto-Updating Cache Using Actors (letitcrash.com)
Case Study: Pro-active Log Review Might Be A Good Idea (securityblog.verizonbusiness.com)
Apcera Case Study: The selection of the Go language (slideshare.net)
How Surveillance Changes Behavior: A Restaurant Workers Case Study (bits.blogs.nytimes.com)
Website optimization case study. (blog.higg.im)
bro pages show concise, common-case examples for Unix commands (bropages.org)
The Influence of Organizational Structure On Software Quality: An Empirical Case Study (research.microsoft.com)
Technical Debt, a case study : tags (marcgravell.blogspot.co.uk)
Programmers’ Build Errors: A Case Study (at Google) (static.googleusercontent.com)
"First-class 'Statements'": Looking at IO as data, through a Haskell case study (blog.jle.im)
A look at Haskell's approach of handling the execution and sequencing of IO as regular data structures, and not as special syntactical constructs.
Coding a Lisp Interpreter in Shen: a Case Study (shenlanguage.org)
BASH: Searching history (danielmiessler.com)
The Linux “Grinch” Vulnerability: Separating The Fact From The FUD (blog.threatstack.com)
A Case Study in JavaScript Code Improvement (developer.telerik.com)
Exploiting “BadIRET” vulnerability (CVE-2014-9322, Linux kernel privilege escalation) (labs.bromium.com)
Case Study: Type-safe Domain Modeling in F# (deliberate-software.com)
Hacking Team: a zero-day market case study (tsyrklevich.net)
Google+: A case study on App Download Interstitials: "69% of the visits abandoned our page" (googlewebmastercentral.blogspot.com)
https://twitter.com/jaffathecake/status/624227438676062208
The Influence of Organizational Structure On Software Quality: An Empirical Case Study (research.microsoft.com)
The strange case of ICMP Type 69 on Linux (blog.benjojo.co.uk)
Tk Case Study: IDLE Modernization (tkdocs.com)
[gui]
Replacing Sawzall — a case study in domain-specific language migration (unofficialgoogledatascience.com)
Analysis and Exploitation of a Linux Kernel Vulnerability (CVE-2016-0728) (perception-point.io)
Transforming Lufthansa's Brand Strategy: From The Online To Interactive Age, A Case Study (smashingmagazine.com)
Critical glibc buffer overflow vulnerability in getaddrinfo() on Linux (CVE-2015-7547 & CVE-2015-5229) (ma.ttias.be)