没有合适的资源?快使用搜索试试~ 我知道了~
MSRC-Security-Research:Microsoft安全响应中心(MSRC)的安全性研究
共44个文件
pdf:35个
pptx:4个
license-code:1个
需积分: 9 0 下载量 35 浏览量
2021-03-31
07:17:01
上传
评论
收藏 136.85MB ZIP 举报
温馨提示
介绍 此项目托管来自Microsoft安全响应中心(MSRC)的安全性研究。 贡献 目前,该项目尚不接受外部捐款,但我们希望将来能够接受。 大多数捐款要求您同意“捐款者许可协议”(CLA),声明您有权并实际上授予我们使用您的捐款的权利。 有关详细信息,请访问 。 当您提交拉取请求时,CLA机器人会自动确定您是否需要提供CLA并适当地装饰PR(例如,标签,注释)。 只需按照机器人提供的说明进行操作即可。 您只需使用我们的CLA在所有存储库中执行一次此操作即可。 该项目采用了。 有关更多信息,请参见或与联系,并提出其他任何问题或意见。
资源详情
资源评论
资源推荐
收起资源包目录
MSRC-Security-Research-master.zip (44个子文件)
MSRC-Security-Research-master
presentations
2019_05_YSTS13
2019_05_YSTS13 Identity Crisis.pdf 1.54MB
2019_05_YSTS13 Identity Crisis.pptx 3.02MB
2019_11_RustFest
RustFestEU19_REvolution_Keynote.pdf 1.6MB
2017_05_SysScan360_Seattle
SyScan360_Miller_Towards_Mitigating_Arbitrary_Native_Code_Execution.pdf 3.75MB
2018_01_BlueHatIL
BlueHatIL18_Weston_Hardening_With_Hardware.pdf 5.12MB
2011_03_CanSecWest
CSW11_Duran_Miller_Weston_Metric_Fuzzing.pdf 2.13MB
2019_02_BlueHatIL
2019_02 - BlueHatIL - Trends, challenge, and shifts in software vulnerability mitigation.pdf 3.76MB
2019_01 - BlueHatIL - Trends, challenge, and shifts in software vulnerability mitigation.pdf 3.76MB
2018_08_BlackHatUSA
us-18-Weston-Zer0ing-Trust-Do-Zero-Trust-Approaches-Deliver-Real-Security.pdf 8.35MB
us-18-Fogh-Ertl-Wrangling-with-the-Ghost-An-Inside-Story-of-Mitigating-Speculative-Execution-Side-Channel-Vulnerabilities.pdf 2.74MB
A Dive in to Hyper-V Architecture and Vulnerabilities.pdf 4.1MB
2018_02_OffensiveCon
The Evolution of CFI Attacks and Defenses.pdf 3.23MB
2019_09_Ekoparty
EKO19_Quest_Memory_Safety_PL.pptx 1.33MB
EKO19_Quest_Memory_Safety_PL.pdf 1.68MB
2017_07_BountyCraft
BountyCraft2017_JosephBialek_State_Of_Kernel_RCE_Mitigations.pdf 3.11MB
2020_08_BlackHatUSA
Breaking_VSM_by_Attacking_SecureKernel.pdf 5.65MB
2018_10_DerbyCon
2018_10_DerbyCon_State_of _Win32k_Security.pptx 1.14MB
2018_10_DerbyCon_State_of _Win32k_Security.pdf 1.05MB
2018_04_OPCDE
The Life & Death of Kernel Object Abuse by Type Isolation.pdf 2.02MB
2009_03_CanSecWest
CSW09_Burrell_Miller_Evolution_Of_Microsofts_Mitigations.pdf 1.49MB
2019_08_BlackHatUSA
BHUSA19_Joly_Hunting_For_Bugs_Catching_Dragons.pptx 36.92MB
BHUSA19_Exploiting_the_Hyper-V_IDE_Emulator_to_Escape_the_Virtual_Machine.pdf 3.9MB
BHUSA19_Joly_Hunting_For_Bugs_Catching_Dragons.pdf 3.18MB
2019_02_OffensiveCon
2019_02 - OffensiveCon - Growing Hypervisor 0day with Hyperseed.pdf 6.03MB
2019_09_CppCon
CppCon2019 - Killing Uninitialized Memory.pdf 5.47MB
2012_10_Breakpoint
BreakPoint2012_Miller_Modeling_the_exploitation_and_mitigation_of_memory_safety_vulnerabilities.pdf 2.92MB
2018_12_35C3
Modern_Windows_Userspace_Exploitation.pdf 1.27MB
From_Zero_to_Zero_Day.pdf 1.4MB
2020_06_SSTIC
SSTIC2020 - Pursuing Durably Safe Systems Software.pdf 3.37MB
2016_08_BlackHatUSA
BHUSA16_Weston_Miller_Windows_10_Mitigation_Improvements.pdf 3.7MB
2017_03_NullCon
NullCon17_Swamy_Agility_With_Security_Mitigations_In_Windows10.pdf 2.58MB
2012_07_BlackHatUSA
BHUSA12_Johnson_Miller_Exploit_Mitigation_Improvements_in_Windows_8.pdf 2.07MB
2017_08_HitconCommunity
HitconCommunity17_Joly_Mitigating_The_Unkn0wn.pdf 3.75MB
2017_03_CanSecWest
CSW17_Weston_Miller_Mitigating_Native_Remote_Code_Execution.pdf 3.5MB
2018_04_CyberUK2018
MSRC-CyberUK2018-Final.pdf 6.13MB
2019_08_WOOT
placeholder.txt 1B
WOOT19 - Trends and challenges in vulnerability mitigation.pdf 3.96MB
LICENSE 19KB
README.md 1KB
LICENSE-CODE 1KB
papers
2020
Security analysis of memory tagging.pdf 325KB
Evaluating the feasibility of enabling SMAP for the Windows kernel.pdf 375KB
Security analysis of CHERI ISA.pdf 1.12MB
.gitignore 5KB
共 44 条
- 1
不就是输
- 粉丝: 21
- 资源: 4612
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0