� (与本人兴趣强相关的)各种安全or计算机资料收集,如侵权请联系我删除~
book, manual, paper, blog, slides, report, course, survey,tool, online
- 2014 manual ARM_Architecture_Reference_Manual_ARMv7-A_and_ARMv7-R_edition -- Arm
- 2019 manual Arm_Architecture_Reference_Manual -- Intel
- 2019 manual Intel_64_and_IA-32_Architectures_Software_Developers_Manual -- Arm
- 2017 slides A_tour_of_the_ARM_architecture_and_its_Linux_support -- Thomas Petazzoni
- 2005 book Reversing_Secrets_of_Reverse_Engineering -- Eldad Eilam
- 2016 paper An_In-Depth_Analysis_of_Disassembly_on_Full-Scale_x86x64_Binaries -- Dennis Andriesse
- 2018 slides Unpacking_for_Dummies -- Paul Jung
- 2019 book Reverse_Engineering_for_Beginners -- Dennis Yurichev
- 2019 slides Three_Heads_Are_Better_Than_One_Mastering_NSAs_Ghidra_Reverse_Engineering_Tool -- Alexei Bulazel
- 2004 book Principles_of_Program_Analysis -- Flemming Nielson
- 2016 paper SVF_Interprocedural_Static_Value-Flow_Analysis_in_LLVM -- Yulei Sui
- 2018 slides Intro_to_Binary_Analysis_with_Z3_and_Angr -- Sam Brown
- 2018 slides The_NOT-SO-PROFITABLE_Path_Towards_Automated_Heap_Exploitation -- Thaís Moreira Hamasaki
- 2018 slides Finding_security_vulnerabilities_with_modern_fuzzing_techniques -- René Freingruber
- 2019 book SAT-SMT_by_example -- Dennis Yurichev
- 2019 book Static_Program_Analysis -- Anders Møller
- 2010 slides Malware-Analysis-Training -- Pedram Amini
- 2017 slides Dr_Honeypots -- Guillaume Arcas
- 2017 slides Digital_Vengeance_Exploiting_the_Most_Notorious_C&C_Toolkits -- @professor__plum
- 2018 slides Trojans_in_SS7-how_they_bypass_all_security_measures -- Sergey Puzankov
- 2019 slides Fileless_Malware_and_Process_Injection_in_Linux -- Hendrick
- 1998 paper StackGuard_Automatic_Adaptive_Detection_and_Prevention_of_Buffer-Overflow_Attacks -- Crispin Cowan
- 2001 blog Exploiting_Format_String_Vulnerabilities -- scut/team teso
- 2001 blog The_advanced_return-into-libc_exploits -- Nergal
- 2002 blog Advances_in_format_string_exploitation -- gera
- 2005 paper Control-Flow_Integrity_Principles_Implementations_and_Applications -- Mart´ın Abadi
- 2007 slides Understanding_the_heap_by_breaking_it -- Justin N. Ferguson
- 2008 book Hacking-The_Art_of_Exploitation_2nd_Edition -- JON ERICKSON
- 2009 paper Surgically_Returning_to_Randomized_libc -- Giampaolo Fresi Roglia
- 2009 blog MALLOC_DES-MALEFICARUM -- blackngel
- 2010 paper G-Free_Defeating_Return-Oriented_Programming_through_Gadget-less_Binaries -- Kaan Onarlioglu
- ★★★☆☆ 2011 book 0day安全-软件漏洞分析技术第2版 -- 王清
- 2012 paper Return-Oriented_Programming_Systems_Languages_and_Applications -- RYAN ROEMER
- 2013 paper Just-in-time_code_reuse_On_the_effectiveness_of_fine-grained_address_space_layout_randomization -- Kevin Z. Snow
- 2013 paper Transparent_ROP_Exploit_Mitigation_using_Indirect_Branch_Tracing -- Vasilis Pappas
- ★★★★★ 2014 paper Hacking_Blind -- Andrea Bittau
- ★★★★★ 2014 paper Framing_Signals—A_Return_to_Portable_Shellcode -- Erik Bosman
- 2014 paper Code-Pointer_Integrity -- Volodymyr Kuznetsov
- ★★★★★ 2015 paper How_the_ELF_Ruined_Christmas -- Alessandro Di Federico
- 2015 blog Glibc_Adventures_The_Forgotten_Chunks -- François Goichon
- ★★★☆☆ 2015 course Modern_Binary_Exploitation -- RPISEC
- 2015 paper Automatic_Generation_of_Data-Oriented_Exploits -- Hong Hu
- 2016 paper New_Exploit_Methods_against_Ptmalloc_of_GLIBC -- Tianyi Xie
- 2017 paper ASLR_on_the_Line_Practical_Cache_Attacks_on_the_MMU -- Ben Gras
- 2017 blog Cyber_Grand_Shellphish -- Team Shellphish
- 2019 survey 安全漏洞自动利用综述 -- 赵尚儒
- 2019 survey The_Art_Science_and_Engineering_of_Fuzzing_A_Survey -- Valentin J.M. Manes
- 2020 paper Typestate-Guided_Fuzzer_for_Discovering_Use-after-Free_Vulnerabilities -- Haijun Wang
- 2013 paper FIE_on_Firmware_Finding_Vulnerabilities_in_Embedded_Systems_Using_Symbolic_Execution -- Drew Davidson
- 2014 paper A_Large-Scale_Analysis_of_the_Security_of_Embedded_Firmwares -- Andrei Costin
- 2015 paper Firmalice-Automatic_Detection_of_Authentication_Bypass_Vulnerabilitiesin_Binary_Firmware -- Yan Shoshitaishvili
- 2016 paper Towards_Automated_Dynamic_Analysis_for_Linux-based_Embedded_Firmware -- Daming D. Chen
- 2016 paper Scalable_Graph-based_Bug_Search_for_Firmware_Images -- Qian Feng
- ★★☆☆☆ 2017 survey 物联网安全综述 -- 张玉清
- ★☆☆☆☆ 2018 survey 智能家居安全综述 -- 王基策
- 2018 survey 物联网操作系统安全研究综述 -- 彭安妮
- ★★★☆☆ 2018 report 智能设备安全分析手册 -- 绿盟
- 2018 paper What_You_Corrupt_Is_Not_What_You_Crash_Challenges_in_Fuzzing_Embedded_Devices -- Marius Muench
- 2018 paper IoTFuzzer_Discovering_Memory_Corruptions_in_IoT_Through_App-based_Fuzzing -- Jiongyi Chen
- 2018 paper Sensitive_Information_Tracking_in_Commodity_IoT -- Z. Berkay Celik
- 2018 paper DTaint_Detecting_the_Taint-Style_Vulnerability_in_Embedded_Device_Firmware -- Kai Cheng
- 2019 survey 车联网安全综述 -- 李兴华
- 2019 paper CryptoREX_Large-scale_Analysis_of_Cryptographic_Misuse_in_IoT_Devices -- Li Zhang
- 2019 slides Firmware_Extraction -- Pauline Bourmeau
- ★☆☆☆☆ 2019 report 2019物联网安全年报 -- 绿盟
- 2019 blog ANATOMY_OF_A_FIRMWARE_ATTACK -- Eclypsium
- 2019 blog Toward_Automated_Firmware_Analysis_in_the_IoT_Era -- Grant Hernandez
- 2019 paper Sok_Security_evaluation_of_home-based_iot_deployments -- Omar Alrawi
- 2019 paper Toward_the_Analysis_of_Embedded_Firmware_through_Automated_Re-hosting -- Eric Gustafson
- 2019 paper FIRM-AFL_High-Throughput_Greybox_Fuzzing_of_IoT_Firmware_via_Augmented_Process_Emulation -- Y. Zheng
- 2020 paper IoT_Behavioral_Monitoring_via_Network_Traffic_Analysis -- Arunan Sivanathan
- 2020 paper On_the_State_of_Internet_of_Things_Security_Vulnerabilities_Attacks_and_Recent_Countermeasures -- DEVKISHEN SISODIA
- 2020 survey A_Survey_of_Security_Vulnerability_Analysis_Discovery_Detection_and_Mitigation_on_IoT_Devices -- Miao Yu
- ★☆☆☆☆ 2020 paper FIRMCORN_Vulnerability-Oriented_Fuzzing_of_IoT_Firmware_via_Optimized_Virtual_Execution -- ZHIJIE GUI
- 2007 blog Ltrace_Internals -- Rodrigo Rubira Branco
- ★★★☆☆ 2011 blog Glibc内存管理_Ptmalloc2源代码分析 -- 华庭(庄明强)
- 2016 book Learning_Linux_Binary_Analysis -- Ryan "elfmaster" O'Neill
- 2016 slides Anatomy_of_cross-compilation_toolchains
- ★★★☆☆ 2017 slides GDB基础 -- 张银奎
- 2017 slides Tips_for_Linux_Kernel_Development -- Jessica Yu
- 2019 slides Linux_Kernel_and_Driver_Development_Training -- Bootlin
- 2019 slides Embedded_Linux_system_development -- Bootlin
- 2019 slides Buildroot_Training -- Bootlin
- 1994 book Reverse_Compilation_Techniques -- Cristina Cifuentes
- 2007 book Compilers_Principles_Techniques_and_Tools_2nd_Edition -- Alfred V. Aho
- 2011 book Engineering_a_Compiler_2nd_edition -- Keith D. Cooper
- 2012 book Modern_Compiler_Design_2nd_Edition -- Dick Grune
- 2014 book Getting_Started_with_LLVM_Core_Libraries -- Bruno Cardoso Lopes
- 2014 slides BHUSA2014-capstone -- Nguyen Anh Quynh
- 2016 slides BHUSA2016-keystone -- Nguyen Anh Quynh
- 2015 slides BHUSA2015-unicorn -- Nguyen Anh Quynh
- 2018 slides Hypervisor-Level_Debugger_Benefits_Challenges -- Mathieu Tarral
- 2018 slides unboxing_your_virtualboxes -- Niklas Baumstark
- 2018 slides thinking_outside_the_virtualbox -- Niklas Baumstark
- 2018 blog intel_virtualisation_how_vt-x_kvm_and_qemu_work_together -- Okash Khawaja
- 2019 manual VirtualBox_User_Manual -- Oracle
- 2017 book A_Graduate_Course_in_Applied_Cryptography -- Dan Boneh
- 2017 slides API_design_for_cryptography -- Frank Denis
- ★☆☆☆☆ 2015 slides 掘金CTF_CTF中的内存漏洞利用技巧 -- 杨坤
- ★☆☆☆☆ 2015 slides PLAY_WITH_LINUX_HEAP -- memeda
- ★★☆☆☆ 2015 blog Linux_x86漏洞利用系列教程 -- sploitfun
- 2016 survey 云计算环境安全综述 -- 张玉清
- 2017 report X41_Browser_Security_White_Paper -- Markus Vervier
- 2017 report Cure53_Browser_Security_White_Paper -- Dr.-Ing. Mario Heiderich
- 2018 slides Reversing_Vulnerability_Research_of_Ethereum_Smart_Contracts -- Patrick Ventuzelo
- ★★★☆☆ 2019 blog The_Beginners_Guide_to_IDAPython -- Alexander Hanel
- 2019 slides Bug_Hunting_in_Synology_NAS -- Qian Chen
- 2020 report 全球高级持续性威胁(APT)2019年报告 -- 奇安信