Files
TripleCross/docs/document.bbl

2002 lines
75 KiB
Plaintext
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
% $ biblatex auxiliary file $
% $ biblatex bbl format version 3.1 $
% Do not modify the above lines!
%
% This is an auxiliary file used by the 'biblatex' package.
% This file may safely be deleted. It will be recreated by
% biber as required.
%
\begingroup
\makeatletter
\@ifundefined{ver@biblatex.sty}
{\@latex@error
{Missing 'biblatex' package}
{The bibliography requires the 'biblatex' package.}
\aftergroup\endinput}
{}
\endgroup
\refsection{0}
\datalist[entry]{none/global//global/global}
\entry{ransomware_pwc}{report}{}
\list{institution}{1}{%
{PricewaterhouseCoopers}%
}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{Cyber Threats 2021: A year in Retrospect}
\verb{urlraw}
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
\endverb
\verb{url}
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
\endverb
\endentry
\entry{rootkit_ptsecurity}{report}{}
\list{institution}{1}{%
{Positive Technologies}%
}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{day}{3}
\field{month}{11}
\field{title}{Rootkits: evolution and detection methods}
\field{year}{2021}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/
\endverb
\verb{url}
\verb https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/
\endverb
\endentry
\entry{ebpf_linux318}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{day}{7}
\field{indextitle}{eBPF incorporation in the Linux Kernel 3.18}
\field{month}{12}
\field{year}{2014}
\field{dateera}{ce}
\verb{urlraw}
\verb https://kernelnewbies.org/Linux_3.18
\endverb
\verb{url}
\verb https://kernelnewbies.org/Linux_3.18
\endverb
\endentry
\entry{bvp47_report}{report}{}
\list{institution}{1}{%
{Pangu Lab}%
}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{day}{23}
\field{month}{2}
\field{title}{Bvp47 Top-tier Backdoor of US NSA Equation Group}
\field{year}{2022}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
\endverb
\verb{url}
\verb https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
\endverb
\endentry
\entry{bpfdoor_pwc}{report}{}
\list{institution}{1}{%
{PricewaterhouseCoopers}%
}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{Cyber Threats 2021: A year in Retrospect}
\field{pages}{37}
\range{pages}{1}
\verb{urlraw}
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
\endverb
\verb{url}
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
\endverb
\endentry
\entry{ebpf_windows}{online}{}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labeltitlesource}{title}
\field{day}{7}
\field{month}{12}
\field{title}{eBPF incorporation in the Linux Kernel 3.18}
\field{year}{2014}
\field{dateera}{ce}
\verb{urlraw}
\verb https://kernelnewbies.org/Linux_3.18
\endverb
\verb{url}
\verb https://kernelnewbies.org/Linux_3.18
\endverb
\endentry
\entry{ebpf_android}{online}{}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labeltitlesource}{title}
\field{title}{eBPF for Windows}
\verb{urlraw}
\verb https://source.android.com/devices/architecture/kernel/bpf
\endverb
\verb{url}
\verb https://source.android.com/devices/architecture/kernel/bpf
\endverb
\endentry
\entry{evil_ebpf}{proceedings}{}
\name{author}{1}{}{%
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
family={Dileo},
familyi={D\bibinitperiod},
given={Jeff},
giveni={J\bibinitperiod}}}%
}
\list{institution}{1}{%
{NCC Group}%
}
\list{organization}{1}{%
{DEFCON 27}%
}
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
\field{extraname}{1}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
\verb{urlraw}
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
\endverb
\verb{url}
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
\endverb
\endentry
\entry{bad_ebpf}{online}{}
\name{author}{1}{}{%
{{hash=53d4d4da0d1a82f58d57d86ba9635f2c}{%
family={Hogan},
familyi={H\bibinitperiod},
given={Pat},
giveni={P\bibinitperiod}}}%
}
\list{organization}{1}{%
{DEFCON 27}%
}
\strng{namehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
\strng{fullhash}{53d4d4da0d1a82f58d57d86ba9635f2c}
\strng{bibnamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
\strng{authorbibnamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
\strng{authornamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
\strng{authorfullhash}{53d4d4da0d1a82f58d57d86ba9635f2c}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{eventtitle}{Bad BPF - Warping reality using eBPF}
\verb{urlraw}
\verb https://www.youtube.com/watch?v=g6SKWT7sROQ
\endverb
\verb{url}
\verb https://www.youtube.com/watch?v=g6SKWT7sROQ
\endverb
\endentry
\entry{ebpf_friends}{proceedings}{}
\name{author}{1}{}{%
{{hash=2994fc802c0b46f7289cf001e2c26cfe}{%
family={Guillaume\bibnamedelima Fournier},
familyi={G\bibinitperiod\bibinitdelim F\bibinitperiod},
given={Sylvain\bibnamedelima Afchainthe},
giveni={S\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
}
\list{institution}{1}{%
{Datadog}%
}
\list{organization}{1}{%
{DEFCON 29}%
}
\strng{namehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{fullhash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{bibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{authorbibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{authornamehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{authorfullhash}{2994fc802c0b46f7289cf001e2c26cfe}
\field{extraname}{1}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{eventtitle}{Cyber Threats 2021: A year in Retrospect}
\verb{urlraw}
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
\endverb
\verb{url}
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
\endverb
\endentry
\entry{ebpf_io}{manual}{}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labeltitlesource}{title}
\field{title}{eBPF Documentation}
\verb{urlraw}
\verb https://ebpf.io/what-is-ebpf/
\endverb
\verb{url}
\verb https://ebpf.io/what-is-ebpf/
\endverb
\endentry
\entry{bpf_bsd_origin}{article}{}
\name{author}{1}{}{%
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
family={Steven\bibnamedelima McCanne},
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
given={Van\bibnamedelima Jacobson},
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Lawrence Berkeley Laboratory}%
}
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
\field{extraname}{1}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{12}
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
\field{year}{1992}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\verb{url}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\endentry
\entry{ebpf_history_opensource}{online}{}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labeltitlesource}{title}
\field{day}{11}
\field{month}{8}
\field{title}{An intro to using eBPF to filter packets in the Linux kernel}
\field{year}{2017}
\field{dateera}{ce}
\verb{urlraw}
\verb https://opensource.com/article/17/9/intro-ebpf
\endverb
\verb{url}
\verb https://opensource.com/article/17/9/intro-ebpf
\endverb
\endentry
\entry{bpf_bsd_origin_bpf_page2}{article}{}
\name{author}{1}{}{%
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
family={Steven\bibnamedelima McCanne},
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
given={Van\bibnamedelima Jacobson},
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Lawrence Berkeley Laboratory}%
}
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
\field{extraname}{2}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{12}
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
\field{year}{1992}
\field{dateera}{ce}
\field{pages}{1}
\range{pages}{1}
\verb{urlraw}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\verb{url}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\endentry
\entry{bpf_bsd_origin_bpf_page1}{article}{}
\name{author}{1}{}{%
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
family={Steven\bibnamedelima McCanne},
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
given={Van\bibnamedelima Jacobson},
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Lawrence Berkeley Laboratory}%
}
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
\field{extraname}{3}
\field{sortinit}{2}
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{12}
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
\field{year}{1992}
\field{dateera}{ce}
\field{pages}{1}
\range{pages}{1}
\verb{urlraw}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\verb{url}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\endentry
\entry{index_register}{manual}{}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labeltitlesource}{title}
\field{title}{Index register}
\verb{urlraw}
\verb https://gunkies.org/wiki/Index_register
\endverb
\verb{url}
\verb https://gunkies.org/wiki/Index_register
\endverb
\endentry
\entry{bpf_bsd_origin_bpf_page5}{article}{}
\name{author}{1}{}{%
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
family={Steven\bibnamedelima McCanne},
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
given={Van\bibnamedelima Jacobson},
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Lawrence Berkeley Laboratory}%
}
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
\field{extraname}{4}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{12}
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
\field{year}{1992}
\field{dateera}{ce}
\field{pages}{5}
\range{pages}{1}
\verb{urlraw}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\verb{url}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\endentry
\entry{bpf_organicprogrammer_analysis}{online}{}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labeltitlesource}{title}
\field{day}{28}
\field{month}{3}
\field{title}{Write a Linux packet sniffer from scratch: part two- BPF}
\field{year}{2022}
\field{dateera}{ce}
\verb{urlraw}
\verb https://organicprogrammer.com/2022/03/28/how-to-implement-libpcap-on-linux-with-raw-socket-part2/
\endverb
\verb{url}
\verb https://organicprogrammer.com/2022/03/28/how-to-implement-libpcap-on-linux-with-raw-socket-part2/
\endverb
\endentry
\entry{bpf_bsd_origin_bpf_page8}{article}{}
\name{author}{1}{}{%
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
family={Steven\bibnamedelima McCanne},
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
given={Van\bibnamedelima Jacobson},
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Lawrence Berkeley Laboratory}%
}
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
\field{extraname}{5}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{12}
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
\field{year}{1992}
\field{dateera}{ce}
\field{pages}{8}
\range{pages}{1}
\verb{urlraw}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\verb{url}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\endentry
\entry{bpf_bsd_origin_bpf_page7}{article}{}
\name{author}{1}{}{%
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
family={Steven\bibnamedelima McCanne},
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
given={Van\bibnamedelima Jacobson},
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Lawrence Berkeley Laboratory}%
}
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
\field{extraname}{6}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{12}
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
\field{year}{1992}
\field{dateera}{ce}
\field{pages}{7}
\range{pages}{1}
\verb{urlraw}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\verb{url}
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
\endverb
\endentry
\entry{tcpdump_page}{manual}{}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labeltitlesource}{title}
\field{title}{Tcpdump and Libpcap}
\verb{urlraw}
\verb https://www.tcpdump.org
\endverb
\verb{url}
\verb https://www.tcpdump.org
\endverb
\endentry
\entry{ebpf_funcs_by_ver}{manual}{}
\list{organization}{1}{%
{iovisor}%
}
\field{sortinit}{3}
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
\field{labeltitlesource}{title}
\field{title}{BPF features by Linux Kernel Version}
\verb{urlraw}
\verb https://github.com/iovisor/bcc/blob/master/docs/kernel-versions.md
\endverb
\verb{url}
\verb https://github.com/iovisor/bcc/blob/master/docs/kernel-versions.md
\endverb
\endentry
\entry{brendan_gregg_bpf_book}{book}{}
\name{author}{1}{}{%
{{hash=b45aef384111d7e9dd71b74ba427b5f1}{%
family={Gregg},
familyi={G\bibinitperiod},
given={Brendan},
giveni={B\bibinitperiod}}}%
}
\strng{namehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{fullhash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{bibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{authorbibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{authornamehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{authorfullhash}{b45aef384111d7e9dd71b74ba427b5f1}
\field{extraname}{1}
\field{sortinit}{4}
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{BPF performance tools}
\verb{urlraw}
\verb https://www.oreilly.com/library/view/bpf-performance-tools/9780136588870/
\endverb
\verb{url}
\verb https://www.oreilly.com/library/view/bpf-performance-tools/9780136588870/
\endverb
\endentry
\entry{ebpf_io_arch}{manual}{}
\field{sortinit}{4}
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{title}{eBPF Documentation: Loader and verification architecture}
\verb{urlraw}
\verb https://ebpf.io/what-is-ebpf/#loader--verification-architecture
\endverb
\verb{url}
\verb https://ebpf.io/what-is-ebpf/#loader--verification-architecture
\endverb
\endentry
\entry{ebpf_inst_set}{manual}{}
\field{sortinit}{4}
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{title}{eBPF instruction set}
\verb{urlraw}
\verb https://www.kernel.org/doc/html/latest/bpf/instruction-set.html
\endverb
\verb{url}
\verb https://www.kernel.org/doc/html/latest/bpf/instruction-set.html
\endverb
\endentry
\entry{8664_inst_set_specs}{manual}{}
\name{author}{1}{}{%
{{hash=ff97a9fdede09eaf6e1c8ec9f6a61dd5}{%
family={Intel},
familyi={I\bibinitperiod}}}%
}
\strng{namehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
\strng{fullhash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
\strng{bibnamehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
\strng{authorbibnamehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
\strng{authornamehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
\strng{authorfullhash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
\field{sortinit}{4}
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Intel® 64 and IA-32 Architectures Software Developers Manual Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D, and 4}
\field{urlday}{13}
\field{urlmonth}{5}
\field{urlyear}{2022}
\field{volume}{2A}
\field{urldateera}{ce}
\field{pages}{507}
\range{pages}{1}
\verb{urlraw}
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html
\endverb
\verb{url}
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html
\endverb
\endentry
\entry{ebpf_starovo_slides}{proceedings}{}
\list{institution}{1}{%
{PLUMgrid}%
}
\field{sortinit}{4}
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
\field{labeltitlesource}{title}
\field{day}{20}
\field{month}{2}
\field{title}{BPF in-kernel virtual machine}
\field{year}{2015}
\field{dateera}{ce}
\verb{urlraw}
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
\endverb
\verb{url}
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
\endverb
\endentry
\entry{ebpf_JIT}{manual}{}
\name{author}{1}{}{%
{{hash=729670cd9d39b9b575390147a29d51d7}{%
family={Corbet},
familyi={C\bibinitperiod},
given={Jonathan},
giveni={J\bibinitperiod}}}%
}
\strng{namehash}{729670cd9d39b9b575390147a29d51d7}
\strng{fullhash}{729670cd9d39b9b575390147a29d51d7}
\strng{bibnamehash}{729670cd9d39b9b575390147a29d51d7}
\strng{authorbibnamehash}{729670cd9d39b9b575390147a29d51d7}
\strng{authornamehash}{729670cd9d39b9b575390147a29d51d7}
\strng{authorfullhash}{729670cd9d39b9b575390147a29d51d7}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{12}
\field{month}{4}
\field{title}{A JIT for packet filters}
\field{year}{2011}
\field{dateera}{ce}
\verb{urlraw}
\verb https://lwn.net/Articles/437981/
\endverb
\verb{url}
\verb https://lwn.net/Articles/437981/
\endverb
\endentry
\entry{ebpf_JIT_demystify_page13}{proceedings}{}
\name{author}{1}{}{%
{{hash=0fcaa32b080db12cbc8b11b27d05ad61}{%
family={Wang},
familyi={W\bibinitperiod},
given={Jiong},
giveni={J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Netronome}%
}
\strng{namehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{fullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{bibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authorbibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authornamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authorfullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
\field{extraname}{1}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{11}
\field{month}{9}
\field{title}{Demystify eBPF JIT Compiler}
\field{year}{2018}
\field{dateera}{ce}
\field{pages}{13}
\range{pages}{1}
\verb{urlraw}
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
\endverb
\verb{url}
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
\endverb
\endentry
\entry{ebpf_JIT_demystify_page14}{proceedings}{}
\name{author}{1}{}{%
{{hash=0fcaa32b080db12cbc8b11b27d05ad61}{%
family={Wang},
familyi={W\bibinitperiod},
given={Jiong},
giveni={J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Netronome}%
}
\strng{namehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{fullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{bibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authorbibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authornamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authorfullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
\field{extraname}{2}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{11}
\field{month}{9}
\field{title}{Demystify eBPF JIT Compiler}
\field{year}{2018}
\field{dateera}{ce}
\field{pages}{14}
\range{pages}{1}
\verb{urlraw}
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
\endverb
\verb{url}
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
\endverb
\endentry
\entry{jit_enable_setting}{manual}{}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labeltitlesource}{title}
\field{title}{bpf\_jit\_enable}
\verb{urlraw}
\verb https://sysctl-explorer.net/net/core/bpf_jit_enable/
\endverb
\verb{url}
\verb https://sysctl-explorer.net/net/core/bpf_jit_enable/
\endverb
\endentry
\entry{ebpf_starovo_slides_page23}{proceedings}{}
\list{institution}{1}{%
{PLUMgrid}%
}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labeltitlesource}{title}
\field{day}{20}
\field{month}{2}
\field{title}{BPF in-kernel virtual machine}
\field{year}{2015}
\field{dateera}{ce}
\field{pages}{23}
\range{pages}{1}
\verb{urlraw}
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
\endverb
\verb{url}
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
\endverb
\endentry
\entry{brendan_gregg_bpf_book_bpf_vm}{book}{}
\name{author}{1}{}{%
{{hash=b45aef384111d7e9dd71b74ba427b5f1}{%
family={Gregg},
familyi={G\bibinitperiod},
given={Brendan},
giveni={B\bibinitperiod}}}%
}
\strng{namehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{fullhash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{bibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{authorbibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{authornamehash}{b45aef384111d7e9dd71b74ba427b5f1}
\strng{authorfullhash}{b45aef384111d7e9dd71b74ba427b5f1}
\field{extraname}{2}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{BPF performance tools}
\verb{urlraw}
\verb https://learning.oreilly.com/library/view/bpf-performance-tools/9780136588870/ch02.xhtml#:-:text=With%20JIT%20compiled%20code%2C%20i,%20other%20native%20kernel%20code
\endverb
\verb{url}
\verb https://learning.oreilly.com/library/view/bpf-performance-tools/9780136588870/ch02.xhtml#:-:text=With%20JIT%20compiled%20code%2C%20i,%20other%20native%20kernel%20code
\endverb
\endentry
\entry{ebpf_verifier_kerneldocs}{manual}{}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labeltitlesource}{title}
\field{title}{eBPF verifier}
\verb{urlraw}
\verb https://kernel.org/doc/html/latest/bpf/verifier.html
\endverb
\verb{url}
\verb https://kernel.org/doc/html/latest/bpf/verifier.html
\endverb
\endentry
\entry{ebpf_JIT_demystify_page17-22}{proceedings}{}
\name{author}{1}{}{%
{{hash=0fcaa32b080db12cbc8b11b27d05ad61}{%
family={Wang},
familyi={W\bibinitperiod},
given={Jiong},
giveni={J\bibinitperiod}}}%
}
\list{institution}{1}{%
{Netronome}%
}
\strng{namehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{fullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{bibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authorbibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authornamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
\strng{authorfullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
\field{extraname}{3}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{11}
\field{month}{9}
\field{title}{Demystify eBPF JIT Compiler}
\field{year}{2018}
\field{dateera}{ce}
\field{pages}{17\bibrangedash 22}
\range{pages}{6}
\verb{urlraw}
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
\endverb
\verb{url}
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
\endverb
\endentry
\entry{ebpf_bounded_loops}{online}{}
\name{author}{1}{}{%
{{hash=eb58c5db0dc3d52508c642eba949ed28}{%
family={Rybczynska},
familyi={R\bibinitperiod},
given={Marta},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{eb58c5db0dc3d52508c642eba949ed28}
\strng{fullhash}{eb58c5db0dc3d52508c642eba949ed28}
\strng{bibnamehash}{eb58c5db0dc3d52508c642eba949ed28}
\strng{authorbibnamehash}{eb58c5db0dc3d52508c642eba949ed28}
\strng{authornamehash}{eb58c5db0dc3d52508c642eba949ed28}
\strng{authorfullhash}{eb58c5db0dc3d52508c642eba949ed28}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{30}
\field{month}{6}
\field{title}{Bounded loops in BPF for the 5.3 kernel}
\field{year}{2019}
\field{dateera}{ce}
\verb{urlraw}
\verb https://lwn.net/Articles/794934/
\endverb
\verb{url}
\verb https://lwn.net/Articles/794934/
\endverb
\endentry
\entry{ebpf_maps_kernel}{manual}{}
\field{sortinit}{5}
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
\field{labeltitlesource}{title}
\field{title}{eBPF maps}
\verb{urlraw}
\verb https://www.kernel.org/doc/html/latest/bpf/maps.html
\endverb
\verb{url}
\verb https://www.kernel.org/doc/html/latest/bpf/maps.html
\endverb
\endentry
\entry{bpf_syscall}{manual}{}
\field{sortinit}{6}
\field{sortinithash}{7851c86048328b027313775d8fbd2131}
\field{labeltitlesource}{title}
\field{title}{bpf(2)- Linux manual page}
\verb{urlraw}
\verb https://man7.org/linux/man-pages/man2/bpf.2.html
\endverb
\verb{url}
\verb https://man7.org/linux/man-pages/man2/bpf.2.html
\endverb
\endentry
\entry{ebpf_helpers}{manual}{}
\field{sortinit}{6}
\field{sortinithash}{7851c86048328b027313775d8fbd2131}
\field{labeltitlesource}{title}
\field{title}{bpf-helpers(7)- Linux manual page}
\verb{urlraw}
\verb https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
\endverb
\verb{url}
\verb https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
\endverb
\endentry
\entry{xdp_gentle_intro}{online}{}
\name{author}{1}{}{%
{{hash=78dcb92591468323e355b4f87108649d}{%
family={Lavie},
familyi={L\bibinitperiod},
given={Daniel},
giveni={D\bibinitperiod}}}%
}
\strng{namehash}{78dcb92591468323e355b4f87108649d}
\strng{fullhash}{78dcb92591468323e355b4f87108649d}
\strng{bibnamehash}{78dcb92591468323e355b4f87108649d}
\strng{authorbibnamehash}{78dcb92591468323e355b4f87108649d}
\strng{authornamehash}{78dcb92591468323e355b4f87108649d}
\strng{authorfullhash}{78dcb92591468323e355b4f87108649d}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{3}
\field{month}{2}
\field{title}{A Gentle Introduction to XDP}
\field{year}{2022}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.seekret.io/blog/a-gentle-introduction-to-xdp/
\endverb
\verb{url}
\verb https://www.seekret.io/blog/a-gentle-introduction-to-xdp/
\endverb
\endentry
\entry{xdp_manual}{manual}{}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labeltitlesource}{title}
\field{title}{XDP actions}
\verb{urlraw}
\verb https://prototype-kernel.readthedocs.io/en/latest/networking/XDP/implementation/xdp_actions.html
\endverb
\verb{url}
\verb https://prototype-kernel.readthedocs.io/en/latest/networking/XDP/implementation/xdp_actions.html
\endverb
\endentry
\entry{tc_differences}{online}{}
\name{author}{1}{}{%
{{hash=5442e761747b6fce78f695385639556e}{%
family={Hangbin},
familyi={H\bibinitperiod}}}%
}
\strng{namehash}{5442e761747b6fce78f695385639556e}
\strng{fullhash}{5442e761747b6fce78f695385639556e}
\strng{bibnamehash}{5442e761747b6fce78f695385639556e}
\strng{authorbibnamehash}{5442e761747b6fce78f695385639556e}
\strng{authornamehash}{5442e761747b6fce78f695385639556e}
\strng{authorfullhash}{5442e761747b6fce78f695385639556e}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{13}
\field{month}{3}
\field{title}{tc/BPF and XDP/BPF}
\field{year}{2019}
\field{dateera}{ce}
\verb{urlraw}
\verb https://liuhangbin.netlify.app/post/ebpf-and-xdp/
\endverb
\verb{url}
\verb https://liuhangbin.netlify.app/post/ebpf-and-xdp/
\endverb
\endentry
\entry{tc_docs_complete}{online}{}
\name{author}{1}{}{%
{{hash=6f963077bb5e5f5e471047d2f4a2e4e7}{%
family={Brown},
familyi={B\bibinitperiod},
given={Martin\bibnamedelima A.},
giveni={M\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
}
\strng{namehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
\strng{fullhash}{6f963077bb5e5f5e471047d2f4a2e4e7}
\strng{bibnamehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
\strng{authorbibnamehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
\strng{authornamehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
\strng{authorfullhash}{6f963077bb5e5f5e471047d2f4a2e4e7}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{1}
\field{month}{10}
\field{title}{Traffic Control HOWTO}
\field{year}{2006}
\field{dateera}{ce}
\verb{urlraw}
\verb http://linux-ip.net/articles/Traffic-Control-HOWTO/
\endverb
\verb{url}
\verb http://linux-ip.net/articles/Traffic-Control-HOWTO/
\endverb
\endentry
\entry{tc_direct_action}{online}{}
\name{author}{1}{}{%
{{hash=d3c24514dc6326a55dee93eaf9976d63}{%
family={Monnet},
familyi={M\bibinitperiod},
given={Quentin},
giveni={Q\bibinitperiod}}}%
}
\strng{namehash}{d3c24514dc6326a55dee93eaf9976d63}
\strng{fullhash}{d3c24514dc6326a55dee93eaf9976d63}
\strng{bibnamehash}{d3c24514dc6326a55dee93eaf9976d63}
\strng{authorbibnamehash}{d3c24514dc6326a55dee93eaf9976d63}
\strng{authornamehash}{d3c24514dc6326a55dee93eaf9976d63}
\strng{authorfullhash}{d3c24514dc6326a55dee93eaf9976d63}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{11}
\field{month}{4}
\field{title}{Understanding tc “direct action” mode for BPF}
\field{year}{2020}
\field{dateera}{ce}
\verb{urlraw}
\verb https://qmonnet.github.io/whirl-offload/2020/04/11/tc-bpf-direct-action/
\endverb
\verb{url}
\verb https://qmonnet.github.io/whirl-offload/2020/04/11/tc-bpf-direct-action/
\endverb
\endentry
\entry{tc_ret_list_complete}{online}{}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labeltitlesource}{title}
\field{indextitle}{index : kernel/git/torvalds/linux.git}
\field{title}{Linux kernel source tree}
\verb{urlraw}
\verb https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/include/uapi/linux/pkt_cls.h
\endverb
\verb{url}
\verb https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/include/uapi/linux/pkt_cls.h
\endverb
\endentry
\entry{tp_kernel}{manual}{}
\name{author}{1}{}{%
{{hash=5233bec95aa14fa3942f60f8fc369f5a}{%
family={Desnoyers},
familyi={D\bibinitperiod},
given={Mathieu},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{5233bec95aa14fa3942f60f8fc369f5a}
\strng{fullhash}{5233bec95aa14fa3942f60f8fc369f5a}
\strng{bibnamehash}{5233bec95aa14fa3942f60f8fc369f5a}
\strng{authorbibnamehash}{5233bec95aa14fa3942f60f8fc369f5a}
\strng{authornamehash}{5233bec95aa14fa3942f60f8fc369f5a}
\strng{authorfullhash}{5233bec95aa14fa3942f60f8fc369f5a}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Using the Linux Kernel Tracepoints}
\verb{urlraw}
\verb https://www.kernel.org/doc/html/latest/trace/tracepoints.html
\endverb
\verb{url}
\verb https://www.kernel.org/doc/html/latest/trace/tracepoints.html
\endverb
\endentry
\entry{kprobe_manual}{manual}{}
\name{author}{1}{}{%
{{hash=2cc2b9c9c507513d2985e72f46781aec}{%
family={Jim\bibnamedelima Keniston},
familyi={J\bibinitperiod\bibinitdelim K\bibinitperiod},
given={Masami\bibnamedelima Hiramatsu},
giveni={M\bibinitperiod\bibinitdelim H\bibinitperiod},
suffix={Prasanna\bibnamedelimb S\bibnamedelima Panchamukhi},
suffixi={P\bibinitperiod\bibinitdelim S\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
}
\strng{namehash}{2cc2b9c9c507513d2985e72f46781aec}
\strng{fullhash}{2cc2b9c9c507513d2985e72f46781aec}
\strng{bibnamehash}{2cc2b9c9c507513d2985e72f46781aec}
\strng{authorbibnamehash}{2cc2b9c9c507513d2985e72f46781aec}
\strng{authornamehash}{2cc2b9c9c507513d2985e72f46781aec}
\strng{authorfullhash}{2cc2b9c9c507513d2985e72f46781aec}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Kernel Probes (Kprobes)}
\verb{urlraw}
\verb https://www.kernel.org/doc/html/latest/trace/kprobes.html
\endverb
\verb{url}
\verb https://www.kernel.org/doc/html/latest/trace/kprobes.html
\endverb
\endentry
\entry{kallsyms_kernel}{online}{}
\name{author}{1}{}{%
{{hash=d92b805bd53ec71a9ed691daf3c00fcc}{%
family={Alcock},
familyi={A\bibinitperiod},
given={Nick},
giveni={N\bibinitperiod}}}%
}
\strng{namehash}{d92b805bd53ec71a9ed691daf3c00fcc}
\strng{fullhash}{d92b805bd53ec71a9ed691daf3c00fcc}
\strng{bibnamehash}{d92b805bd53ec71a9ed691daf3c00fcc}
\strng{authorbibnamehash}{d92b805bd53ec71a9ed691daf3c00fcc}
\strng{authornamehash}{d92b805bd53ec71a9ed691daf3c00fcc}
\strng{authorfullhash}{d92b805bd53ec71a9ed691daf3c00fcc}
\field{sortinit}{7}
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{6}
\field{month}{6}
\field{title}{kallsyms: new /proc/kallmodsyms with builtin modules and symbol sizes}
\field{year}{2021}
\field{dateera}{ce}
\verb{urlraw}
\verb https://lwn.net/Articles/862021/
\endverb
\verb{url}
\verb https://lwn.net/Articles/862021/
\endverb
\endentry
\entry{bcc_github}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{BPF Compiler Collection (BCC)}
\verb{urlraw}
\verb https://github.com/iovisor/bcc
\endverb
\verb{url}
\verb https://github.com/iovisor/bcc
\endverb
\endentry
\entry{libbpf_github}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{indextitle}{libbpf GitHub}
\verb{urlraw}
\verb https://github.com/libbpf/libbpf
\endverb
\verb{url}
\verb https://github.com/libbpf/libbpf
\endverb
\endentry
\entry{libbpf_upstream}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{BPF next kernel tree}
\verb{urlraw}
\verb https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next
\endverb
\verb{url}
\verb https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next
\endverb
\endentry
\entry{libbpf_core}{online}{}
\name{author}{1}{}{%
{{hash=c1dd9d38edae2e25017305f57983936e}{%
family={Nakryiko},
familyi={N\bibinitperiod},
given={Andrii},
giveni={A\bibinitperiod}}}%
}
\strng{namehash}{c1dd9d38edae2e25017305f57983936e}
\strng{fullhash}{c1dd9d38edae2e25017305f57983936e}
\strng{bibnamehash}{c1dd9d38edae2e25017305f57983936e}
\strng{authorbibnamehash}{c1dd9d38edae2e25017305f57983936e}
\strng{authornamehash}{c1dd9d38edae2e25017305f57983936e}
\strng{authorfullhash}{c1dd9d38edae2e25017305f57983936e}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{2}
\field{title}{BPF Portability and CO-RE}
\field{year}{2020}
\field{dateera}{ce}
\verb{urlraw}
\verb https://facebookmicrosites.github.io/bpf/blog/2020/02/19/bpf-portability-and-co-re.html
\endverb
\verb{url}
\verb https://facebookmicrosites.github.io/bpf/blog/2020/02/19/bpf-portability-and-co-re.html
\endverb
\endentry
\entry{ubuntu_caps}{manual}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{capabilities - overview of Linux capabilities}
\verb{urlraw}
\verb http://manpages.ubuntu.com/manpages/trusty/man7/capabilities.7.html
\endverb
\verb{url}
\verb http://manpages.ubuntu.com/manpages/trusty/man7/capabilities.7.html
\endverb
\endentry
\entry{evil_ebpf_p9}{proceedings}{}
\name{author}{1}{}{%
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
family={Dileo},
familyi={D\bibinitperiod},
given={Jeff},
giveni={J\bibinitperiod}}}%
}
\list{institution}{1}{%
{NCC Group}%
}
\list{organization}{1}{%
{DEFCON 27}%
}
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
\field{extraname}{2}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labelnamesource}{author}
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
\field{pages}{9}
\range{pages}{1}
\verb{urlraw}
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
\endverb
\verb{url}
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
\endverb
\endentry
\entry{ebpf_caps_intro}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{[PATCH v7 bpf-next 1/3] bpf, capability: Introduce CAP\_BPF}
\verb{urlraw}
\verb https://lore.kernel.org/bpf/20200513230355.7858-2-alexei.starovoitov@gmail.com/
\endverb
\verb{url}
\verb https://lore.kernel.org/bpf/20200513230355.7858-2-alexei.starovoitov@gmail.com/
\endverb
\endentry
\entry{ebpf_caps_lwn}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{capability: introduce CAP\_BPF and CAP\_TRACING}
\verb{urlraw}
\verb https://lwn.net/Articles/797807/
\endverb
\verb{url}
\verb https://lwn.net/Articles/797807/
\endverb
\endentry
\entry{unprivileged_ebpf}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{Reconsidering unprivileged BPF}
\verb{urlraw}
\verb https://lwn.net/Articles/796328/
\endverb
\verb{url}
\verb https://lwn.net/Articles/796328/
\endverb
\endentry
\entry{cve_unpriv_ebpf}{online}{}
\field{sortinit}{8}
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
\field{labeltitlesource}{title}
\field{title}{CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability}
\verb{urlraw}
\verb https://www.openwall.com/lists/oss-security/2022/01/11/4
\endverb
\verb{url}
\verb https://www.openwall.com/lists/oss-security/2022/01/11/4
\endverb
\endentry
\entry{unpriv_ebpf_ubuntu}{online}{}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labeltitlesource}{title}
\field{title}{Unprivileged eBPF disabled by default for Ubuntu 20.04 LTS, 18.04 LTS, 16.04 ESM}
\verb{urlraw}
\verb https://discourse.ubuntu.com/t/unprivileged-ebpf-disabled-by-default-for-ubuntu-20-04-lts-18-04-lts-16-04-esm/27047
\endverb
\verb{url}
\verb https://discourse.ubuntu.com/t/unprivileged-ebpf-disabled-by-default-for-ubuntu-20-04-lts-18-04-lts-16-04-esm/27047
\endverb
\endentry
\entry{unpriv_ebpf_suse}{online}{}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labeltitlesource}{title}
\field{title}{Security Hardening: Use of eBPF by unprivileged users has been disabled by default}
\verb{urlraw}
\verb https://www.suse.com/support/kb/doc/?id=000020545
\endverb
\verb{url}
\verb https://www.suse.com/support/kb/doc/?id=000020545
\endverb
\endentry
\entry{unpriv_ebpf_redhat}{online}{}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labeltitlesource}{title}
\field{title}{CVE-2022-0002}
\verb{urlraw}
\verb https://access.redhat.com/security/cve/cve-2021-4001
\endverb
\verb{url}
\verb https://access.redhat.com/security/cve/cve-2021-4001
\endverb
\endentry
\entry{mem_page_arch}{online}{}
\name{author}{1}{}{%
{{hash=47635127541392c1419dbc4a4d3153c6}{%
family={Lameter},
familyi={L\bibinitperiod},
given={Christopher},
giveni={C\bibinitperiod}}}%
}
\list{institution}{1}{%
{Jump Trading LLC}%
}
\list{organization}{1}{%
{The Linux Foundation Open Source Summit}%
}
\strng{namehash}{47635127541392c1419dbc4a4d3153c6}
\strng{fullhash}{47635127541392c1419dbc4a4d3153c6}
\strng{bibnamehash}{47635127541392c1419dbc4a4d3153c6}
\strng{authorbibnamehash}{47635127541392c1419dbc4a4d3153c6}
\strng{authornamehash}{47635127541392c1419dbc4a4d3153c6}
\strng{authorfullhash}{47635127541392c1419dbc4a4d3153c6}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{1}
\field{month}{12}
\field{title}{Memory Management 101: Introduction to Memory Management in Linux}
\field{year}{2017}
\field{dateera}{ce}
\verb{urlraw}
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
\endverb
\verb{url}
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
\endverb
\endentry
\entry{page_faults}{online}{}
\name{author}{1}{}{%
{{hash=28efc25c8eae7f3d05fad64c4679158f}{%
family={Breaker},
familyi={B\bibinitperiod},
given={Doug},
giveni={D\bibinitperiod}}}%
}
\strng{namehash}{28efc25c8eae7f3d05fad64c4679158f}
\strng{fullhash}{28efc25c8eae7f3d05fad64c4679158f}
\strng{bibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
\strng{authorbibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
\strng{authornamehash}{28efc25c8eae7f3d05fad64c4679158f}
\strng{authorfullhash}{28efc25c8eae7f3d05fad64c4679158f}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{8}
\field{title}{Understanding page faults and memory swap-in/outs}
\field{year}{2019}
\field{dateera}{ce}
\verb{urlraw}
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
\endverb
\verb{url}
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
\endverb
\endentry
\entry{mem_arch_proc}{online}{}
\name{author}{1}{}{%
{{hash=c6b49e9e6fbe96fdd89720e842dc0b03}{%
family={Bajo},
familyi={B\bibinitperiod},
given={Marcos\bibnamedelima Sánchez},
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
}
\strng{namehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{fullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{bibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{authorbibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{authornamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{authorfullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\field{extraname}{1}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{23}
\field{month}{5}
\field{title}{Stack-based Buffer Overflow - Part 1}
\field{year}{2021}
\field{dateera}{ce}
\verb{urlraw}
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
\endverb
\verb{url}
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
\endverb
\endentry
\entry{8664_params_abi_p18}{manual}{}
\name{author}{1}{}{%
{{hash=871f02558cb7234c22cde24811cf53a7}{%
family={al.},
familyi={a\bibinitperiod},
given={H.J.\bibnamedelimi Lu},
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
prefix={et},
prefixi={e\bibinitperiod}}}%
}
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
\field{extraname}{1}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{28}
\field{month}{1}
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
\field{year}{2018}
\field{dateera}{ce}
\field{pages}{18}
\range{pages}{1}
\verb{urlraw}
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
\endverb
\verb{url}
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
\endverb
\endentry
\entry{rop_prog_finder}{online}{}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labeltitlesource}{title}
\field{title}{ROPgadget Tool}
\verb{urlraw}
\verb https://github.com/JonathanSalwan/ROPgadget
\endverb
\verb{url}
\verb https://github.com/JonathanSalwan/ROPgadget
\endverb
\endentry
\entry{network_layers}{online}{}
\name{author}{1}{}{%
{{hash=ed79ecb3ff4a83522b186b5e3fa37b0d}{%
family={Alienor},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
\strng{fullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
\strng{bibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
\strng{authorbibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
\strng{authornamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
\strng{authorfullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{28}
\field{month}{11}
\field{title}{The Network Layers Explained [with examples]}
\field{year}{2018}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.plixer.com/blog/network-layers-explained/
\endverb
\verb{url}
\verb https://www.plixer.com/blog/network-layers-explained/
\endverb
\endentry
\entry{tcp_reliable}{online}{}
\list{organization}{1}{%
{IBM}%
}
\field{sortinit}{9}
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{4}
\field{title}{Transmission Control Protocol}
\field{year}{2022}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
\endverb
\verb{url}
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
\endverb
\endentry
\entry{tcp_handshake}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{Three-Way Handshake}
\verb{urlraw}
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
\endverb
\verb{url}
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
\endverb
\endentry
\entry{elf}{manual}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{ELF}
\verb{urlraw}
\verb https://wiki.osdev.org/ELF
\endverb
\verb{url}
\verb https://wiki.osdev.org/ELF
\endverb
\endentry
\entry{plt_got_overlord}{online}{}
\name{author}{1}{}{%
{{hash=9724da855997a02e74ee77d11b4d64e2}{%
family={Tomaschik},
familyi={T\bibinitperiod},
given={David},
giveni={D\bibinitperiod}}}%
}
\strng{namehash}{9724da855997a02e74ee77d11b4d64e2}
\strng{fullhash}{9724da855997a02e74ee77d11b4d64e2}
\strng{bibnamehash}{9724da855997a02e74ee77d11b4d64e2}
\strng{authorbibnamehash}{9724da855997a02e74ee77d11b4d64e2}
\strng{authornamehash}{9724da855997a02e74ee77d11b4d64e2}
\strng{authorfullhash}{9724da855997a02e74ee77d11b4d64e2}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{19}
\field{month}{3}
\field{title}{GOT and PLT for pwning.}
\field{year}{2017}
\field{dateera}{ce}
\verb{urlraw}
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
\endverb
\verb{url}
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
\endverb
\endentry
\entry{plt_got_technovelty}{online}{}
\name{author}{1}{}{%
{{hash=4e4902d108d0796e7e54d06a47cfe1ee}{%
family={Wienand},
familyi={W\bibinitperiod},
given={Ian},
giveni={I\bibinitperiod}}}%
}
\strng{namehash}{4e4902d108d0796e7e54d06a47cfe1ee}
\strng{fullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
\strng{bibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
\strng{authorbibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
\strng{authornamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
\strng{authorfullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{11}
\field{month}{5}
\field{title}{PLT and GOT - the key to code sharing and dynamic libraries}
\field{year}{2011}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
\endverb
\verb{url}
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
\endverb
\endentry
\entry{aslr_pie_intro}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{aslr/pie intro}
\verb{urlraw}
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
\endverb
\verb{url}
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
\endverb
\endentry
\entry{relro_redhat}{online}{}
\name{author}{1}{}{%
{{hash=b77619d1671f5a819a9a13e8e0f51723}{%
family={Sidhpurwala},
familyi={S\bibinitperiod},
given={Huzaifa},
giveni={H\bibinitperiod}}}%
}
\strng{namehash}{b77619d1671f5a819a9a13e8e0f51723}
\strng{fullhash}{b77619d1671f5a819a9a13e8e0f51723}
\strng{bibnamehash}{b77619d1671f5a819a9a13e8e0f51723}
\strng{authorbibnamehash}{b77619d1671f5a819a9a13e8e0f51723}
\strng{authornamehash}{b77619d1671f5a819a9a13e8e0f51723}
\strng{authorfullhash}{b77619d1671f5a819a9a13e8e0f51723}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{28}
\field{month}{1}
\field{title}{Hardening ELF binaries using Relocation Read-Only (RELRO)}
\field{year}{2019}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro
\endverb
\verb{url}
\verb https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro
\endverb
\endentry
\entry{cet_windows}{online}{}
\name{author}{1}{}{%
{{hash=3de76fe0797950a06f4be8a7bf380d22}{%
family={Yarden\bibnamedelima Shafir},
familyi={Y\bibinitperiod\bibinitdelim S\bibinitperiod},
given={Alex\bibnamedelima Ionescu},
giveni={A\bibinitperiod\bibinitdelim I\bibinitperiod}}}%
}
\strng{namehash}{3de76fe0797950a06f4be8a7bf380d22}
\strng{fullhash}{3de76fe0797950a06f4be8a7bf380d22}
\strng{bibnamehash}{3de76fe0797950a06f4be8a7bf380d22}
\strng{authorbibnamehash}{3de76fe0797950a06f4be8a7bf380d22}
\strng{authornamehash}{3de76fe0797950a06f4be8a7bf380d22}
\strng{authorfullhash}{3de76fe0797950a06f4be8a7bf380d22}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{1}
\field{month}{5}
\field{title}{R.I.P ROP: CET Internals in Windows 20H1}
\field{year}{2020}
\field{dateera}{ce}
\verb{urlraw}
\verb https://windows-internals.com/cet-on-windows/
\endverb
\verb{url}
\verb https://windows-internals.com/cet-on-windows/
\endverb
\endentry
\entry{cet_linux}{online}{}
\name{author}{1}{}{%
{{hash=b51b9464b5589cf5380e3b897d0a43b6}{%
family={Larabel},
familyi={L\bibinitperiod},
given={Michael},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6}
\strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6}
\strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
\strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
\strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6}
\strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{21}
\field{month}{7}
\field{title}{Another Round Of Intel CET Patches, Still Working Toward Linux Kernel Integration}
\field{year}{2021}
\field{dateera}{ce}
\verb{urlraw}
\verb https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29
\endverb
\verb{url}
\verb https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29
\endverb
\endentry
\entry{proc_fs}{manual}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{proc(5) — Linux manual page}
\verb{urlraw}
\verb https://man7.org/linux/man-pages/man5/proc.5.html
\endverb
\verb{url}
\verb https://man7.org/linux/man-pages/man5/proc.5.html
\endverb
\endentry
\entry{proc_mem_write}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{enable writing to /proc/pid/mem}
\verb{urlraw}
\verb https://lwn.net/Articles/433326/
\endverb
\verb{url}
\verb https://lwn.net/Articles/433326/
\endverb
\endentry
\entry{8664_params_abi}{manual}{}
\name{author}{1}{}{%
{{hash=871f02558cb7234c22cde24811cf53a7}{%
family={al.},
familyi={a\bibinitperiod},
given={H.J.\bibnamedelimi Lu},
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
prefix={et},
prefixi={e\bibinitperiod}}}%
}
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
\field{extraname}{2}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{28}
\field{month}{1}
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
\field{year}{2018}
\field{dateera}{ce}
\field{pages}{148}
\range{pages}{1}
\verb{urlraw}
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
\endverb
\verb{url}
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
\endverb
\endentry
\entry{ebpf_friends_p15}{proceedings}{}
\name{author}{1}{}{%
{{hash=2994fc802c0b46f7289cf001e2c26cfe}{%
family={Guillaume\bibnamedelima Fournier},
familyi={G\bibinitperiod\bibinitdelim F\bibinitperiod},
given={Sylvain\bibnamedelima Afchainthe},
giveni={S\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
}
\list{institution}{1}{%
{Datadog}%
}
\list{organization}{1}{%
{DEFCON 29}%
}
\strng{namehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{fullhash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{bibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{authorbibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{authornamehash}{2994fc802c0b46f7289cf001e2c26cfe}
\strng{authorfullhash}{2994fc802c0b46f7289cf001e2c26cfe}
\field{extraname}{2}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{eventtitle}{Cyber Threats 2021: A year in Retrospect}
\field{pages}{15}
\range{pages}{1}
\verb{urlraw}
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
\endverb
\verb{url}
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
\endverb
\endentry
\entry{ebpf_override_return}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{BPF-based error injection for the kernel}
\verb{urlraw}
\verb https://lwn.net/Articles/740146/
\endverb
\verb{url}
\verb https://lwn.net/Articles/740146/
\endverb
\endentry
\entry{code_kernel_open}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{indextitle}{Linux kernel source code}
\verb{urlraw}
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/open.c#L1192
\endverb
\verb{url}
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/open.c#L1192
\endverb
\endentry
\entry{code_kernel_syscall}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{indextitle}{Linux kernel source code}
\verb{urlraw}
\verb https://elixir.bootlin.com/linux/v5.11/source/include/linux/syscalls.h#L233
\endverb
\verb{url}
\verb https://elixir.bootlin.com/linux/v5.11/source/include/linux/syscalls.h#L233
\endverb
\endentry
\entry{fault_injection}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{day}{4}
\field{month}{11}
\field{title}{Injecting faults into the kernel}
\field{year}{2006}
\field{dateera}{ce}
\verb{urlraw}
\verb https://lwn.net/Articles/209257/
\endverb
\verb{url}
\verb https://lwn.net/Articles/209257/
\endverb
\endentry
\entry{write_helper_non_fault}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{probe\_write\_common\_error}
\verb{urlraw}
\verb https://www.spinics.net/lists/bpf/msg16795.html
\endverb
\verb{url}
\verb https://www.spinics.net/lists/bpf/msg16795.html
\endverb
\endentry
\entry{code_vfs_read}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{indextitle}{Linux kernel source code}
\verb{urlraw}
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/read_write.c#L476
\endverb
\verb{url}
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/read_write.c#L476
\endverb
\endentry
\entry{evil_ebpf_p6974}{proceedings}{}
\name{author}{1}{}{%
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
family={Dileo},
familyi={D\bibinitperiod},
given={Jeff},
giveni={J\bibinitperiod}}}%
}
\list{institution}{1}{%
{NCC Group}%
}
\list{organization}{1}{%
{DEFCON 27}%
}
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
\field{extraname}{3}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
\field{pages}{69\bibrangedash 74}
\range{pages}{6}
\verb{urlraw}
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
\endverb
\verb{url}
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
\endverb
\endentry
\entry{8664_params_abi_p1922}{manual}{}
\name{author}{1}{}{%
{{hash=871f02558cb7234c22cde24811cf53a7}{%
family={al.},
familyi={a\bibinitperiod},
given={H.J.\bibnamedelimi Lu},
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
prefix={et},
prefixi={e\bibinitperiod}}}%
}
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
\field{extraname}{3}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{day}{28}
\field{month}{1}
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
\field{year}{2018}
\field{dateera}{ce}
\field{pages}{19\bibrangedash 22}
\range{pages}{4}
\verb{urlraw}
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
\endverb
\verb{url}
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
\endverb
\endentry
\entry{rawtcp_lib}{online}{}
\name{author}{1}{}{%
{{hash=c6b49e9e6fbe96fdd89720e842dc0b03}{%
family={Bajo},
familyi={B\bibinitperiod},
given={Marcos\bibnamedelima Sánchez},
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
}
\strng{namehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{fullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{bibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{authorbibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{authornamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\strng{authorfullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
\field{extraname}{2}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{RawTCP\_Lib}
\verb{urlraw}
\verb https://github.com/h3xduck/RawTCP_Lib
\endverb
\verb{url}
\verb https://github.com/h3xduck/RawTCP_Lib
\endverb
\endentry
\entry{glibc}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{The GNU C library}
\verb{urlraw}
\verb https://www.gnu.org/software/libc/
\endverb
\verb{url}
\verb https://www.gnu.org/software/libc/
\endverb
\endentry
\entry{canary_exploit}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{Stack Canaries}
\verb{urlraw}
\verb https://ir0nstone.gitbook.io/notes/types/stack/canaries
\endverb
\verb{url}
\verb https://ir0nstone.gitbook.io/notes/types/stack/canaries
\endverb
\endentry
\entry{pie_exploit}{online}{}
\field{sortinit}{1}
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
\field{labeltitlesource}{title}
\field{title}{Position Independent Code}
\verb{urlraw}
\verb https://ir0nstone.gitbook.io/notes/types/stack/pie
\endverb
\verb{url}
\verb https://ir0nstone.gitbook.io/notes/types/stack/pie
\endverb
\endentry
\enddatalist
\endrefsection
\endinput