mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-16 23:33:06 +08:00
2002 lines
75 KiB
Plaintext
2002 lines
75 KiB
Plaintext
% $ biblatex auxiliary file $
|
||
% $ biblatex bbl format version 3.1 $
|
||
% Do not modify the above lines!
|
||
%
|
||
% This is an auxiliary file used by the 'biblatex' package.
|
||
% This file may safely be deleted. It will be recreated by
|
||
% biber as required.
|
||
%
|
||
\begingroup
|
||
\makeatletter
|
||
\@ifundefined{ver@biblatex.sty}
|
||
{\@latex@error
|
||
{Missing 'biblatex' package}
|
||
{The bibliography requires the 'biblatex' package.}
|
||
\aftergroup\endinput}
|
||
{}
|
||
\endgroup
|
||
|
||
|
||
\refsection{0}
|
||
\datalist[entry]{none/global//global/global}
|
||
\entry{ransomware_pwc}{report}{}
|
||
\list{institution}{1}{%
|
||
{PricewaterhouseCoopers}%
|
||
}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Cyber Threats 2021: A year in Retrospect}
|
||
\verb{urlraw}
|
||
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{rootkit_ptsecurity}{report}{}
|
||
\list{institution}{1}{%
|
||
{Positive Technologies}%
|
||
}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{3}
|
||
\field{month}{11}
|
||
\field{title}{Rootkits: evolution and detection methods}
|
||
\field{year}{2021}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.ptsecurity.com/ww-en/analytics/rootkits-evolution-and-detection-methods/
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_linux318}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{day}{7}
|
||
\field{indextitle}{eBPF incorporation in the Linux Kernel 3.18}
|
||
\field{month}{12}
|
||
\field{year}{2014}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://kernelnewbies.org/Linux_3.18
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://kernelnewbies.org/Linux_3.18
|
||
\endverb
|
||
\endentry
|
||
\entry{bvp47_report}{report}{}
|
||
\list{institution}{1}{%
|
||
{Pangu Lab}%
|
||
}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{23}
|
||
\field{month}{2}
|
||
\field{title}{Bvp47 Top-tier Backdoor of US NSA Equation Group}
|
||
\field{year}{2022}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{bpfdoor_pwc}{report}{}
|
||
\list{institution}{1}{%
|
||
{PricewaterhouseCoopers}%
|
||
}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Cyber Threats 2021: A year in Retrospect}
|
||
\field{pages}{37}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_windows}{online}{}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{7}
|
||
\field{month}{12}
|
||
\field{title}{eBPF incorporation in the Linux Kernel 3.18}
|
||
\field{year}{2014}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://kernelnewbies.org/Linux_3.18
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://kernelnewbies.org/Linux_3.18
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_android}{online}{}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{eBPF for Windows}
|
||
\verb{urlraw}
|
||
\verb https://source.android.com/devices/architecture/kernel/bpf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://source.android.com/devices/architecture/kernel/bpf
|
||
\endverb
|
||
\endentry
|
||
\entry{evil_ebpf}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
|
||
family={Dileo},
|
||
familyi={D\bibinitperiod},
|
||
given={Jeff},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{NCC Group}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{DEFCON 27}%
|
||
}
|
||
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labelnamesource}{author}
|
||
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
|
||
\verb{urlraw}
|
||
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{bad_ebpf}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=53d4d4da0d1a82f58d57d86ba9635f2c}{%
|
||
family={Hogan},
|
||
familyi={H\bibinitperiod},
|
||
given={Pat},
|
||
giveni={P\bibinitperiod}}}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{DEFCON 27}%
|
||
}
|
||
\strng{namehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
||
\strng{fullhash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
||
\strng{bibnamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
||
\strng{authorbibnamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
||
\strng{authornamehash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
||
\strng{authorfullhash}{53d4d4da0d1a82f58d57d86ba9635f2c}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labelnamesource}{author}
|
||
\field{eventtitle}{Bad BPF - Warping reality using eBPF}
|
||
\verb{urlraw}
|
||
\verb https://www.youtube.com/watch?v=g6SKWT7sROQ
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.youtube.com/watch?v=g6SKWT7sROQ
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_friends}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=2994fc802c0b46f7289cf001e2c26cfe}{%
|
||
family={Guillaume\bibnamedelima Fournier},
|
||
familyi={G\bibinitperiod\bibinitdelim F\bibinitperiod},
|
||
given={Sylvain\bibnamedelima Afchainthe},
|
||
giveni={S\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Datadog}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{DEFCON 29}%
|
||
}
|
||
\strng{namehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{fullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{bibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{authorbibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{authornamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{authorfullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labelnamesource}{author}
|
||
\field{eventtitle}{Cyber Threats 2021: A year in Retrospect}
|
||
\verb{urlraw}
|
||
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_io}{manual}{}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{eBPF Documentation}
|
||
\verb{urlraw}
|
||
\verb https://ebpf.io/what-is-ebpf/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://ebpf.io/what-is-ebpf/
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_bsd_origin}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
||
family={Steven\bibnamedelima McCanne},
|
||
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
||
given={Van\bibnamedelima Jacobson},
|
||
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Lawrence Berkeley Laboratory}%
|
||
}
|
||
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{12}
|
||
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
||
\field{year}{1992}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_history_opensource}{online}{}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{11}
|
||
\field{month}{8}
|
||
\field{title}{An intro to using eBPF to filter packets in the Linux kernel}
|
||
\field{year}{2017}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://opensource.com/article/17/9/intro-ebpf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://opensource.com/article/17/9/intro-ebpf
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_bsd_origin_bpf_page2}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
||
family={Steven\bibnamedelima McCanne},
|
||
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
||
given={Van\bibnamedelima Jacobson},
|
||
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Lawrence Berkeley Laboratory}%
|
||
}
|
||
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{12}
|
||
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
||
\field{year}{1992}
|
||
\field{dateera}{ce}
|
||
\field{pages}{1}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_bsd_origin_bpf_page1}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
||
family={Steven\bibnamedelima McCanne},
|
||
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
||
given={Van\bibnamedelima Jacobson},
|
||
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Lawrence Berkeley Laboratory}%
|
||
}
|
||
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{2}
|
||
\field{sortinithash}{ed39bb39cf854d5250e95b1c1f94f4ed}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{12}
|
||
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
||
\field{year}{1992}
|
||
\field{dateera}{ce}
|
||
\field{pages}{1}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{index_register}{manual}{}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Index register}
|
||
\verb{urlraw}
|
||
\verb https://gunkies.org/wiki/Index_register
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://gunkies.org/wiki/Index_register
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_bsd_origin_bpf_page5}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
||
family={Steven\bibnamedelima McCanne},
|
||
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
||
given={Van\bibnamedelima Jacobson},
|
||
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Lawrence Berkeley Laboratory}%
|
||
}
|
||
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\field{extraname}{4}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{12}
|
||
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
||
\field{year}{1992}
|
||
\field{dateera}{ce}
|
||
\field{pages}{5}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_organicprogrammer_analysis}{online}{}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{28}
|
||
\field{month}{3}
|
||
\field{title}{Write a Linux packet sniffer from scratch: part two- BPF}
|
||
\field{year}{2022}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://organicprogrammer.com/2022/03/28/how-to-implement-libpcap-on-linux-with-raw-socket-part2/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://organicprogrammer.com/2022/03/28/how-to-implement-libpcap-on-linux-with-raw-socket-part2/
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_bsd_origin_bpf_page8}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
||
family={Steven\bibnamedelima McCanne},
|
||
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
||
given={Van\bibnamedelima Jacobson},
|
||
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Lawrence Berkeley Laboratory}%
|
||
}
|
||
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\field{extraname}{5}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{12}
|
||
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
||
\field{year}{1992}
|
||
\field{dateera}{ce}
|
||
\field{pages}{8}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_bsd_origin_bpf_page7}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b74c2671072cf5a1a1400dc035240dfd}{%
|
||
family={Steven\bibnamedelima McCanne},
|
||
familyi={S\bibinitperiod\bibinitdelim M\bibinitperiod},
|
||
given={Van\bibnamedelima Jacobson},
|
||
giveni={V\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Lawrence Berkeley Laboratory}%
|
||
}
|
||
\strng{namehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{fullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{bibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorbibnamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authornamehash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\strng{authorfullhash}{b74c2671072cf5a1a1400dc035240dfd}
|
||
\field{extraname}{6}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{12}
|
||
\field{title}{The BSD Packet Filter: A New Architecture for User-level Packet Capture}
|
||
\field{year}{1992}
|
||
\field{dateera}{ce}
|
||
\field{pages}{7}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org/papers/bpf-usenix93.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{tcpdump_page}{manual}{}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Tcpdump and Libpcap}
|
||
\verb{urlraw}
|
||
\verb https://www.tcpdump.org
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.tcpdump.org
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_funcs_by_ver}{manual}{}
|
||
\list{organization}{1}{%
|
||
{iovisor}%
|
||
}
|
||
\field{sortinit}{3}
|
||
\field{sortinithash}{a37a8ef248a93c322189792c34fc68c9}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BPF features by Linux Kernel Version}
|
||
\verb{urlraw}
|
||
\verb https://github.com/iovisor/bcc/blob/master/docs/kernel-versions.md
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://github.com/iovisor/bcc/blob/master/docs/kernel-versions.md
|
||
\endverb
|
||
\endentry
|
||
\entry{brendan_gregg_bpf_book}{book}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b45aef384111d7e9dd71b74ba427b5f1}{%
|
||
family={Gregg},
|
||
familyi={G\bibinitperiod},
|
||
given={Brendan},
|
||
giveni={B\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{fullhash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{bibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{authorbibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{authornamehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{authorfullhash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{4}
|
||
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BPF performance tools}
|
||
\verb{urlraw}
|
||
\verb https://www.oreilly.com/library/view/bpf-performance-tools/9780136588870/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.oreilly.com/library/view/bpf-performance-tools/9780136588870/
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_io_arch}{manual}{}
|
||
\field{sortinit}{4}
|
||
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{eBPF Documentation: Loader and verification architecture}
|
||
\verb{urlraw}
|
||
\verb https://ebpf.io/what-is-ebpf/#loader--verification-architecture
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://ebpf.io/what-is-ebpf/#loader--verification-architecture
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_inst_set}{manual}{}
|
||
\field{sortinit}{4}
|
||
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{eBPF instruction set}
|
||
\verb{urlraw}
|
||
\verb https://www.kernel.org/doc/html/latest/bpf/instruction-set.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.kernel.org/doc/html/latest/bpf/instruction-set.html
|
||
\endverb
|
||
\endentry
|
||
\entry{8664_inst_set_specs}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=ff97a9fdede09eaf6e1c8ec9f6a61dd5}{%
|
||
family={Intel},
|
||
familyi={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
|
||
\strng{fullhash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
|
||
\strng{bibnamehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
|
||
\strng{authorbibnamehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
|
||
\strng{authornamehash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
|
||
\strng{authorfullhash}{ff97a9fdede09eaf6e1c8ec9f6a61dd5}
|
||
\field{sortinit}{4}
|
||
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Intel® 64 and IA-32 Architectures Software Developer’s Manual Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D, and 4}
|
||
\field{urlday}{13}
|
||
\field{urlmonth}{5}
|
||
\field{urlyear}{2022}
|
||
\field{volume}{2A}
|
||
\field{urldateera}{ce}
|
||
\field{pages}{507}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/intel-sdm.html
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_starovo_slides}{proceedings}{}
|
||
\list{institution}{1}{%
|
||
{PLUMgrid}%
|
||
}
|
||
\field{sortinit}{4}
|
||
\field{sortinithash}{e071e0bcb44634fab398d68ad04e69f4}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{20}
|
||
\field{month}{2}
|
||
\field{title}{BPF – in-kernel virtual machine}
|
||
\field{year}{2015}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_JIT}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=729670cd9d39b9b575390147a29d51d7}{%
|
||
family={Corbet},
|
||
familyi={C\bibinitperiod},
|
||
given={Jonathan},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{729670cd9d39b9b575390147a29d51d7}
|
||
\strng{fullhash}{729670cd9d39b9b575390147a29d51d7}
|
||
\strng{bibnamehash}{729670cd9d39b9b575390147a29d51d7}
|
||
\strng{authorbibnamehash}{729670cd9d39b9b575390147a29d51d7}
|
||
\strng{authornamehash}{729670cd9d39b9b575390147a29d51d7}
|
||
\strng{authorfullhash}{729670cd9d39b9b575390147a29d51d7}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{12}
|
||
\field{month}{4}
|
||
\field{title}{A JIT for packet filters}
|
||
\field{year}{2011}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/437981/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/437981/
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_JIT_demystify_page13}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=0fcaa32b080db12cbc8b11b27d05ad61}{%
|
||
family={Wang},
|
||
familyi={W\bibinitperiod},
|
||
given={Jiong},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Netronome}%
|
||
}
|
||
\strng{namehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{fullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{bibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authorbibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authornamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authorfullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{11}
|
||
\field{month}{9}
|
||
\field{title}{Demystify eBPF JIT Compiler}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\field{pages}{13}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_JIT_demystify_page14}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=0fcaa32b080db12cbc8b11b27d05ad61}{%
|
||
family={Wang},
|
||
familyi={W\bibinitperiod},
|
||
given={Jiong},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Netronome}%
|
||
}
|
||
\strng{namehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{fullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{bibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authorbibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authornamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authorfullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{11}
|
||
\field{month}{9}
|
||
\field{title}{Demystify eBPF JIT Compiler}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\field{pages}{14}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{jit_enable_setting}{manual}{}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{bpf\_jit\_enable}
|
||
\verb{urlraw}
|
||
\verb https://sysctl-explorer.net/net/core/bpf_jit_enable/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://sysctl-explorer.net/net/core/bpf_jit_enable/
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_starovo_slides_page23}{proceedings}{}
|
||
\list{institution}{1}{%
|
||
{PLUMgrid}%
|
||
}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{20}
|
||
\field{month}{2}
|
||
\field{title}{BPF – in-kernel virtual machine}
|
||
\field{year}{2015}
|
||
\field{dateera}{ce}
|
||
\field{pages}{23}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb http://vger.kernel.org/netconf2015Starovoitov-bpf_collabsummit_2015feb20.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{brendan_gregg_bpf_book_bpf_vm}{book}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b45aef384111d7e9dd71b74ba427b5f1}{%
|
||
family={Gregg},
|
||
familyi={G\bibinitperiod},
|
||
given={Brendan},
|
||
giveni={B\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{fullhash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{bibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{authorbibnamehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{authornamehash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\strng{authorfullhash}{b45aef384111d7e9dd71b74ba427b5f1}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BPF performance tools}
|
||
\verb{urlraw}
|
||
\verb https://learning.oreilly.com/library/view/bpf-performance-tools/9780136588870/ch02.xhtml#:-:text=With%20JIT%20compiled%20code%2C%20i,%20other%20native%20kernel%20code
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://learning.oreilly.com/library/view/bpf-performance-tools/9780136588870/ch02.xhtml#:-:text=With%20JIT%20compiled%20code%2C%20i,%20other%20native%20kernel%20code
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_verifier_kerneldocs}{manual}{}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{eBPF verifier}
|
||
\verb{urlraw}
|
||
\verb https://kernel.org/doc/html/latest/bpf/verifier.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://kernel.org/doc/html/latest/bpf/verifier.html
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_JIT_demystify_page17-22}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=0fcaa32b080db12cbc8b11b27d05ad61}{%
|
||
family={Wang},
|
||
familyi={W\bibinitperiod},
|
||
given={Jiong},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Netronome}%
|
||
}
|
||
\strng{namehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{fullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{bibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authorbibnamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authornamehash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\strng{authorfullhash}{0fcaa32b080db12cbc8b11b27d05ad61}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{11}
|
||
\field{month}{9}
|
||
\field{title}{Demystify eBPF JIT Compiler}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\field{pages}{17\bibrangedash 22}
|
||
\range{pages}{6}
|
||
\verb{urlraw}
|
||
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.netronome.com/media/documents/demystify-ebpf-jit-compiler.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_bounded_loops}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=eb58c5db0dc3d52508c642eba949ed28}{%
|
||
family={Rybczynska},
|
||
familyi={R\bibinitperiod},
|
||
given={Marta},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{eb58c5db0dc3d52508c642eba949ed28}
|
||
\strng{fullhash}{eb58c5db0dc3d52508c642eba949ed28}
|
||
\strng{bibnamehash}{eb58c5db0dc3d52508c642eba949ed28}
|
||
\strng{authorbibnamehash}{eb58c5db0dc3d52508c642eba949ed28}
|
||
\strng{authornamehash}{eb58c5db0dc3d52508c642eba949ed28}
|
||
\strng{authorfullhash}{eb58c5db0dc3d52508c642eba949ed28}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{30}
|
||
\field{month}{6}
|
||
\field{title}{Bounded loops in BPF for the 5.3 kernel}
|
||
\field{year}{2019}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/794934/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/794934/
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_maps_kernel}{manual}{}
|
||
\field{sortinit}{5}
|
||
\field{sortinithash}{5dd416adbafacc8226114bc0202d5fdd}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{eBPF maps}
|
||
\verb{urlraw}
|
||
\verb https://www.kernel.org/doc/html/latest/bpf/maps.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.kernel.org/doc/html/latest/bpf/maps.html
|
||
\endverb
|
||
\endentry
|
||
\entry{bpf_syscall}{manual}{}
|
||
\field{sortinit}{6}
|
||
\field{sortinithash}{7851c86048328b027313775d8fbd2131}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{bpf(2)- Linux manual page}
|
||
\verb{urlraw}
|
||
\verb https://man7.org/linux/man-pages/man2/bpf.2.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://man7.org/linux/man-pages/man2/bpf.2.html
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_helpers}{manual}{}
|
||
\field{sortinit}{6}
|
||
\field{sortinithash}{7851c86048328b027313775d8fbd2131}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{bpf-helpers(7)- Linux manual page}
|
||
\verb{urlraw}
|
||
\verb https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
|
||
\endverb
|
||
\endentry
|
||
\entry{xdp_gentle_intro}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=78dcb92591468323e355b4f87108649d}{%
|
||
family={Lavie},
|
||
familyi={L\bibinitperiod},
|
||
given={Daniel},
|
||
giveni={D\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{78dcb92591468323e355b4f87108649d}
|
||
\strng{fullhash}{78dcb92591468323e355b4f87108649d}
|
||
\strng{bibnamehash}{78dcb92591468323e355b4f87108649d}
|
||
\strng{authorbibnamehash}{78dcb92591468323e355b4f87108649d}
|
||
\strng{authornamehash}{78dcb92591468323e355b4f87108649d}
|
||
\strng{authorfullhash}{78dcb92591468323e355b4f87108649d}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{3}
|
||
\field{month}{2}
|
||
\field{title}{A Gentle Introduction to XDP}
|
||
\field{year}{2022}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.seekret.io/blog/a-gentle-introduction-to-xdp/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.seekret.io/blog/a-gentle-introduction-to-xdp/
|
||
\endverb
|
||
\endentry
|
||
\entry{xdp_manual}{manual}{}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{XDP actions}
|
||
\verb{urlraw}
|
||
\verb https://prototype-kernel.readthedocs.io/en/latest/networking/XDP/implementation/xdp_actions.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://prototype-kernel.readthedocs.io/en/latest/networking/XDP/implementation/xdp_actions.html
|
||
\endverb
|
||
\endentry
|
||
\entry{tc_differences}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5442e761747b6fce78f695385639556e}{%
|
||
family={Hangbin},
|
||
familyi={H\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{5442e761747b6fce78f695385639556e}
|
||
\strng{fullhash}{5442e761747b6fce78f695385639556e}
|
||
\strng{bibnamehash}{5442e761747b6fce78f695385639556e}
|
||
\strng{authorbibnamehash}{5442e761747b6fce78f695385639556e}
|
||
\strng{authornamehash}{5442e761747b6fce78f695385639556e}
|
||
\strng{authorfullhash}{5442e761747b6fce78f695385639556e}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{13}
|
||
\field{month}{3}
|
||
\field{title}{tc/BPF and XDP/BPF}
|
||
\field{year}{2019}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://liuhangbin.netlify.app/post/ebpf-and-xdp/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://liuhangbin.netlify.app/post/ebpf-and-xdp/
|
||
\endverb
|
||
\endentry
|
||
\entry{tc_docs_complete}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=6f963077bb5e5f5e471047d2f4a2e4e7}{%
|
||
family={Brown},
|
||
familyi={B\bibinitperiod},
|
||
given={Martin\bibnamedelima A.},
|
||
giveni={M\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
|
||
\strng{fullhash}{6f963077bb5e5f5e471047d2f4a2e4e7}
|
||
\strng{bibnamehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
|
||
\strng{authorbibnamehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
|
||
\strng{authornamehash}{6f963077bb5e5f5e471047d2f4a2e4e7}
|
||
\strng{authorfullhash}{6f963077bb5e5f5e471047d2f4a2e4e7}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{1}
|
||
\field{month}{10}
|
||
\field{title}{Traffic Control HOWTO}
|
||
\field{year}{2006}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb http://linux-ip.net/articles/Traffic-Control-HOWTO/
|
||
\endverb
|
||
\verb{url}
|
||
\verb http://linux-ip.net/articles/Traffic-Control-HOWTO/
|
||
\endverb
|
||
\endentry
|
||
\entry{tc_direct_action}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=d3c24514dc6326a55dee93eaf9976d63}{%
|
||
family={Monnet},
|
||
familyi={M\bibinitperiod},
|
||
given={Quentin},
|
||
giveni={Q\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{d3c24514dc6326a55dee93eaf9976d63}
|
||
\strng{fullhash}{d3c24514dc6326a55dee93eaf9976d63}
|
||
\strng{bibnamehash}{d3c24514dc6326a55dee93eaf9976d63}
|
||
\strng{authorbibnamehash}{d3c24514dc6326a55dee93eaf9976d63}
|
||
\strng{authornamehash}{d3c24514dc6326a55dee93eaf9976d63}
|
||
\strng{authorfullhash}{d3c24514dc6326a55dee93eaf9976d63}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{11}
|
||
\field{month}{4}
|
||
\field{title}{Understanding tc “direct action” mode for BPF}
|
||
\field{year}{2020}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://qmonnet.github.io/whirl-offload/2020/04/11/tc-bpf-direct-action/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://qmonnet.github.io/whirl-offload/2020/04/11/tc-bpf-direct-action/
|
||
\endverb
|
||
\endentry
|
||
\entry{tc_ret_list_complete}{online}{}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labeltitlesource}{title}
|
||
\field{indextitle}{index : kernel/git/torvalds/linux.git}
|
||
\field{title}{Linux kernel source tree}
|
||
\verb{urlraw}
|
||
\verb https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/include/uapi/linux/pkt_cls.h
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/include/uapi/linux/pkt_cls.h
|
||
\endverb
|
||
\endentry
|
||
\entry{tp_kernel}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5233bec95aa14fa3942f60f8fc369f5a}{%
|
||
family={Desnoyers},
|
||
familyi={D\bibinitperiod},
|
||
given={Mathieu},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{5233bec95aa14fa3942f60f8fc369f5a}
|
||
\strng{fullhash}{5233bec95aa14fa3942f60f8fc369f5a}
|
||
\strng{bibnamehash}{5233bec95aa14fa3942f60f8fc369f5a}
|
||
\strng{authorbibnamehash}{5233bec95aa14fa3942f60f8fc369f5a}
|
||
\strng{authornamehash}{5233bec95aa14fa3942f60f8fc369f5a}
|
||
\strng{authorfullhash}{5233bec95aa14fa3942f60f8fc369f5a}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Using the Linux Kernel Tracepoints}
|
||
\verb{urlraw}
|
||
\verb https://www.kernel.org/doc/html/latest/trace/tracepoints.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.kernel.org/doc/html/latest/trace/tracepoints.html
|
||
\endverb
|
||
\endentry
|
||
\entry{kprobe_manual}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=2cc2b9c9c507513d2985e72f46781aec}{%
|
||
family={Jim\bibnamedelima Keniston},
|
||
familyi={J\bibinitperiod\bibinitdelim K\bibinitperiod},
|
||
given={Masami\bibnamedelima Hiramatsu},
|
||
giveni={M\bibinitperiod\bibinitdelim H\bibinitperiod},
|
||
suffix={Prasanna\bibnamedelimb S\bibnamedelima Panchamukhi},
|
||
suffixi={P\bibinitperiod\bibinitdelim S\bibinitperiod\bibinitdelim P\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{2cc2b9c9c507513d2985e72f46781aec}
|
||
\strng{fullhash}{2cc2b9c9c507513d2985e72f46781aec}
|
||
\strng{bibnamehash}{2cc2b9c9c507513d2985e72f46781aec}
|
||
\strng{authorbibnamehash}{2cc2b9c9c507513d2985e72f46781aec}
|
||
\strng{authornamehash}{2cc2b9c9c507513d2985e72f46781aec}
|
||
\strng{authorfullhash}{2cc2b9c9c507513d2985e72f46781aec}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Kernel Probes (Kprobes)}
|
||
\verb{urlraw}
|
||
\verb https://www.kernel.org/doc/html/latest/trace/kprobes.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.kernel.org/doc/html/latest/trace/kprobes.html
|
||
\endverb
|
||
\endentry
|
||
\entry{kallsyms_kernel}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=d92b805bd53ec71a9ed691daf3c00fcc}{%
|
||
family={Alcock},
|
||
familyi={A\bibinitperiod},
|
||
given={Nick},
|
||
giveni={N\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{d92b805bd53ec71a9ed691daf3c00fcc}
|
||
\strng{fullhash}{d92b805bd53ec71a9ed691daf3c00fcc}
|
||
\strng{bibnamehash}{d92b805bd53ec71a9ed691daf3c00fcc}
|
||
\strng{authorbibnamehash}{d92b805bd53ec71a9ed691daf3c00fcc}
|
||
\strng{authornamehash}{d92b805bd53ec71a9ed691daf3c00fcc}
|
||
\strng{authorfullhash}{d92b805bd53ec71a9ed691daf3c00fcc}
|
||
\field{sortinit}{7}
|
||
\field{sortinithash}{f615fb9c6fba11c6f962fb3fd599810e}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{6}
|
||
\field{month}{6}
|
||
\field{title}{kallsyms: new /proc/kallmodsyms with builtin modules and symbol sizes}
|
||
\field{year}{2021}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/862021/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/862021/
|
||
\endverb
|
||
\endentry
|
||
\entry{bcc_github}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BPF Compiler Collection (BCC)}
|
||
\verb{urlraw}
|
||
\verb https://github.com/iovisor/bcc
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://github.com/iovisor/bcc
|
||
\endverb
|
||
\endentry
|
||
\entry{libbpf_github}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{indextitle}{libbpf GitHub}
|
||
\verb{urlraw}
|
||
\verb https://github.com/libbpf/libbpf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://github.com/libbpf/libbpf
|
||
\endverb
|
||
\endentry
|
||
\entry{libbpf_upstream}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BPF next kernel tree}
|
||
\verb{urlraw}
|
||
\verb https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://kernel.googlesource.com/pub/scm/linux/kernel/git/bpf/bpf-next
|
||
\endverb
|
||
\endentry
|
||
\entry{libbpf_core}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c1dd9d38edae2e25017305f57983936e}{%
|
||
family={Nakryiko},
|
||
familyi={N\bibinitperiod},
|
||
given={Andrii},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c1dd9d38edae2e25017305f57983936e}
|
||
\strng{fullhash}{c1dd9d38edae2e25017305f57983936e}
|
||
\strng{bibnamehash}{c1dd9d38edae2e25017305f57983936e}
|
||
\strng{authorbibnamehash}{c1dd9d38edae2e25017305f57983936e}
|
||
\strng{authornamehash}{c1dd9d38edae2e25017305f57983936e}
|
||
\strng{authorfullhash}{c1dd9d38edae2e25017305f57983936e}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{2}
|
||
\field{title}{BPF Portability and CO-RE}
|
||
\field{year}{2020}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://facebookmicrosites.github.io/bpf/blog/2020/02/19/bpf-portability-and-co-re.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://facebookmicrosites.github.io/bpf/blog/2020/02/19/bpf-portability-and-co-re.html
|
||
\endverb
|
||
\endentry
|
||
\entry{ubuntu_caps}{manual}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{capabilities - overview of Linux capabilities}
|
||
\verb{urlraw}
|
||
\verb http://manpages.ubuntu.com/manpages/trusty/man7/capabilities.7.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb http://manpages.ubuntu.com/manpages/trusty/man7/capabilities.7.html
|
||
\endverb
|
||
\endentry
|
||
\entry{evil_ebpf_p9}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
|
||
family={Dileo},
|
||
familyi={D\bibinitperiod},
|
||
given={Jeff},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{NCC Group}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{DEFCON 27}%
|
||
}
|
||
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labelnamesource}{author}
|
||
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
|
||
\field{pages}{9}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_caps_intro}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{[PATCH v7 bpf-next 1/3] bpf, capability: Introduce CAP\_BPF}
|
||
\verb{urlraw}
|
||
\verb https://lore.kernel.org/bpf/20200513230355.7858-2-alexei.starovoitov@gmail.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lore.kernel.org/bpf/20200513230355.7858-2-alexei.starovoitov@gmail.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_caps_lwn}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{capability: introduce CAP\_BPF and CAP\_TRACING}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/797807/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/797807/
|
||
\endverb
|
||
\endentry
|
||
\entry{unprivileged_ebpf}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Reconsidering unprivileged BPF}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/796328/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/796328/
|
||
\endverb
|
||
\endentry
|
||
\entry{cve_unpriv_ebpf}{online}{}
|
||
\field{sortinit}{8}
|
||
\field{sortinithash}{1b24cab5087933ef0826a7cd3b99e994}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{CVE-2021-4204: Linux Kernel eBPF Improper Input Validation Vulnerability}
|
||
\verb{urlraw}
|
||
\verb https://www.openwall.com/lists/oss-security/2022/01/11/4
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.openwall.com/lists/oss-security/2022/01/11/4
|
||
\endverb
|
||
\endentry
|
||
\entry{unpriv_ebpf_ubuntu}{online}{}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Unprivileged eBPF disabled by default for Ubuntu 20.04 LTS, 18.04 LTS, 16.04 ESM}
|
||
\verb{urlraw}
|
||
\verb https://discourse.ubuntu.com/t/unprivileged-ebpf-disabled-by-default-for-ubuntu-20-04-lts-18-04-lts-16-04-esm/27047
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://discourse.ubuntu.com/t/unprivileged-ebpf-disabled-by-default-for-ubuntu-20-04-lts-18-04-lts-16-04-esm/27047
|
||
\endverb
|
||
\endentry
|
||
\entry{unpriv_ebpf_suse}{online}{}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Security Hardening: Use of eBPF by unprivileged users has been disabled by default}
|
||
\verb{urlraw}
|
||
\verb https://www.suse.com/support/kb/doc/?id=000020545
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.suse.com/support/kb/doc/?id=000020545
|
||
\endverb
|
||
\endentry
|
||
\entry{unpriv_ebpf_redhat}{online}{}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{CVE-2022-0002}
|
||
\verb{urlraw}
|
||
\verb https://access.redhat.com/security/cve/cve-2021-4001
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://access.redhat.com/security/cve/cve-2021-4001
|
||
\endverb
|
||
\endentry
|
||
\entry{mem_page_arch}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=47635127541392c1419dbc4a4d3153c6}{%
|
||
family={Lameter},
|
||
familyi={L\bibinitperiod},
|
||
given={Christopher},
|
||
giveni={C\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Jump Trading LLC}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{The Linux Foundation Open Source Summit}%
|
||
}
|
||
\strng{namehash}{47635127541392c1419dbc4a4d3153c6}
|
||
\strng{fullhash}{47635127541392c1419dbc4a4d3153c6}
|
||
\strng{bibnamehash}{47635127541392c1419dbc4a4d3153c6}
|
||
\strng{authorbibnamehash}{47635127541392c1419dbc4a4d3153c6}
|
||
\strng{authornamehash}{47635127541392c1419dbc4a4d3153c6}
|
||
\strng{authorfullhash}{47635127541392c1419dbc4a4d3153c6}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{1}
|
||
\field{month}{12}
|
||
\field{title}{Memory Management 101: Introduction to Memory Management in Linux}
|
||
\field{year}{2017}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://events19.linuxfoundation.org/wp-content/uploads/2017/12/MM-101-Introduction-to-Linux-Memory-Management-Christoph-Lameter-Jump-Trading-LLC-1.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{page_faults}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=28efc25c8eae7f3d05fad64c4679158f}{%
|
||
family={Breaker},
|
||
familyi={B\bibinitperiod},
|
||
given={Doug},
|
||
giveni={D\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||
\strng{fullhash}{28efc25c8eae7f3d05fad64c4679158f}
|
||
\strng{bibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||
\strng{authorbibnamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||
\strng{authornamehash}{28efc25c8eae7f3d05fad64c4679158f}
|
||
\strng{authorfullhash}{28efc25c8eae7f3d05fad64c4679158f}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{8}
|
||
\field{title}{Understanding page faults and memory swap-in/outs}
|
||
\field{year}{2019}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://scoutapm.com/blog/understanding-page-faults-and-memory-swap-in-outs-when-should-you-worry
|
||
\endverb
|
||
\endentry
|
||
\entry{mem_arch_proc}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c6b49e9e6fbe96fdd89720e842dc0b03}{%
|
||
family={Bajo},
|
||
familyi={B\bibinitperiod},
|
||
given={Marcos\bibnamedelima Sánchez},
|
||
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{fullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{bibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{authorbibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{authornamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{authorfullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{23}
|
||
\field{month}{5}
|
||
\field{title}{Stack-based Buffer Overflow - Part 1}
|
||
\field{year}{2021}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://h3xduck.github.io/exploit/2021/05/23/stackbufferoverflow-part1.html
|
||
\endverb
|
||
\endentry
|
||
\entry{8664_params_abi_p18}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=871f02558cb7234c22cde24811cf53a7}{%
|
||
family={al.},
|
||
familyi={a\bibinitperiod},
|
||
given={H.J.\bibnamedelimi Lu},
|
||
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
|
||
prefix={et},
|
||
prefixi={e\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{28}
|
||
\field{month}{1}
|
||
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\field{pages}{18}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{rop_prog_finder}{online}{}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{ROPgadget Tool}
|
||
\verb{urlraw}
|
||
\verb https://github.com/JonathanSalwan/ROPgadget
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://github.com/JonathanSalwan/ROPgadget
|
||
\endverb
|
||
\endentry
|
||
\entry{network_layers}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=ed79ecb3ff4a83522b186b5e3fa37b0d}{%
|
||
family={Alienor},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||
\strng{fullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||
\strng{bibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||
\strng{authorbibnamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||
\strng{authornamehash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||
\strng{authorfullhash}{ed79ecb3ff4a83522b186b5e3fa37b0d}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{28}
|
||
\field{month}{11}
|
||
\field{title}{The Network Layers Explained [with examples]}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.plixer.com/blog/network-layers-explained/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.plixer.com/blog/network-layers-explained/
|
||
\endverb
|
||
\endentry
|
||
\entry{tcp_reliable}{online}{}
|
||
\list{organization}{1}{%
|
||
{IBM}%
|
||
}
|
||
\field{sortinit}{9}
|
||
\field{sortinithash}{54047ffb55bdefa0694bbd554c1b11a0}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{4}
|
||
\field{title}{Transmission Control Protocol}
|
||
\field{year}{2022}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.ibm.com/docs/en/aix/7.2?topic=protocols-transmission-control-protocol
|
||
\endverb
|
||
\endentry
|
||
\entry{tcp_handshake}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Three-Way Handshake}
|
||
\verb{urlraw}
|
||
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.sciencedirect.com/topics/computer-science/three-way-handshake
|
||
\endverb
|
||
\endentry
|
||
\entry{elf}{manual}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{ELF}
|
||
\verb{urlraw}
|
||
\verb https://wiki.osdev.org/ELF
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://wiki.osdev.org/ELF
|
||
\endverb
|
||
\endentry
|
||
\entry{plt_got_overlord}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=9724da855997a02e74ee77d11b4d64e2}{%
|
||
family={Tomaschik},
|
||
familyi={T\bibinitperiod},
|
||
given={David},
|
||
giveni={D\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{9724da855997a02e74ee77d11b4d64e2}
|
||
\strng{fullhash}{9724da855997a02e74ee77d11b4d64e2}
|
||
\strng{bibnamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||
\strng{authorbibnamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||
\strng{authornamehash}{9724da855997a02e74ee77d11b4d64e2}
|
||
\strng{authorfullhash}{9724da855997a02e74ee77d11b4d64e2}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{19}
|
||
\field{month}{3}
|
||
\field{title}{GOT and PLT for pwning.}
|
||
\field{year}{2017}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://systemoverlord.com/2017/03/19/got-and-plt-for-pwning.html
|
||
\endverb
|
||
\endentry
|
||
\entry{plt_got_technovelty}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=4e4902d108d0796e7e54d06a47cfe1ee}{%
|
||
family={Wienand},
|
||
familyi={W\bibinitperiod},
|
||
given={Ian},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||
\strng{fullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||
\strng{bibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||
\strng{authorbibnamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||
\strng{authornamehash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||
\strng{authorfullhash}{4e4902d108d0796e7e54d06a47cfe1ee}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{11}
|
||
\field{month}{5}
|
||
\field{title}{PLT and GOT - the key to code sharing and dynamic libraries}
|
||
\field{year}{2011}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.technovelty.org/linux/plt-and-got-the-key-to-code-sharing-and-dynamic-libraries.html
|
||
\endverb
|
||
\endentry
|
||
\entry{aslr_pie_intro}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{aslr/pie intro}
|
||
\verb{urlraw}
|
||
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://guyinatuxedo.github.io/5.1-mitigation_aslr_pie/index.html#aslrpie-intro
|
||
\endverb
|
||
\endentry
|
||
\entry{relro_redhat}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b77619d1671f5a819a9a13e8e0f51723}{%
|
||
family={Sidhpurwala},
|
||
familyi={S\bibinitperiod},
|
||
given={Huzaifa},
|
||
giveni={H\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||
\strng{fullhash}{b77619d1671f5a819a9a13e8e0f51723}
|
||
\strng{bibnamehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||
\strng{authorbibnamehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||
\strng{authornamehash}{b77619d1671f5a819a9a13e8e0f51723}
|
||
\strng{authorfullhash}{b77619d1671f5a819a9a13e8e0f51723}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{28}
|
||
\field{month}{1}
|
||
\field{title}{Hardening ELF binaries using Relocation Read-Only (RELRO)}
|
||
\field{year}{2019}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.redhat.com/en/blog/hardening-elf-binaries-using-relocation-read-only-relro
|
||
\endverb
|
||
\endentry
|
||
\entry{cet_windows}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=3de76fe0797950a06f4be8a7bf380d22}{%
|
||
family={Yarden\bibnamedelima Shafir},
|
||
familyi={Y\bibinitperiod\bibinitdelim S\bibinitperiod},
|
||
given={Alex\bibnamedelima Ionescu},
|
||
giveni={A\bibinitperiod\bibinitdelim I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||
\strng{fullhash}{3de76fe0797950a06f4be8a7bf380d22}
|
||
\strng{bibnamehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||
\strng{authorbibnamehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||
\strng{authornamehash}{3de76fe0797950a06f4be8a7bf380d22}
|
||
\strng{authorfullhash}{3de76fe0797950a06f4be8a7bf380d22}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{1}
|
||
\field{month}{5}
|
||
\field{title}{R.I.P ROP: CET Internals in Windows 20H1}
|
||
\field{year}{2020}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://windows-internals.com/cet-on-windows/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://windows-internals.com/cet-on-windows/
|
||
\endverb
|
||
\endentry
|
||
\entry{cet_linux}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b51b9464b5589cf5380e3b897d0a43b6}{%
|
||
family={Larabel},
|
||
familyi={L\bibinitperiod},
|
||
given={Michael},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{21}
|
||
\field{month}{7}
|
||
\field{title}{Another Round Of Intel CET Patches, Still Working Toward Linux Kernel Integration}
|
||
\field{year}{2021}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.phoronix.com/scan.php?page=news_item&px=Intel-CET-v29
|
||
\endverb
|
||
\endentry
|
||
\entry{proc_fs}{manual}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{proc(5) — Linux manual page}
|
||
\verb{urlraw}
|
||
\verb https://man7.org/linux/man-pages/man5/proc.5.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://man7.org/linux/man-pages/man5/proc.5.html
|
||
\endverb
|
||
\endentry
|
||
\entry{proc_mem_write}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{enable writing to /proc/pid/mem}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/433326/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/433326/
|
||
\endverb
|
||
\endentry
|
||
\entry{8664_params_abi}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=871f02558cb7234c22cde24811cf53a7}{%
|
||
family={al.},
|
||
familyi={a\bibinitperiod},
|
||
given={H.J.\bibnamedelimi Lu},
|
||
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
|
||
prefix={et},
|
||
prefixi={e\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{28}
|
||
\field{month}{1}
|
||
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\field{pages}{148}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_friends_p15}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=2994fc802c0b46f7289cf001e2c26cfe}{%
|
||
family={Guillaume\bibnamedelima Fournier},
|
||
familyi={G\bibinitperiod\bibinitdelim F\bibinitperiod},
|
||
given={Sylvain\bibnamedelima Afchainthe},
|
||
giveni={S\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Datadog}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{DEFCON 29}%
|
||
}
|
||
\strng{namehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{fullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{bibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{authorbibnamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{authornamehash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\strng{authorfullhash}{2994fc802c0b46f7289cf001e2c26cfe}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{eventtitle}{Cyber Threats 2021: A year in Retrospect}
|
||
\field{pages}{15}
|
||
\range{pages}{1}
|
||
\verb{urlraw}
|
||
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Guillaume%20Fournier%20Sylvain%20Afchain%20Sylvain%20Baubeau%20-%20eBPF%2C%20I%20thought%20we%20were%20friends.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{ebpf_override_return}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BPF-based error injection for the kernel}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/740146/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/740146/
|
||
\endverb
|
||
\endentry
|
||
\entry{code_kernel_open}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{indextitle}{Linux kernel source code}
|
||
\verb{urlraw}
|
||
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/open.c#L1192
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/open.c#L1192
|
||
\endverb
|
||
\endentry
|
||
\entry{code_kernel_syscall}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{indextitle}{Linux kernel source code}
|
||
\verb{urlraw}
|
||
\verb https://elixir.bootlin.com/linux/v5.11/source/include/linux/syscalls.h#L233
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://elixir.bootlin.com/linux/v5.11/source/include/linux/syscalls.h#L233
|
||
\endverb
|
||
\endentry
|
||
\entry{fault_injection}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{4}
|
||
\field{month}{11}
|
||
\field{title}{Injecting faults into the kernel}
|
||
\field{year}{2006}
|
||
\field{dateera}{ce}
|
||
\verb{urlraw}
|
||
\verb https://lwn.net/Articles/209257/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://lwn.net/Articles/209257/
|
||
\endverb
|
||
\endentry
|
||
\entry{write_helper_non_fault}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{probe\_write\_common\_error}
|
||
\verb{urlraw}
|
||
\verb https://www.spinics.net/lists/bpf/msg16795.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.spinics.net/lists/bpf/msg16795.html
|
||
\endverb
|
||
\endentry
|
||
\entry{code_vfs_read}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{indextitle}{Linux kernel source code}
|
||
\verb{urlraw}
|
||
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/read_write.c#L476
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://elixir.bootlin.com/linux/v5.11/source/fs/read_write.c#L476
|
||
\endverb
|
||
\endentry
|
||
\entry{evil_ebpf_p6974}{proceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5142e68c748eb70cb619b21160eb7f72}{%
|
||
family={Dileo},
|
||
familyi={D\bibinitperiod},
|
||
given={Jeff},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{NCC Group}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{DEFCON 27}%
|
||
}
|
||
\strng{namehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{fullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{bibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authorbibnamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authornamehash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\strng{authorfullhash}{5142e68c748eb70cb619b21160eb7f72}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{eventtitle}{Evil eBPF Practical Abuses of an In-Kernel Bytecode Runtime}
|
||
\field{pages}{69\bibrangedash 74}
|
||
\range{pages}{6}
|
||
\verb{urlraw}
|
||
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raw.githubusercontent.com/nccgroup/ebpf/master/talks/Evil_eBPF-DC27-v2.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{8664_params_abi_p1922}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=871f02558cb7234c22cde24811cf53a7}{%
|
||
family={al.},
|
||
familyi={a\bibinitperiod},
|
||
given={H.J.\bibnamedelimi Lu},
|
||
giveni={H\bibinitperiod\bibinitdelim L\bibinitperiod},
|
||
prefix={et},
|
||
prefixi={e\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{fullhash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{bibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authorbibnamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authornamehash}{871f02558cb7234c22cde24811cf53a7}
|
||
\strng{authorfullhash}{871f02558cb7234c22cde24811cf53a7}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{day}{28}
|
||
\field{month}{1}
|
||
\field{title}{System V Application Binary Interface AMD64 Architecture Processor Supplement}
|
||
\field{year}{2018}
|
||
\field{dateera}{ce}
|
||
\field{pages}{19\bibrangedash 22}
|
||
\range{pages}{4}
|
||
\verb{urlraw}
|
||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raw.githubusercontent.com/wiki/hjl-tools/x86-psABI/x86-64-psABI-1.0.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{rawtcp_lib}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c6b49e9e6fbe96fdd89720e842dc0b03}{%
|
||
family={Bajo},
|
||
familyi={B\bibinitperiod},
|
||
given={Marcos\bibnamedelima Sánchez},
|
||
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{fullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{bibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{authorbibnamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{authornamehash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\strng{authorfullhash}{c6b49e9e6fbe96fdd89720e842dc0b03}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{RawTCP\_Lib}
|
||
\verb{urlraw}
|
||
\verb https://github.com/h3xduck/RawTCP_Lib
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://github.com/h3xduck/RawTCP_Lib
|
||
\endverb
|
||
\endentry
|
||
\entry{glibc}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{The GNU C library}
|
||
\verb{urlraw}
|
||
\verb https://www.gnu.org/software/libc/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.gnu.org/software/libc/
|
||
\endverb
|
||
\endentry
|
||
\entry{canary_exploit}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Stack Canaries}
|
||
\verb{urlraw}
|
||
\verb https://ir0nstone.gitbook.io/notes/types/stack/canaries
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://ir0nstone.gitbook.io/notes/types/stack/canaries
|
||
\endverb
|
||
\endentry
|
||
\entry{pie_exploit}{online}{}
|
||
\field{sortinit}{1}
|
||
\field{sortinithash}{50c6687d7fc80f50136d75228e3c59ba}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Position Independent Code}
|
||
\verb{urlraw}
|
||
\verb https://ir0nstone.gitbook.io/notes/types/stack/pie
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://ir0nstone.gitbook.io/notes/types/stack/pie
|
||
\endverb
|
||
\endentry
|
||
\enddatalist
|
||
\endrefsection
|
||
\endinput
|
||
|