Archive for July, 2014

seccomp-based applications analysis and debugging

http://en.wikipedia.org/wiki/Seccomp

http://www.wilderssecurity.com/threads/seccomp-has-been-added-to-the-ubuntu-12-04-kernel.324044/

http://j00ru.vexillium.org/win32k_syscalls/

http://www.wilderssecurity.com/threads/matousec-proactive-security-challenge-64-bits.314015/page-2#post-2021004

https://www.google.com.sg/search?q=seccomp+bpf+example

http://lxr.free-electrons.com/source/samples/seccomp/bpf-direct.c

http://man.cx/?page=prctl(2)

https://bugzilla.mozilla.org/show_bug.cgi?id=790923

https://bug790923.bugzilla.mozilla.org/attachment.cgi?id=780100

http://code.google.com/p/chromium/issues/detail?id=267179

http://lwn.net/Articles/332974/

https://www.imperialviolet.org/2009/08/26/seccomp.html

http://www.insanitybit.com/2012/07/04/chrome-20-on-linux-gives-seccomp-filters-for-flash-3/

https://plus.google.com/+LennartPoetteringTheOneAndOnly/posts/cb3uNFMNUyK

http://security.stackexchange.com/questions/9786/breaking-out-of-a-strict-linux-sandbox-running-virtually-under-windows-do-the-l

http://threatpost.com/using-kernel-exploits-bypass-sandboxes-fun-and-profit-031813/77638

http://stackoverflow.com/questions/14775888/is-there-seccomp-analogue-for-windows

http://blog.cr0.org/2012/09/introducing-chromes-next-generation.html

Advertisements
%d bloggers like this: