http://en.wikipedia.org/wiki/Seccomp
http://www.wilderssecurity.com/threads/seccomp-has-been-added-to-the-ubuntu-12-04-kernel.324044/
http://j00ru.vexillium.org/win32k_syscalls/
https://www.google.com.sg/search?q=seccomp+bpf+example
http://lxr.free-electrons.com/source/samples/seccomp/bpf-direct.c
https://bugzilla.mozilla.org/show_bug.cgi?id=790923
https://bug790923.bugzilla.mozilla.org/attachment.cgi?id=780100
http://code.google.com/p/chromium/issues/detail?id=267179
http://lwn.net/Articles/332974/
https://www.imperialviolet.org/2009/08/26/seccomp.html
http://www.insanitybit.com/2012/07/04/chrome-20-on-linux-gives-seccomp-filters-for-flash-3/
https://plus.google.com/+LennartPoetteringTheOneAndOnly/posts/cb3uNFMNUyK
http://threatpost.com/using-kernel-exploits-bypass-sandboxes-fun-and-profit-031813/77638
http://stackoverflow.com/questions/14775888/is-there-seccomp-analogue-for-windows
http://blog.cr0.org/2012/09/introducing-chromes-next-generation.html
Posted by Seccomp based papers from university | Life in Linux Kernel on August 10, 2014 at 10:59 pm
Posted by Understanding SECCOMP | My Technical Blog on September 10, 2020 at 2:59 pm
[…] https://tthtlc.wordpress.com/2014/07/25/seccomp-based-applications-analysis-and-debugging/ […]