參考文獻 |
[1] perf_event_open exploit AT&T ICS Galaxy Note I717, http://pastebicom/TLK9Qrgi
[2] Linux Kernel: Vulnerability Statistics http://www.cvedetails.com/product/47/Linux-Linux-Kernel.html?vendor_id=33
[3] https://jon.oberheide.org/files/stackjacking-hes11.pdf
[4] https://github.com/jonoberheide/stackjacking
[5] x86: Use a read-only IDT alias on all CPUs, http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4eefbe792baedb474e256d35370849992fcf1c79
[6] The Rootkit Arsenal: Escape and Evasion , Part I, p75
[7] http://code.woboq.org/linux/linux/arch/x86/mm/fault.c.html#do_page_fault
[8] The Linux Kernel’s Memory Management Unit API, William Gatliff, p3, http://www.stillhq.com/pdfdb/000446/data.pdf
[9] http://code.woboq.org/linux/linux/arch/x86/mm/fault.c.html#1059
[10] http://code.woboq.org/linux/linux/arch/x86/mm/fault.c.html#
no_context
[11] Paging, http://wiki.osdev.org/Paging
[12] Park Yeongung. RGBDroid: A Novel Response-based Approach to Android Privilege Escalation Attacks. In Leet ’12, 2012.
[13] https://wiki.ubuntu.com/KeesCook
[14] JIANG, X. Security alert: New sophisticated android malware droidkungfu found in alternative Chinese app market. http://www.csc.ncsu.edu/faculty/jiang/DroidKungFu.html.
[15] JIANG, X. Gingermaster: First android malware utilizing a root exploit on android 2.3 (gingerbread). http://www.cs.ncsu.edu/faculty/jiang/GingerMaster/
[16] SECURITY, L. M. Lookout mobile security technical tear down droiddream. Tech. rep., Lookout Mobile Security, 03 2011.
[17] Intel® 64 and IA-32 Architectures Software Developer’s Manual Volume 3 (3A, 3B & 3C):System Programming Guide, Vol. 3A 6-17.
http://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-system-programming-manual-325384.pdf
[18] The entry in IDT table of definition in Linux Kernel.
http://code.woboq.org/linux/linux/arch/x86/include/asm/desc_defs.h.html
[19] Linux 64bit memory layout, /Documentation/x86/x86_64/mm.txt
[20] A Guide to Kernel Exploitation: Attacking the Core
[21] http://code.woboq.org/linux/linux/arch/x86/kernel/traps.c.html#780
[22] exploit-db, http://www.exploit-db.com
[23] packet storm. All things security. http://packetstormsecurity.com/
[24] perf tutorial, https://perf.wiki.kernel.org/index.php/Tutorial
[25] Hijacking Linux Page Fault Handler, http://phrack.org/issues/61/7.html#article
[26] A Linux Memory Trick, http://vulnfactory.org/blog/2013/02/06/a-linux-memory-trick/
[27] Linux kernel exploit研究和探索 http://www.xfocus.net/projects/Xcon/2002/Xcon2002_alert7_e4gle.pdf
[28] Exploit Linux Kernel Slub Overflow, wzt, http://hi.baidu.com/wzt85/item/fb0fedea00636d3986d9ded9
[29] http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
[30] CVE-2013-2094 porting to x86-32, http://pastebin.com/mMn3QvuR
[31] CVE-2013-2094 exploit for Android, https://github.com/android-rooting-tools/android_run_root_shell
[32] Ubuntu 12.04.0-2LTS x64 - perf_swevent_init Kernel Local Root Exploit, http://www.exploit-db.com/exploits/33589/
[33] CSAW CTF 2013 Kernel Exploitation Challenge, http://poppopret.org/2013/11/20/csaw-ctf-2013-kernel-exploitation-challenge/
[34] Kernel address space layout randomization , http://lwn.net/Articles/569635/
[35] A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator, Dan Rosenberg
http://vsecurity.com/download/papers/slob-exploitation.pdf
[36] https://github.com/offensive-security/exploit-database
[37] http://cxsecurity.com/exploit/
[38] http://direct.exploitsdownload.com/
[39] http://packetstormsecurity.com/
|