Issues
- 0
Build fails with on latex/pdf output with '! You can't use `macro parameter character #' in horizontal mode.'
#246 opened by kbeyls - 5
Consider section on underhanded code (detections)
#232 opened by wanders - 4
Add section about printf exploits
#241 opened by Flakebi - 2
Add information about heap exploits
#242 opened by Flakebi - 17
Make HTML output look and feel better
#130 opened by kbeyls - 9
Desire to read book in EPUB format
#211 opened by SuperSonicHub1 - 1
Add reference to https://best.openssf.org/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++
#230 opened by kbeyls - 3
Compiler preserving constant-time property
#213 opened by swarnpriya - 0
Section 3.6.1: Transient Execution. Add example related to Store-Bypass-Load (Spectre v4)
#214 opened by swarnpriya - 0
- 3
- 7
- 0
Chapter 5 "Compiler introduced security vulnerabilities": Explain the implications of Undefined Behavior
#202 opened by lucic71 - 3
Section 2.4.1 "Return-oriented Programming": Explain how assembly gadgets could be generated from C/C++
#164 opened by kbeyls - 0
Add a section to chapter 2 on system call interposition, ASLR and related mitigations
#199 opened by g-kouv - 0
Section 2.7.1 "Sanitizers": Also describe other mechanisms to detect memory errors
#170 opened by kbeyls - 1
- 2
- 3
PAC is also supported in ARMv8.1-M
#186 opened by saagarjha - 4
- 2
Consider adding github issue link to TODOs
#156 opened by kbeyls - 0
Chapter 5: "Physical attacks": move chapter to a section in the chapter on side channels
#181 opened by kbeyls - 0
Section 5.2.3 "Countermeasures": reduce overlap with section on timing-based side channels
#182 opened by kbeyls - 0
Chapter 3 "Side-channels": Write section on site isolation as a SpectreV1 mitigation
#179 opened by kbeyls - 0
- 0
Section 3.5 "Transient Execution": Write sections on specific transient execution attacks such as Spectre and Meltdown.
#178 opened by kbeyls - 0
Chapter 3: "Side-channels" consider adding more section covering more side-channel categories
#176 opened by kbeyls - 0
Section 2.2 "Exploitation Primitives": also add links to simpler exploits and tutorial-level material
#163 opened by kbeyls - 0
Describe in more detail why range limitation matters in section 2.2 Exploitation Primitives.
#162 opened by kbeyls - 0
Section 3.5.1 "Transient Execution": show an example of cpu speculation that is not based on branch prediction
#177 opened by kbeyls - 0
- 0
Section 3.2.1 "Typical CPU cache architecture": also explain TLB and prefetching
#174 opened by kbeyls - 0
- 0
- 0
- 0
- 0
Section 2.5.2.3 "Pointer Authentication": Also describe other uses of FEAT_PAuth in a later section and refer to it
#167 opened by kbeyls - 0
Section 2.5.2.3 "Pointer Authentication": add more references to relevant research
#166 opened by kbeyls - 0
Section 2.4.2 "Jump-oriented Programming": Use "real" instead of made-up gadgets in example
#165 opened by kbeyls - 0
Add a section on threat models
#161 opened by kbeyls - 0
Convert references in section 5.3.1 into using bibtex
#159 opened by kbeyls - 5
Concerning timing attacks
#149 opened by pronesto - 0
- 5
Chapter about Obfuscation
#127 opened by Fare9 - 0
- 0
Write section on undefined behaviour and the intersection of optimisation and security
#126 opened by g-kouv - 1
Consider section on binary image exploits
#106 opened by sam-ellis - 0
Shorten chapter 2 title
#94 opened by sam-ellis - 0
- 0