[若渴計畫] Studying ASLR^cache

Studying ASLR^Cache@若渴
<ajblane0612@gmail.com>
AJMachine
Purposes of Page table and Physical Tag
virtual memory
physical memory
cache
page table physical tag
data/instructions data/instructions
Page Tables with MMU’s PT
Walker
• Page tables point to the next step in a tree
0x644b321f4000
11001000100101100110010000111110100000000000000
offset
PTs with Security-sensitive Secrets
Encoded
A 32KB 4-way Set-associative Data
Cache with Physical Tag
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0024a/ch11s01s02.html
Physical
way??
byte offset
* cache line(cache set)會表示 1~
n page entry, for example: 8 PE =
a cache line on x86_64. 1 PE = 8
bytes
* x86_64中,6bit表示cache set
,3ibt表示cache entry
A 2-way Set-associative Cache
http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.den0024a/ch11s01s02.html
0X000.0000的資料可能在way 0 或 way1
The Same Cache Set in Different Pages
https://arxiv.org/pdf/1702.07521.pdf
set field 一樣
Attacker
Victim
p.29 https://www.vusec.net/wp-content/uploads/2016/11/TalkGras.pdf
* 10 sets per 1 way
• 1,2,3,4,5 表示 cache line offset
• colors 意思是 不同的page的某相同offset的PT entry 在同一個cache set,則
此不同page的其某相同offset的PT entry也會在某一個相同的cache set
Caches
• D, I and Unified TLB (Page table cache)
• D, I and Unified cache
• L3/ Last-level Cache (LLC)
Virtually Indexed, Physically Tagged
Caches
https://www.youtube.com/watch?v=IhIyPq7VCek
* 重點行為Flush TLB
High Level Overview of the AnC Attack
• By executing specially crafted memory access
patterns on a commodity Intel processor, we
are able to infer which cache sets have been
accessed after a targeted MMU PT walk when
dereferencing a data pointer or executing a
piece of code. As only certain addresses map
to a specific cache set, knowing the cache sets
allows us to identify the offsets of the target
PT entries at each PT level, hence
derandomizing ASLR.
http://www.cs.vu.nl/~herbertb/download/papers/anc_ndss17.pdf
Intel i7 Memory Hierarchy plus Clock
Latency for the Relevant Stages
http://www.ieee-security.org/TC/SP2013/papers/4977a191.pdf
* 因為MMU/ Cache 只有一個,所以可由很多process共用
page table
P.4, https://www.vusec.net/wp-content/uploads/2016/11/TalkGras.pdf
Physical Memory
如何得到target程式所使用的各個
page table level的各個page offset
?
先找cache line offset再找cache
line中的entry offset。
[若渴計畫] Studying ASLR^cache
Cache Side-channel Attacks on MMU
• In general, PRIME+PROBE
• EVICT+TIME
利用Cache有share特性
PRIME+PROBE
https://arxiv.org/pdf/1702.07521.pdf
• 在heap建構TLB EVICT Buffer (size大於 unified TLB),可使 dTLB flush
• 建構JIT code,可使得 iTLB flush
• 換成LLC 也可以做PRIME+PROBE攻擊
需要OS漏洞操作core 0 為 attack core
https://arxiv.org/pdf/1702.07521.pdf
Software Grand Exposure: SGX Cache
Attacks Are Practical
EVICT+TIME
Repeat
• Take a large enough set of memory pages to
act as eviction set
• Eviction set使TLB產生miss。
• 此cache line offset =page table的某一個level
的offset。對於x86_64,因為一個page table
有512 PT entry,9 bit中,6 bit表示cache line
offset,3 bit表示 8 page table entry,所以已
解出6 bit。
page
cache line
offset
TIME
EVICT
• 剩下3 bit怎辦 ?
• 可解cache line offset,但我怎知道是哪一個
page table level ?
EVICT+TIME
EVICT+TIME
• On X86_64,PTL1的一個page entry offset代
表的記憶體空間為? 4KB
• On X86_64,PTL2的一個page entry offset代
表的記憶體空間為? 512*4KB = 2 MB
• PTL3 (512*2MB) / PTL4類推 (512*1G)
• 在TLB cache的存PTL1的cache line中的差一
個cache entry 代表 VM中差多少? 4KB
EVICT+TIME-解PTL1
Repeat
page
v
TIME
EVICT
v+4KB
entry
entry
entry
entry
entry
entry
entry
entry
entry
entry
entry
entry
v+8KB
2GB
EVICT+TIME-解PTL2
Repeat
pages
v
TIME
EVICT
v+2MB
entry
entry
entry
entry
entry
entry
entry
entry
entry
entry
entry
entry
v+4MB
2GB
解PTL3/ PTL4類推
Reference
• ASLR on the Line: Practical Cache Attacks on
the MMU
• ASLR^Cache: Practical Cache Attacks on the
MMU
• Software Grand Exposure: SGX Cache Attacks
Are Practical
• https://www.vusec.net/projects/anc/
• https://github.com/vusec/revanc
1 of 23

Recommended

[若渴]Study on Side Channel Attacks and Countermeasures by
[若渴]Study on Side Channel Attacks and Countermeasures [若渴]Study on Side Channel Attacks and Countermeasures
[若渴]Study on Side Channel Attacks and Countermeasures Aj MaChInE
858 views60 slides
GlusterFS As an Object Storage by
GlusterFS As an Object StorageGlusterFS As an Object Storage
GlusterFS As an Object StorageKeisuke Takahashi
6.1K views22 slides
The Linux Block Layer - Built for Fast Storage by
The Linux Block Layer - Built for Fast StorageThe Linux Block Layer - Built for Fast Storage
The Linux Block Layer - Built for Fast StorageKernel TLV
4.3K views42 slides
Filesystem Showdown: What a Difference a Decade Makes by
Filesystem Showdown: What a Difference a Decade MakesFilesystem Showdown: What a Difference a Decade Makes
Filesystem Showdown: What a Difference a Decade MakesPerforce
1.1K views21 slides
Fun with FUSE by
Fun with FUSEFun with FUSE
Fun with FUSEKernel TLV
1.9K views30 slides
FreeBSD and Drivers by
FreeBSD and DriversFreeBSD and Drivers
FreeBSD and DriversKernel TLV
1.3K views34 slides

More Related Content

What's hot

The TCP/IP Stack in the Linux Kernel by
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelDivye Kapoor
52.3K views68 slides
Keeping your files safe in the post-Snowden era with SXFS by
Keeping your files safe in the post-Snowden era with SXFSKeeping your files safe in the post-Snowden era with SXFS
Keeping your files safe in the post-Snowden era with SXFSRobert Wojciechowski
2.9K views25 slides
SuperServer in Firebird 3 by
SuperServer in Firebird 3SuperServer in Firebird 3
SuperServer in Firebird 3Mind The Firebird
6.7K views27 slides
AOS Lab 2: Hello, xv6! by
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!Zubair Nabi
9.1K views25 slides
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s... by
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...Anne Nicolas
8.8K views43 slides
Improving the Performance of the qcow2 Format (KVM Forum 2017) by
Improving the Performance of the qcow2 Format (KVM Forum 2017)Improving the Performance of the qcow2 Format (KVM Forum 2017)
Improving the Performance of the qcow2 Format (KVM Forum 2017)Igalia
1.8K views39 slides

What's hot(20)

The TCP/IP Stack in the Linux Kernel by Divye Kapoor
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
Divye Kapoor52.3K views
Keeping your files safe in the post-Snowden era with SXFS by Robert Wojciechowski
Keeping your files safe in the post-Snowden era with SXFSKeeping your files safe in the post-Snowden era with SXFS
Keeping your files safe in the post-Snowden era with SXFS
AOS Lab 2: Hello, xv6! by Zubair Nabi
AOS Lab 2: Hello, xv6!AOS Lab 2: Hello, xv6!
AOS Lab 2: Hello, xv6!
Zubair Nabi9.1K views
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s... by Anne Nicolas
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...
Anne Nicolas8.8K views
Improving the Performance of the qcow2 Format (KVM Forum 2017) by Igalia
Improving the Performance of the qcow2 Format (KVM Forum 2017)Improving the Performance of the qcow2 Format (KVM Forum 2017)
Improving the Performance of the qcow2 Format (KVM Forum 2017)
Igalia1.8K views
Memory forensics by Sunil Kumar
Memory forensicsMemory forensics
Memory forensics
Sunil Kumar2.8K views
(120513) #fitalk an introduction to linux memory forensics by INSIGHT FORENSIC
(120513) #fitalk   an introduction to linux memory forensics(120513) #fitalk   an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
INSIGHT FORENSIC115 views
OpenZFS data-driven performance by ahl0003
OpenZFS data-driven performanceOpenZFS data-driven performance
OpenZFS data-driven performance
ahl00033.4K views
RHEVM - Live Storage Migration by Raz Tamir
RHEVM - Live Storage MigrationRHEVM - Live Storage Migration
RHEVM - Live Storage Migration
Raz Tamir1.2K views
Unified readonly cache for ceph by zhouyuan
Unified readonly cache for cephUnified readonly cache for ceph
Unified readonly cache for ceph
zhouyuan740 views
Linux Ethernet device driver by 艾鍗科技
Linux Ethernet device driverLinux Ethernet device driver
Linux Ethernet device driver
艾鍗科技2.6K views
Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality by Yue Cheng
Erasing Belady's Limitations: In Search of Flash Cache Offline OptimalityErasing Belady's Limitations: In Search of Flash Cache Offline Optimality
Erasing Belady's Limitations: In Search of Flash Cache Offline Optimality
Yue Cheng223 views
Cpu Cache and Memory Ordering——并发程序设计入门 by frogd
Cpu Cache and Memory Ordering——并发程序设计入门Cpu Cache and Memory Ordering——并发程序设计入门
Cpu Cache and Memory Ordering——并发程序设计入门
frogd50.7K views
A Scalable I/O Manager for GHC by Johan Tibell
A Scalable I/O Manager for GHCA Scalable I/O Manager for GHC
A Scalable I/O Manager for GHC
Johan Tibell2.2K views

Similar to [若渴計畫] Studying ASLR^cache

Cache memory by
Cache memoryCache memory
Cache memoryEklavya Gupta
584 views7 slides
Vmfs by
VmfsVmfs
VmfsErick Treviño
369 views36 slides
SO-Memoria.pdf by
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdfssuser143a20
1 view91 slides
SO-Memoria.pdf by
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdfKadu37
5 views91 slides
Cache in API Gateway by
Cache in API GatewayCache in API Gateway
Cache in API GatewayGilWon Oh
2K views40 slides
Memory Mapping Cache by
Memory Mapping CacheMemory Mapping Cache
Memory Mapping CacheSajith Harshana
12.3K views25 slides

Similar to [若渴計畫] Studying ASLR^cache(20)

SO-Memoria.pdf by Kadu37
SO-Memoria.pdfSO-Memoria.pdf
SO-Memoria.pdf
Kadu375 views
Cache in API Gateway by GilWon Oh
Cache in API GatewayCache in API Gateway
Cache in API Gateway
GilWon Oh2K views
Cache Memory by sathish sak
Cache MemoryCache Memory
Cache Memory
sathish sak1.4K views
Lec10 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part2 by Hsien-Hsin Sean Lee, Ph.D.
Lec10 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part2Lec10 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part2
Lec10 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Memory part2
ECECS 472572 Final Exam ProjectRemember to check the errata by EvonCanales257
ECECS 472572 Final Exam ProjectRemember to check the errata ECECS 472572 Final Exam ProjectRemember to check the errata
ECECS 472572 Final Exam ProjectRemember to check the errata
EvonCanales2573 views
ECECS 472572 Final Exam ProjectRemember to check the errat.docx by tidwellveronique
ECECS 472572 Final Exam ProjectRemember to check the errat.docxECECS 472572 Final Exam ProjectRemember to check the errat.docx
ECECS 472572 Final Exam ProjectRemember to check the errat.docx
tidwellveronique10 views
ECECS 472572 Final Exam ProjectRemember to check the err.docx by tidwellveronique
ECECS 472572 Final Exam ProjectRemember to check the err.docxECECS 472572 Final Exam ProjectRemember to check the err.docx
ECECS 472572 Final Exam ProjectRemember to check the err.docx
Resume_CQ_Edward by caiqi wang
Resume_CQ_EdwardResume_CQ_Edward
Resume_CQ_Edward
caiqi wang467 views
Java In-Process Caching - Performance, Progress and Pittfalls by cruftex
Java In-Process Caching - Performance, Progress and PittfallsJava In-Process Caching - Performance, Progress and Pittfalls
Java In-Process Caching - Performance, Progress and Pittfalls
cruftex151 views
Java In-Process Caching - Performance, Progress and Pitfalls by Jens Wilke
Java In-Process Caching - Performance, Progress and PitfallsJava In-Process Caching - Performance, Progress and Pitfalls
Java In-Process Caching - Performance, Progress and Pitfalls
Jens Wilke611 views
hierarchical memory technology.pptx by 2105986
hierarchical memory technology.pptxhierarchical memory technology.pptx
hierarchical memory technology.pptx
21059860 views
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docx by ARIV4
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docxPlease do ECE572 requirementECECS 472572 Final Exam Project (W.docx
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docx
ARIV45 views
12 archiving system v1.00_en by confidencial
12 archiving system v1.00_en12 archiving system v1.00_en
12 archiving system v1.00_en
confidencial 1.6K views
In-memory OLTP storage with persistence and transaction support by Alexander Korotkov
In-memory OLTP storage with persistence and transaction supportIn-memory OLTP storage with persistence and transaction support
In-memory OLTP storage with persistence and transaction support
Alexander Korotkov1.9K views

More from Aj MaChInE

An Intro on Data-oriented Attacks by
An Intro on Data-oriented AttacksAn Intro on Data-oriented Attacks
An Intro on Data-oriented AttacksAj MaChInE
301 views18 slides
A Study on .NET Framework for Red Team - Part I by
A Study on .NET Framework for Red Team - Part IA Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part IAj MaChInE
493 views28 slides
A study on NetSpectre by
A study on NetSpectreA study on NetSpectre
A study on NetSpectreAj MaChInE
211 views27 slides
Introduction to Adversary Evaluation Tools by
Introduction to Adversary Evaluation ToolsIntroduction to Adversary Evaluation Tools
Introduction to Adversary Evaluation ToolsAj MaChInE
1.2K views45 slides
[若渴] A preliminary study on attacks against consensus in bitcoin by
[若渴] A preliminary study on attacks against consensus in bitcoin[若渴] A preliminary study on attacks against consensus in bitcoin
[若渴] A preliminary study on attacks against consensus in bitcoinAj MaChInE
345 views46 slides
[RAT資安小聚] Study on Automatically Evading Malware Detection by
[RAT資安小聚] Study on Automatically Evading Malware Detection[RAT資安小聚] Study on Automatically Evading Malware Detection
[RAT資安小聚] Study on Automatically Evading Malware DetectionAj MaChInE
795 views71 slides

More from Aj MaChInE(18)

An Intro on Data-oriented Attacks by Aj MaChInE
An Intro on Data-oriented AttacksAn Intro on Data-oriented Attacks
An Intro on Data-oriented Attacks
Aj MaChInE301 views
A Study on .NET Framework for Red Team - Part I by Aj MaChInE
A Study on .NET Framework for Red Team - Part IA Study on .NET Framework for Red Team - Part I
A Study on .NET Framework for Red Team - Part I
Aj MaChInE493 views
A study on NetSpectre by Aj MaChInE
A study on NetSpectreA study on NetSpectre
A study on NetSpectre
Aj MaChInE211 views
Introduction to Adversary Evaluation Tools by Aj MaChInE
Introduction to Adversary Evaluation ToolsIntroduction to Adversary Evaluation Tools
Introduction to Adversary Evaluation Tools
Aj MaChInE1.2K views
[若渴] A preliminary study on attacks against consensus in bitcoin by Aj MaChInE
[若渴] A preliminary study on attacks against consensus in bitcoin[若渴] A preliminary study on attacks against consensus in bitcoin
[若渴] A preliminary study on attacks against consensus in bitcoin
Aj MaChInE345 views
[RAT資安小聚] Study on Automatically Evading Malware Detection by Aj MaChInE
[RAT資安小聚] Study on Automatically Evading Malware Detection[RAT資安小聚] Study on Automatically Evading Malware Detection
[RAT資安小聚] Study on Automatically Evading Malware Detection
Aj MaChInE795 views
[若渴] Preliminary Study on Design and Exploitation of Trustzone by Aj MaChInE
[若渴] Preliminary Study on Design and Exploitation of Trustzone[若渴] Preliminary Study on Design and Exploitation of Trustzone
[若渴] Preliminary Study on Design and Exploitation of Trustzone
Aj MaChInE281 views
[若渴計畫] Challenges and Solutions of Window Remote Shellcode by Aj MaChInE
[若渴計畫] Challenges and Solutions of Window Remote Shellcode[若渴計畫] Challenges and Solutions of Window Remote Shellcode
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
Aj MaChInE981 views
[若渴計畫] Introduction: Formal Verification for Code by Aj MaChInE
[若渴計畫] Introduction: Formal Verification for Code[若渴計畫] Introduction: Formal Verification for Code
[若渴計畫] Introduction: Formal Verification for Code
Aj MaChInE718 views
[若渴計畫] Black Hat 2017之過去閱讀相關整理 by Aj MaChInE
[若渴計畫] Black Hat 2017之過去閱讀相關整理[若渴計畫] Black Hat 2017之過去閱讀相關整理
[若渴計畫] Black Hat 2017之過去閱讀相關整理
Aj MaChInE434 views
[若渴計畫] Studying Concurrency by Aj MaChInE
[若渴計畫] Studying Concurrency[若渴計畫] Studying Concurrency
[若渴計畫] Studying Concurrency
Aj MaChInE4K views
閱讀文章分享@若渴 2016.1.24 by Aj MaChInE
閱讀文章分享@若渴 2016.1.24閱讀文章分享@若渴 2016.1.24
閱讀文章分享@若渴 2016.1.24
Aj MaChInE1.3K views
[若渴計畫2015.8.18] SMACK by Aj MaChInE
[若渴計畫2015.8.18] SMACK[若渴計畫2015.8.18] SMACK
[若渴計畫2015.8.18] SMACK
Aj MaChInE1.2K views
[SITCON2015] 自己的異質多核心平台自己幹 by Aj MaChInE
[SITCON2015] 自己的異質多核心平台自己幹[SITCON2015] 自己的異質多核心平台自己幹
[SITCON2015] 自己的異質多核心平台自己幹
Aj MaChInE2.6K views
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU by Aj MaChInE
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
[MOSUT20150131] Linux Runs on SoCKit Board with the GPGPU
Aj MaChInE1.3K views
[若渴計畫]由GPU硬體概念到coding CUDA by Aj MaChInE
[若渴計畫]由GPU硬體概念到coding CUDA[若渴計畫]由GPU硬體概念到coding CUDA
[若渴計畫]由GPU硬體概念到coding CUDA
Aj MaChInE4.8K views
[若渴計畫]64-bit Linux Return-Oriented Programming by Aj MaChInE
[若渴計畫]64-bit Linux Return-Oriented Programming[若渴計畫]64-bit Linux Return-Oriented Programming
[若渴計畫]64-bit Linux Return-Oriented Programming
Aj MaChInE2.2K views
[MOSUT] Format String Attacks by Aj MaChInE
[MOSUT] Format String Attacks[MOSUT] Format String Attacks
[MOSUT] Format String Attacks
Aj MaChInE2.6K views

Recently uploaded

Future of Indian ConsumerTech by
Future of Indian ConsumerTechFuture of Indian ConsumerTech
Future of Indian ConsumerTechKapil Khandelwal (KK)
21 views68 slides
20231123_Camunda Meetup Vienna.pdf by
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
41 views73 slides
Network Source of Truth and Infrastructure as Code revisited by
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
26 views45 slides
Case Study Copenhagen Energy and Business Central.pdf by
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 views3 slides
Uni Systems for Power Platform.pptx by
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
56 views21 slides
PRODUCT LISTING.pptx by
PRODUCT LISTING.pptxPRODUCT LISTING.pptx
PRODUCT LISTING.pptxangelicacueva6
14 views1 slide

Recently uploaded(20)

Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
SAP Automation Using Bar Code and FIORI.pdf by Virendra Rai, PMP
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdf
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri16 views
Five Things You SHOULD Know About Postman by Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman33 views
HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 views
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta26 views
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院

[若渴計畫] Studying ASLR^cache