today-0day
NotionGithubSiteContact
Korean
Korean
  • Introduction
    • 🚩Windows Driver 0-day Research
    • πŸ«‚Team. 우리 μ˜€λŠ˜λΆ€ν„° 0-day
  • backgrounds
    • Windows Driver
    • Related Works
  • Our Approach
    • κ°œμš”
    • πŸ‡Init Analyzer
    • 😑angr-PT
    • πŸ₯ŒMS Fuzzer
      • Playmaker mode
      • Qemu-nyx
      • Redqueen
      • Multiple Driver Tracing
      • Call Stack Parser
    • How to Use
  • Appendix
    • References
    • Achievments
    • πŸ”—Team page
    • πŸ”—CODE BLUE 2024
Powered by GitBook
On this page
  • Main Reference.
  • More Information.
  1. Appendix

References

PreviousHow to UseNextAchievments

Last updated 2 months ago

Main Reference.

  • kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels USENIX

  • Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types USENIX

  • REDQUEEN: Fuzzing with Input-to-State Correspondence NDSS

More Information.

  • The Next Generation of Windows Exploitation: Attacking the Common Log File System Blackhat 2022

  • Get off the kernel If you can’t drive DEFCON27

    • Schrewed-Drivers

  • Windows Kernel Graphic Driver Attack Surface BlackHat 2014

  • Don't Trust Your USB! How to Find Bugs in USB Device Drivers ********Blackhat 2015 Linux

  • A journey of fuzzing Nvidia graphic driver leading to LPE exploitation Hexacon

  • VDR: Vulnerable Driver Research

Github
Paper & Presentation
Github
Paper & Presentation
Github
Paper & Presentation
Youtube
Github
Youtube
Youtube
Youtube
Youtube
Slides
Github
Write-up