Skip to content

Commit 9c9a06f

Browse files
committed
Minor formatting fix for papers.md
1 parent 9802a6e commit 9c9a06f

File tree

1 file changed

+30
-30
lines changed

1 file changed

+30
-30
lines changed

papers.md

+30-30
Original file line numberDiff line numberDiff line change
@@ -10,44 +10,44 @@ over the past ~10 years, sorted by topic, and in inverse chronoloigical order.
1010
Qubes OS and Security through Compartmentalization (defensive work)
1111
--------------------------------------------------------------------
1212

13-
* _Qubes OS_ (generally), 2010-2015, [website](https://www.qubes-os.org/)
14-
* _Software compartmentalization vs. physical separation_, 2014, [paper](http://www.invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf)
15-
* _Converting untrusted PDFs into trusted ones: The Qubes Way_, 2013, [post](http://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html)
16-
* _Playing with Qubes Networking for Fun and Profit_, 2011, [post](http://blog.invisiblethings.org/2011/09/28/playing-with-qubes-networking-for-fun.html)
17-
* _Anti Evil Maid_, 2011, [post](http://blog.invisiblethings.org/2011/09/07/anti-evil-maid.html), [code](https://github.com/QubesOS/qubes-antievilmaid)
18-
* _USB Security Challenges_, 2011, [post](http://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html)
19-
* _Disposable VMs_, 2010, [post](http://blog.invisiblethings.org/2010/06/01/disposable-vms.html)
20-
* _Qubes OS Architecture_, 2010, [paper](http://files.qubes-os.org/files/doc/arch-spec-0.3.pdf)
21-
* _Running Vista Every Day! (Poorman's compartmentalization on MS Windows)_,
13+
* Qubes OS (generally), 2010-2015, [website](https://www.qubes-os.org/)
14+
* Software compartmentalization vs. physical separation, 2014, [paper](http://www.invisiblethingslab.com/resources/2014/Softwarecompartmentalizationvsphysicalseparation.pdf)
15+
* Converting untrusted PDFs into trusted ones: The Qubes Way, 2013, [post](http://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html)
16+
* Playing with Qubes Networking for Fun and Profit, 2011, [post](http://blog.invisiblethings.org/2011/09/28/playing-with-qubes-networking-for-fun.html)
17+
* Anti Evil Maid, 2011, [post](http://blog.invisiblethings.org/2011/09/07/anti-evil-maid.html), [code](https://github.com/QubesOS/qubes-antievilmaid)
18+
* USB Security Challenges, 2011, [post](http://blog.invisiblethings.org/2011/05/31/usb-security-challenges.html)
19+
* Disposable VMs, 2010, [post](http://blog.invisiblethings.org/2010/06/01/disposable-vms.html)
20+
* Qubes OS Architecture, 2010, [paper](http://files.qubes-os.org/files/doc/arch-spec-0.3.pdf)
21+
* Running Vista Every Day! (Poorman's compartmentalization on MS Windows),
2222
2006, [article](http://blog.invisiblethings.org/2007/02/04/running-vista-every-day.html)
2323

2424

2525
Trusted Computing & Virtualization (attacks mostly)
2626
----------------------------------------------------
2727

28-
* _Exploring new lands on Intel CPUs (SINIT code execution hijacking)_, 2011, [post](http://blog.invisiblethings.org/2011/12/06/exploring-new-lands-on-intel-cpus-sinit.html), [paper](http://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf)
29-
* _Following the White Rabbit: Software Attacks Against Intel VT-d_, 2011, [paper](http://blog.invisiblethings.org/2011/05/13/following-white-rabbit-software-attacks.html)
30-
* _Another Way to Circumvent Intel® Trusted Execution Technology_, 2009, [paper](http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf)
31-
* _Virtualization (In)Security Traning at Black Hat_, 2009, [agenda](http://invisiblethingslab.com/resources/training_virtsec/VirtSecTraining-Agenda-0.9.pdf)
32-
* _Attacking Intel® Trusted Execution Technology_, 2009, [paper](http://invisiblethingslab.com/resources/bh09dc/Attacking%20Intel%20TXT%20-%20paper.pdf), [post](http://blog.invisiblethings.org/2009/01/05/attacking-intel-trusted-execution.html)
33-
* _Bluepilling the Xen Hypervisor_, 2008, [slides](http://invisiblethingslab.com/resources/bh08/part3.pdf), [post](http://blog.invisiblethings.org/2008/08/08/our-xen-0wning-trilogy-highlights.html)
34-
* _Detecting & Preventing the Xen Hypervisor Subversions_, 2008, [slides](http://invisiblethingslab.com/resources/bh08/part2-full.pdf) [post](http://blog.invisiblethings.org/2008/08/08/our-xen-0wning-trilogy-highlights.html)
35-
* _Security Challenges in Virtualized Environments_, 2008, [slides](http://www.invisiblethingslab.com/resources/rsa08/Security%20Challanges%20in%20Virtualized%20Enviroments%20-%20RSA2008.pdf)
28+
* Exploring new lands on Intel CPUs (SINIT code execution hijacking), 2011, [post](http://blog.invisiblethings.org/2011/12/06/exploring-new-lands-on-intel-cpus-sinit.html), [paper](http://www.invisiblethingslab.com/resources/2011/AttackingIntelTXTviaSINIThijacking.pdf)
29+
* Following the White Rabbit: Software Attacks Against Intel VT-d, 2011, [paper](http://blog.invisiblethings.org/2011/05/13/following-white-rabbit-software-attacks.html)
30+
* Another Way to Circumvent Intel® Trusted Execution Technology, 2009, [paper](http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf)
31+
* Virtualization (In)Security Traning at Black Hat, 2009, [agenda](http://invisiblethingslab.com/resources/trainingvirtsec/VirtSecTraining-Agenda-0.9.pdf)
32+
* Attacking Intel® Trusted Execution Technology, 2009, [paper](http://invisiblethingslab.com/resources/bh09dc/Attacking%20Intel%20TXT%20-%20paper.pdf), [post](http://blog.invisiblethings.org/2009/01/05/attacking-intel-trusted-execution.html)
33+
* Bluepilling the Xen Hypervisor, 2008, [slides](http://invisiblethingslab.com/resources/bh08/part3.pdf), [post](http://blog.invisiblethings.org/2008/08/08/our-xen-0wning-trilogy-highlights.html)
34+
* Detecting & Preventing the Xen Hypervisor Subversions, 2008, [slides](http://invisiblethingslab.com/resources/bh08/part2-full.pdf) [post](http://blog.invisiblethings.org/2008/08/08/our-xen-0wning-trilogy-highlights.html)
35+
* Security Challenges in Virtualized Environments, 2008, [slides](http://www.invisiblethingslab.com/resources/rsa08/Security%20Challanges%20in%20Virtualized%20Enviroments%20-%20RSA2008.pdf)
3636

3737

3838
Rootkits and Stealth Malware (offensive and defensive work)
3939
-----------------------------------------------------------
4040

41-
* _Evil Maid goes after TrueCrypt!_, 2009, [post](http://blog.invisiblethings.org/2009/10/15/evil-maid-goes-after-truecrypt.html), [poc](http://invisiblethingslab.com/resources/evilmaid/evilmaidusb-1.01.img)
42-
* _Attacking SMM Memory via Intel® CPU Cache Poisoning_, 2009, [paper](http://invisiblethingslab.com/resources/misc09/smm_cache_fun.pdf),
43-
* _Understanding Stealth Malware Training at Black Hat_, 2007, [post](http://blog.invisiblethings.org/2007/04/20/understanding-stealth-malware.html)
44-
* _Beyond The CPU: Cheating Hardware Based RAM Forensics_, 2007, [paper](TODO), [post](http://blog.invisiblethings.org/2007/01/20/beyond-cpu-cheating-hardware-based-ram.html)
45-
* _IsGameOver() Anyone?_, 2007, [slides](http://invisiblethingslab.com/resources/bh07/IsGameOver.pdf)
46-
* _Subverting Vista Kernel for Fun and Profit (incl. introduction of Blue Pill)_, [post](http://blog.invisiblethings.org/2006/06/22/introducing-blue-pill.html), [slides](http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf)
47-
* _Introducing Stealth Malware Taxonomy_, 2006, [post](http://blog.invisiblethings.org/2006/11/24/introducing-stealth-malware-taxonomy.html), [paper](TODO)
48-
* _Rootkit Hunting vs. Compromise Detection_, 2006, [slides](TODO)
49-
* _System Virginity Verifier_, 2005, [slides](TODO)
50-
* _Cross-view detection thoughts_, 2005, [article](TODO)
51-
* _Implementation of Passive Covert Channels in the Linux Kernel (NUSHU)_, 2004, [paper](TODO), [slides](TODO)
52-
* _redpill... or how to detect VMM using (almost) one CPU instruction_, 2004, [paper](TODO)
53-
* _Concepts for the Stealth Windows Rootkit (The Chameleon Project)_, 2003, [paper](TODO)
41+
* Evil Maid goes after TrueCrypt!, 2009, [post](http://blog.invisiblethings.org/2009/10/15/evil-maid-goes-after-truecrypt.html), [poc](http://invisiblethingslab.com/resources/evilmaid/evilmaidusb-1.01.img)
42+
* Attacking SMM Memory via Intel® CPU Cache Poisoning, 2009, [paper](http://invisiblethingslab.com/resources/misc09/smmcachefun.pdf),
43+
* Understanding Stealth Malware Training at Black Hat, 2007, [post](http://blog.invisiblethings.org/2007/04/20/understanding-stealth-malware.html)
44+
* Beyond The CPU: Cheating Hardware Based RAM Forensics, 2007, [paper](TODO), [post](http://blog.invisiblethings.org/2007/01/20/beyond-cpu-cheating-hardware-based-ram.html)
45+
* IsGameOver() Anyone?, 2007, [slides](http://invisiblethingslab.com/resources/bh07/IsGameOver.pdf)
46+
* Subverting Vista Kernel for Fun and Profit (incl. introduction of Blue Pill), [post](http://blog.invisiblethings.org/2006/06/22/introducing-blue-pill.html), [slides](http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf)
47+
* Introducing Stealth Malware Taxonomy, 2006, [post](http://blog.invisiblethings.org/2006/11/24/introducing-stealth-malware-taxonomy.html), [paper](TODO)
48+
* Rootkit Hunting vs. Compromise Detection, 2006, [slides](TODO)
49+
* System Virginity Verifier, 2005, [slides](TODO)
50+
* Cross-view detection thoughts, 2005, [article](TODO)
51+
* Implementation of Passive Covert Channels in the Linux Kernel (NUSHU), 2004, [paper](TODO), [slides](TODO)
52+
* redpill... or how to detect VMM using (almost) one CPU instruction, 2004, [paper](TODO)
53+
* Concepts for the Stealth Windows Rootkit (The Chameleon Project), 2003, [paper](TODO)

0 commit comments

Comments
 (0)