lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201209191659.q8JGxphK022448@sf01web3.securityfocus.com> Date: Wed, 19 Sep 2012 16:59:51 GMT From: noreply@...ecurity.ru To: bugtraq@...urityfocus.com Subject: [Positive Research] Intel SMEP Part II: Bypassing Intel SMEP on Windows 8 x64 Using Return-oriented Programming Intel SMEP Part II: Bypassing Intel SMEP on Windows 8 x64 Using Return-oriented Programming. Full details: http://blog.ptsecurity.com/2012/09/bypassing-intel-smep-on-windows-8-x64.html Our previous research (Part I): Intel SMEP overview and partial bypass on Windows 8. http://blog.ptsecurity.com/2012/09/intel-smep-overview-and-partial-bypass.html Thx! --------------------------------- AShishkin[at]ptsecurity[dot]ru http://www.ptsecurity.com http://blog.ptsecurity.com http://www.phdays.com