Hacker News
- Detecting debuggers by abusing a bad assumption within Windows http://www.triplefault.io/2017/08/detecting-debuggers-by-abusing-bad.html 6 comments
Lobsters
- Spurious #DB exceptions with the "MOV SS" and "POP SS" instructions (CVE-2018-8897) https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html 2 comments security
- Spurious #DB exceptions with the "MOV SS" and "POP SS" instructions (CVE-2018-8897) | Huge cross-OS vulnerability in Intel and AMD processor architecture that leads to privilege escalation with a simple “pop SS” https://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html?m=1 9 comments hardware
- Spurious #DB exceptions with the "POP SS" instruction (CVE-2018-8897) http://www.triplefault.io/2018/05/spurious-db-exceptions-with-pop-ss.html 3 comments osdev
- Understanding and enumerating Windows process, thread, and image load notification callbacks http://www.triplefault.io/2017/09/enumerating-process-thread-and-image.html 11 comments programming
- Clever debugger detection by abusing bad assumptions in Windows http://www.triplefault.io/2017/08/detecting-debuggers-by-abusing-bad.html?m=1 16 comments programming
- Detecting debuggers by abusing a bad assumption within Windows http://www.triplefault.io/2017/08/detecting-debuggers-by-abusing-bad.html 9 comments netsec
- Deep dive on Windows virtual memory management http://www.triplefault.io/2017/08/exploring-windows-virtual-memory.html 3 comments programming
- Investigating a 5 year old bug in the Windows kernel http://www.triplefault.io/2017/07/breaking-backwards-compatibility-5-year.html 3 comments programming