• 首页
  • 分类
  • 关于
  • 友链

  • 开发
    • 算法
      • 二分图和匈牙利算法 --2022-12-04

      • 双栈法搜索节点间任意路径学习 --2022-11-13

      • 编辑距离问题学习 --2022-12-08

    • 环境配置
      • Key is stored in legacy trusted.gpg keyring --2022-11-23

      • Windows 恢复分区移动指南 --2022-11-17

      • 如何安装一个可以安装到离线机器上的NVIM --2023-02-26

    • 协议学习
      • Webhook学习 --2022-12-05

    • < unknown category >
      • 死锁复习 --2022-12-06

    • < unknown category >
      • CodeQL学习 --2022-12-12

  • 生活
    • 读书笔记
      • 《战争与和平》读书笔记 --2022-11-30

  • CTF Writeup
    • 2022
      • Hitcon 2022 --2022-11-28

      • SECCON CTF 2022 --2022-11-26

      • SquareCTF 2022 --2022-11-20

    • < unknown category >
      • 在buuoj的刷题记录 --2022-11-13

      • < unknown title article > --2022-11-07

    • CTFhub
      • pwn学习笔记 --2022-12-04

      • 在ctfhub的刷题记录 --2022-11-12

    • XCTF刷题笔记 --2022-06-28

  • AI
    • 实体对齐
      • 实体对齐文献阅读笔记 --2023-03-11

    • 环境配置
      • WSL配置Nvidia深度学习环境笔记 --2022-11-16

    • GAN学习 --2022-10-28

    • Graph Neural Network --2022-10-28

    • NLP
      • Attention is All I need: Transformer学习笔记 --2022-11-16

    • AI综述 --2023-01-20

    • PyTorch学习笔记 --2022-11-12

    • 常用工具集合
      • Conda常用用法 --2022-11-27

      • Torch常用库和相关问题解决 --2022-11-24

  • 信息安全
    • 漏洞挖掘
      • 论文阅读笔记
        • Analysis of DTLS Implementations Using Protocol State Fuzzing --2022-11-13

        • Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing --2022-11-13

        • Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices --2022-11-13

        • EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit --2022-11-13

        • FuzzGen: Automatic Fuzzer Generation --2022-11-13

        • Fuzzification: Anti-Fuzzing Techniques --2022-11-13

        • Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection --2022-11-13

        • ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications阅读笔记 --2022-11-13

        • Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types --2022-11-13

        • ParmeSan: Sanitizer-guided Greybox Fuzzing --2022-11-13

        • (State of) The Art of War: Offensive Techniques in Binary Analysis --2022-11-13

        • < unknown title article > --2022-11-13

      • 环境相关
        • Pwn-Ubuntu Docker环境 --2022-12-04

    • 逆向工程
      • 反调试技术合集 --2022-11-13

      • APC注入技术 --2022-11-13

      • Binwalk安装踩坑指南 --2022-11-13

      • Boches虚拟机学习 --2022-11-13

      • Detours学习 --2022-11-13

      • 三个用于恶意软件动态分析的使用方法 --2022-11-13

      • 天堂之门技术 --2022-11-13

      • IAT hook --2022-11-13

      • 论文阅读笔记
        • CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection --2022-11-13

        • Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes --2022-11-13

        • ExSpectre: Hiding Malware in Speculative Execution --2022-11-13

        • Forecasting Malware Capabilities From Cyber Attack Memory Images --2022-11-13

        • How Machine Learning Is Solving the Binary Function Similarity Problem --2022-11-13

        • Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability --2022-11-13

        • Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines --2022-11-13

        • PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fieldsand Masking --2022-11-13

        • Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem --2022-11-13

        • Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land --2022-11-13

        • TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time --2022-11-13

        • The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle --2022-11-13

        • Understanding Malicious Cross-library Data Harvesting on Android --2022-11-13

        • When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features --2022-11-13

        • “Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata --2022-11-13

        • YarIx: Scalable YARA-based Malware Intelligence --2022-11-13

        • You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis --2022-11-13

      • PatchGuard(Kernel Patch Protect)学习 --2022-11-13

      • Pyd逆向学习 --2022-11-13

      • 远程线程注入 --2022-11-13

      • 逆向工程经验谈
      • SeDebugPrivilege提权 --2022-11-13

      • Self-Remapping Code学习 --2022-11-13

      • shim-based DLL injection --2022-11-13

      • 数据流分析 --2022-11-15

      • 时间无关调试学习笔记 --2022-11-16

      • VBA STOMPING免杀 --2022-11-13

      • Windows Segment Heap学习 --2022-11-13

      • Windows驱动开发 --2022-11-13

      • 恶意软件签名 --2022-12-05

      • Powershell反混淆 --2022-12-05

我想做一个温柔耐心的强者
Github --or--
Email to me!
Powered by Tiny Small Blog