The Docless Manifesto

“undocumented” code is the new ideal Documentation is necessary. It’s essential. It’s valuable. For all its purported benefits though, even towards the end of 2018, it remains relegated to a stringly-typed escape-hatch to English, at best. Let’s dissect that problem statement below, but feel free to skip the section if you nodded in agreement. The Problem:Continue reading “The Docless Manifesto”

The SLA-Engineering Paradox

Why outcome-defined projects tend to drive more innovation than recipe-driven projects In the beginning, there was no Software Engineering. But as teams got distributed across the world, they needed to communicate what they wanted from each other and how they wanted it. Thus, Software Engineering was born and it was…. okay-ish. Everything ran over-budget, over-time,Continue reading “The SLA-Engineering Paradox”

Automatic Mitigation of Meltdown

Let’s look at what Meltdown is and how it works, as well as how it is stopped. A lot has been written about the Meltdown vulnerability, but it is still commonly misunderstood. A few diagrams may help. First, let’s consider a simplified memory hierarchy for a computer: main memory, split into user memory and kernelContinue reading “Automatic Mitigation of Meltdown”

ASLR simplified!

ASLR explained in one simple picture ASLR increases difficulty without adding complexity. In Part 1 and Part 2 of this series I demonstrated that crafting attacks can be a pleasant experience without a lot of furious typing. I’ve even shown you how defeating exploits is easy when we really understand how the attack works. LetsContinue reading “ASLR simplified!”

Fun with binaries!

ASLR and DEP defeated with three instructions and one offset! This is Part 2 of my previous post that demonstrated how you craft undetectable attacks against binaries, using our colorful Open Source Entropy Visualization tool. I left you with a cliffhanger… so let’s begin there! Recap of the cliffhanger The cliffhanger I left you withContinue reading “Fun with binaries!”

Let’s craft some real attacks!

If you read security briefings, you wake up every morning to “buffer overflow” vulnerabilities, “control flow” exploits, crafted attacks against specific versions of code, and whatnot. Most of those descriptions are bland and dry. Moreover, much of it makes no intuitive sense, everyone has their fad of the week, and it is easy to feelContinue reading “Let’s craft some real attacks!”