Update README.md

This commit is contained in:
xn0px90 2023-02-02 16:17:16 -07:00
parent 30876e6754
commit 5bf1237319

View File

@ -178,7 +178,7 @@ Contributions *very welcome* but first see [Contributing](#contributing).
- [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/)
- [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/)
- [TUFF](https://theupdateframework.io/security/) - We can think of a software update system as “secure” if:
- [YubiKey](https://www.qubes-os.org/doc/yubikey/)
- [YubiKey](https://www.qubes-os.org/doc/yubikey/) - Most use cases for the YubiKey can be achieved exactly as described by the manufacturer or other instructions found online.
## Desktop Customization
@ -280,6 +280,7 @@ Contributions *very welcome* but first see [Contributing](#contributing).
- [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[PDF Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
- [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[PDF Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
- [XenPwn: Breaking Paravirtualized Devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[PDF Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
- [Hypervisor Vulnerability Research [PDF]](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf) - State of the Art
### Web articles
@ -341,7 +342,6 @@ Part One
- [Preventing and Detecting Xen Hypervisor Subversions [PDF]](https://invisiblethingslab.com/resources/bh08/part2.pdf) - Xen 0wning Trilogy
Part Two
- [Bluepilling the Xen Hypervisor [PDF]](https://invisiblethingslab.com/resources/bh08/part3.pdf) - Xen 0wning Trilogy Part Three
- [Hypervisor Vulnerability Research [PDF]](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf) - State of the Art
- [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS.
- [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer.
- [Unman](https://github.com/unman?tab=repositories) - Qubes OS contributor.