diff --git a/README.md b/README.md index 37e029c..381dcbf 100644 --- a/README.md +++ b/README.md @@ -178,7 +178,7 @@ Contributions *very welcome* but first see [Contributing](#contributing). - [Qrexec: socket-based services](https://www.qubes-os.org/doc/qrexec-socket-services/) - [Qubes memory manager (qmemman)](https://www.qubes-os.org/doc/qmemman/) - [TUFF](https://theupdateframework.io/security/) - We can think of a software update system as “secure” if: -- [YubiKey](https://www.qubes-os.org/doc/yubikey/) +- [YubiKey](https://www.qubes-os.org/doc/yubikey/) - Most use cases for the YubiKey can be achieved exactly as described by the manufacturer or other instructions found online. ## Desktop Customization @@ -280,6 +280,7 @@ Contributions *very welcome* but first see [Contributing](#contributing). - [Software Attacks on Hypervisor Emulation of Hardware](https://www.youtube.com/watch?v=c4DnlP88D2Y) - [[PDF Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf) - [The Arms Race Over Virtualization](https://www.youtube.com/watch?v=nWvg7NKwOjg) - [[PDF Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf) - [XenPwn: Breaking Paravirtualized Devices](https://www.youtube.com/watch?v=qxz8MzE3QME) - [[PDF Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf) +- [Hypervisor Vulnerability Research [PDF]](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf) - State of the Art ### Web articles @@ -341,7 +342,6 @@ Part One - [Preventing and Detecting Xen Hypervisor Subversions [PDF]](https://invisiblethingslab.com/resources/bh08/part2.pdf) - Xen 0wning Trilogy Part Two - [Bluepilling the Xen Hypervisor [PDF]](https://invisiblethingslab.com/resources/bh08/part3.pdf) - Xen 0wning Trilogy Part Three - - [Hypervisor Vulnerability Research [PDF]](https://alisa.sh/slides/HypervisorVulnerabilityResearch2020.pdf) - State of the Art - [Marek Marczykowski-Górecki](https://github.com/marmarek) - Lead developer at Qubes OS. - [Ninavizz](https://vimeo.com/user1589693) - Qubes OS UX Designer. - [Unman](https://github.com/unman?tab=repositories) - Qubes OS contributor.