diff --git a/README.md b/README.md index 7195685..4c10b73 100644 --- a/README.md +++ b/README.md @@ -356,11 +356,13 @@ _return-to-libc techniques_ #### Exploitation: Vulnerability: Speculative Side-Channel Attacks -- [A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature](A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature) +- [A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature](https://www.fortinet.com/blog/threat-research/a-deep-dive-analysis-of-microsoft-s-kernel-virtual-address-shadow-feature.html) - [An accessible overview of Meltdown and Spectre, Part 1](https://blog.trailofbits.com/2018/01/30/an-accessible-overview-of-meltdown-and-spectre-part-1/) - [An accessible overview of Meltdown and Spectre, Part 2](https://blog.trailofbits.com/2018/03/22/an-accessible-overview-of-meltdown-and-spectre-part-2/) +- [Explainer on #Spectre & #Meltdown](https://twitter.com/gsuberland/status/948907452786933762) - [KVA Shadow: Mitigating Meltdown on Windows](https://blogs.technet.microsoft.com/srd/2018/03/23/kva-shadow-mitigating-meltdown-on-windows/) - [Post-Spectre Threat Model Re-Think](https://chromium.googlesource.com/chromium/src/+/master/docs/security/side-channel-threat-model.md) +- [Reading privileged memory with a side-channel](https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html) - [Total Meltdown?](https://blog.frizk.net/2018/03/total-meltdown.html) --- @@ -1271,13 +1273,11 @@ _return-to-libc techniques_