Breaking and Protecting Linux Kernel Stack - Elena Reshetova, Intel
Why Your Code Can’t Touch the Hardware (User vs Kernel Space)
#HITB2022SIN E'rybody Gettin' TIPC: Demystifying Remote Linux Kernel Exploitation - Sam Page
Linux Kernel Storage Stack
Achieving Linux Kernel Code Execution Through a Malicious USB Device
i was right (again).
Bypassing Many Kernel Protections Using Elastic Objects - Yueqi Chen & Zhepeng Lin, Ph.D. Students
How does Linux Kernel switches from kernel stack to interrupt stack?
OffensiveCon18 - Ilya Smith - Linux ASLR and GNU Libc
how do hackers exploit buffers that are too small?
x86 Stack Switching, and the Improvement Proposals from Hardware Vendors - Andrew Cooper, Citrix
How Does Linux Boot Process Work?
Linux Kernel Architecture: A Deep Dive for Beginners
Bypassing The Linux Kernel Aslr And Exploiting A Buffer Overflow Vulnerable Application With Ret2Esp
"The magical fantasy land of Linux kernel testing" - Russell Currey (LCA 2020)
Source Boston 2010: Linux Kernel Exploitation: Earning Its Pwnie a Vuln at a Time 2/5
Breaking LInux 5.10.12: printk: fix buffer overflow potential wrong base pointer
Every Level Of Hacking Explained in 8 Minutes
Running a Buffer Overflow Attack - Computerphile
DEFCON 19: Kernel Exploitation Via Uninitialized Stack (w speaker)