Apr 15 · 2 min read · A Straightforward Approach to De-Bloating the Toolchain Many infrastructure systems, like log processors, networking tools, embedded utilities, and build systems, still rely on legacy C utilities to r
Join discussion
Apr 15 · 2 min read · The Browser is a Sandbox. It’s Time to Break the Speed Limit. The modern web has problems with "framework fatigue" and V8 overhead. JavaScript has gone a long way, but it was never intended to be used
Join discussion
Apr 2 · 3 min read · xv6 Book; Chapter 6 - 7 - Interrupts & Device Driver; Locks: https://pdos.csail.mit.edu/6.1810/2025/xv6/book-riscv-rev5.pdf Chapter 6 and 7 are about Interrupts, device driver and locks. Interrupts an
Join discussion
Jan 25 · 4 min read · 0.摘要 在虚拟化安全的研究中,如何在尽量不修改 Guest 内核的前提下执行自定义代码,一直是一个有趣且充满挑战的话题。本文尝试分享一套基于 Hypervisor 的完整代码注入思路,涵盖了从劫持 Guest 执行流、基于 EPT 的透明注入、双向通信协议到生命周期管理的全过程。 仓库位置:[mini-int3-injector].(https://github.com/ania0-art/mini-int3-injector). 1. 引言:一点背景与思考 1.1 传统方案遇到的一些挑战 ...
Join discussion