Posts

  • Serious Memory Series : Walking through pages [0][2]

    Is your memory actually isolated, or is the OS just lying to you? In this part, we tear down the Virtual Memory illusion. We’ll walk page tables by hand, dissect the hardware mechanics, and see exactly what happens when your pointer hits the metal
  • Serious Memory Series : Hacker's corner [0]

    Having established the fundamentals, we now step into the Hacker’s Corner. In this chapter, we dig into the specific architectural details and design choices that transform standard memory management into a fascinating—and critical—landscape for security researchers.
  • Serious Memory Series : Segmentation and beyond [0][1]

    In this part we dig into the hardware mechanics that power x86 memory management. We explore the evolution from Real to Protected Mode and dissect the translation process from Logical to Linear addresses. You’ll learn how the Global Descriptor Table (GDT), Segment Selectors, and the Flat Memory Model function under...
  • Serious Memory Series : Memory primitives [0][0]

    Primary memory is one of computer’s core components. The objective of this series is to explain memory primitives and techniques for security topics; therefore, the spotlight will be on core concepts rather on implementation details.