Informative Information for the Uninformed
Current
v9
v8
v7
v6
v5
v4
v3
v2
v1
All
About
Vol 4
»
2006.Jun
Next:
About this document ...
Up:
Abusing Mach on Mac
Previous:
Conclusion
Contents
Bibliography
1
CMU.
The Mach Project
.
http://www.cs.cmu.edu/afs/cs/project/mach/public/www/mach.html
2
Apple.
Apple Security Overview
.
http://developer.apple.com/documentation/Security/Conceptual/Security_Overview/Concepts/chapter_3_section_9.html
3
Mach.
Mach Man-pages
.
http://felinemenace.org/~nemo/mach/manpages
4
Rentzsch.
Mach Inject
.
http://rentzsch.com/mach_inject/
5
Guiheneuf.
Mach Inject
.
http://guiheneuf.org/Site/mach
6
Richard P. Draves/Michael B. Jones and Mary R. Thompson.
Mach Interface Generator
.
http://felinemenace.org/~nemo/mach/mig.txt
7
Richard P. Draves.
MIG Slides
.
http://felinemenace.org/ nemo/mach/Slides
8
Wikipedia.
Mach Kernel
.
http://en.wikipedia.org/wiki/Mach_kernel
9
Feline Menace.
The Mach System
.
http://felinemenace.org/~nemo/mach/Mach.txt
10
OSX Code.
Mach
.
http://www.osxcode.com/index.php?pagename=Articles&article=10
11
CMU.
A Programmer's Guide to the Mach System Calls
.
http://www.cs.cmu.edu/afs/cs/project/mach/public/www/doc/abstracts/machsys.html
12
CMU.
A Programmer's Guide to the Mach User Environment
.
http://www.cs.cmu.edu/afs/cs/project/mach/public/www/doc/abstracts/machuse.html