<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>ckoi.dev</title><description>Security research, systems programming, and game development.</description><link>https://ckoi.dev/</link><item><title>Disarming Windows Code Integrity Through Unprotected .data Globals</title><link>https://ckoi.dev/blog/ci-dll-unsigned-driver-loading/</link><guid isPermaLink="true">https://ckoi.dev/blog/ci-dll-unsigned-driver-loading/</guid><description>Code Integrity decision-making in ci.dll relies on feature flags and a signing policy table pointer that sit in the writable .data section, outside KDP and PatchGuard protection. Modifying 20 bytes across two structures completely disables enforcement, permitting unsigned kernel drivers to load without triggering any integrity checks.</description><pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate></item><item><title>SigmaDrift: A Biomechanical Replacement for WindMouse</title><link>https://ckoi.dev/blog/sigmadrift-windmouses-successor/</link><guid isPermaLink="true">https://ckoi.dev/blog/sigmadrift-windmouses-successor/</guid><description>WindMouse generates trajectories that look human but fail temporal analysis — wrong velocity shape, wrong sub-movement count, no Fitts&apos; Law compliance. SigmaDrift replaces it with sigma-lognormal motor primitives, signal dependent noise, OU drift, and speed-modulated tremor to produce output in the same feature space behavioral classifiers operate in.</description><pubDate>Sat, 14 Feb 2026 00:00:00 GMT</pubDate></item><item><title>Obfuscating Kernel Drivers Without Crashing</title><link>https://ckoi.dev/blog/obfuscating-kernel-drivers/</link><guid isPermaLink="true">https://ckoi.dev/blog/obfuscating-kernel-drivers/</guid><description>Standard obfuscation libraries assume user mode. Kernel mode forbids heap allocation at elevated IRQL, lacks the C runtime, and has no static destructor mechanism. Porting obfuscation to ring 0 requires rebuilding every primitive from scratch.</description><pubDate>Sun, 08 Feb 2026 00:00:00 GMT</pubDate></item><item><title>Why Anti Cheats Walk Your Call Stack</title><link>https://ckoi.dev/blog/why-anti-cheats-walk-your-call-stack/</link><guid isPermaLink="true">https://ckoi.dev/blog/why-anti-cheats-walk-your-call-stack/</guid><description>Stack walking gives anti cheats a detection primitive that survives manual mapping, direct syscalls, and kernel execution. Each return address reveals origin, module backing, and execution plausibility without scanning a single byte of memory.</description><pubDate>Fri, 30 Jan 2026 00:00:00 GMT</pubDate></item><item><title>Direct Circular Buffer Injection in mouclass.sys</title><link>https://ckoi.dev/blog/circular-buffer-mouse-injection/</link><guid isPermaLink="true">https://ckoi.dev/blog/circular-buffer-mouse-injection/</guid><description>Kernel mouse input injection through mouclass&apos;s internal circular buffer bypasses MouseClassServiceCallback, the HID stack, and every filter driver — producing data indistinguishable from physical hardware.</description><pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate></item><item><title>ETW as Cover Traffic for Kernel Drivers</title><link>https://ckoi.dev/blog/etw-cover-traffic/</link><guid isPermaLink="true">https://ckoi.dev/blog/etw-cover-traffic/</guid><description>Windows places no authenticity checks on ETW provider registration. A kernel driver that registers a profiler GUID and emits real sampling telemetry becomes forensically indistinguishable from legitimate monitoring software.</description><pubDate>Sat, 10 Jan 2026 00:00:00 GMT</pubDate></item><item><title>Patching Claude Code&apos;s Safety Out of cli.js</title><link>https://ckoi.dev/blog/breaking-claude-code/</link><guid isPermaLink="true">https://ckoi.dev/blog/breaking-claude-code/</guid><description>Claude Code enforces its content policy through unprotected string literals in a local JavaScript file. Three find-and-replace operations strip the refusal logic, and a hash-tracking persistence layer keeps the modification alive across updates.</description><pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate></item><item><title>RSA Signature Validation Gap in CI.dll for Grandfathered Drivers</title><link>https://ckoi.dev/blog/windows-code-integrity-research/</link><guid isPermaLink="true">https://ckoi.dev/blog/windows-code-integrity-research/</guid><description>CI.dll enforces structure, certificate chains, authenticode hashes, and timestamps for pre-2015 drivers but never checks the RSA signature bytes. A driver whose EncryptedDigest is entirely zeroed loads under Secure Boot and HVCI without error.</description><pubDate>Mon, 01 Dec 2025 00:00:00 GMT</pubDate></item></channel></rss>