grsecurity/PaX Citations in Academic Research

2001 - 2014

  1. Gran: model checking grsecurity RBAC policies, 2012
  2. Microsoft Research - RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization, 2007
  3. Microsoft Research - Data Randomization, 2008
  4. Microsoft Research - Control-flow integrity, 2005
  5. StackGhost: Hardware Facilitated Stack Protection, 2001
  6. Secure program execution via dynamic information flow tracking, 2006
  7. Type-Assisted Dynamic Buffer Overflow Detection, 2002
  8. Address obfuscation: An efficient approach to combat a broad range of memory error exploits, 2003
  9. Protecting global and static variables from buffer overflow attacks without overhead, 2006
  10. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths, 2004
  11. A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks, 2005
  12. e-nexsh: Achieving an effectively non-executable stack and heap via system-call policing, 2005
  13. Stackguard: Simple smash stack protection for GCC, 2003
  14. Run-time detection of heap-based overflows, 2003
  15. Avoiding Buffer Overflows and Related Problems, 2004
  16. Server Protection through Dynamic Patching, 2005
  17. SELinux and grsecurity: A Side-by-Size Comparison of Mandatory Access Control and Access Control List Implementations, 2003
  18. SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements, 2003
  19. RSBAC-a framework for enhanced Linux system security, 2005
  20. Secure computing: SELinux, 2007
  21. Attacking Signed Binaries, 2005
  22. Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach, 2006
  23. Formalisation et garantie de propriétés de sécurité système: application à la détection d'intrusions, 2007
  24. Securing a Linux-based Multi-User Web Server, 2006
  25. Exploiting 802.11 Wireless Driver Vulnerabilities on Windows, 2006
  26. Détection D'intrusion Orientée Méta-Politique, 2005
  27. Abstract Efficient Techniques for Comprehensive Protection from Memory Error Exploits, 2005
  28. Predicting Security Vulnerabilities from Function Calls, 2007
  29. ARMORY: An auxiliary testing tool for automatic buffer overflow vulnerability detection, 2008
  30. Next generation debuggers for reverse engineering, 2007
  31. Centralized security policy support for virtual machine, 2006
  32. Secure remote management and software distribution for wireless mesh networks, 2007
  33. Attack-Redirector: A Server Protection and Honeypot Bait System, 2008
  34. A novel approach for distributed updates of MAC policies using a meta-protection framework, 2004
  35. A Linux Implementation of Temporal Access Controls, 2007
  36. FormatShield: A Binary Rewriting Defense against Format String Attacks, 2008
  37. Playing with ptrace() for fun and profit, 2006
  38. Increasing Information Security with Mandatory Access Controls in the Operating System, 2006
  39. Address Space Layout Permutation: Increasing Resistance to Memory Corruption Attacks, 2005
  40. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems, 2005
  41. On the effectiveness of address-space randomization, 2004
  42. Collaboration between MAC Policies and IDS based on a Meta-Policy approach, 2006
  43. An Architectural Approach to Preventing Code Injection Attacks, 2007
  44. Alternative Xbox copy protection designs, 2005
  45. Software Security through Targeted Diversification, 2007
  46. Code Injection Attacks on Harvard-Architecture Devices, 2008
  47. When good instructions go bad: generalizing return-oriented programming to RISC, 2008
  48. Covert Debugging Circumventing Software Armoring Techniques, 2007
  49. Buffer Overflow Vulnerabilities: Exploits and Defensive Techniques, 2004
  50. Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities, 2008
  51. The FOREVER service for fault/intrusion removal, 2008
  52. Detection and Subversion of Virtual Machines, 2006
  53. Persistence in dynamic code transformation systems, 2005
  54. Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?, 2007
  55. Improved Network Security and Disguising TCP/IP Fingerprint through Dynamic Stack Modification, 2005
  56. Corruption de la Memoire lors de l'Exploitation, 2006
  57. Defeating memory corruption attacks via pointer taintedness detection, 2005
  58. Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses, 2007
  59. Insecure Context Switching: Inoculating regular expressions for survivability, 2008
  60. Ensuring secure program execution in multiprocessor embedded systems: a case study, 2007
  61. Defeating Compiler-Level Buffer Overflow Protection, 2006
  62. Reverse Stack Execution, 2007
  63. Secure and practical defense against code-injection attacks using software dynamic translation, 2006
  64. Omniunpack: Fast, generic, and safe unpacking of malware, 2007
  65. Prevention of code-injection attacks by encrypting system call arguments, 2006
  66. Non-control-data attacks are realistic threats, 2005
  67. Combating Memory Corruption Attacks On Scada Devices, 2008
  68. Address-space randomization for Windows systems, 2006
  69. DieHard: Probabilistic memory safety for unsafe languages, 2006
  70. Secure Bit: Transparent, Hardware Buffer-Overflow Protection, 2006
  71. Improving address space randomization with a dynamic offset randomization technique, 2006
  72. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique, 2005
  73. Known/chosen key attacks against software instruction set randomization, 2006
  74. A Survey of Randomization Techniques Against Common Mode Attacks, 2005
  75. An immune system inspired approach for protection from repetitive attacks, 2005
  76. Efficient protection against heap-based buffer overflows without resorting to magic, 2006
  77. Resilient Intrusion Tolerance through Proactive and Reactive Recovery, 2007
  78. Virtual machine-provided context sensitive page mappings, 2008
  79. Persistent code caching: Exploiting code reuse across executions and applications, 2007
  80. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), 2007
  81. ARCHERR: Runtime environment driven program safety, 2004
  82. Foreign Code Detection on the Windows/X86 Platform, 2006
  83. Where's the FEEB?: The effectiveness of instruction set randomization, 2005
  84. Efficient techniques for comprehensive protection from memory error exploits, 2005
  85. Exterminator: Automatically correcting memory errors with high probability, 2007
  86. Automatic diagnosis and response to memory corruption vulnerabilities, 2005
  87. Data space randomization, 2008
  88. The Evolution of System-Call Monitoring, 2008
  89. MemSherlock: an automated debugger for unknown memory corruption vulnerabilities, 2007
  90. DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks, 2004
  91. A practical mimicry attack against powerful system-call monitors, 2008
  92. SigFree: A Signature-free Buffer Overflow Attack Blocker, 2006
  93. Kernel Support for Redundant Execution on Multiprocessor Systems, 2007
  94. Kernel Support for Deterministic Redundant Execution of Shared Memory Workloads on Multiprocessor Systems, 2007
  95. Real-world buffer overflow protection for userspace & kernelspace, 2008
  96. ASLR Smack & Laugh Reference: Seminar on Advanced Exploitation Techniques, 2008
  97. Comprehensively and efficiently protecting the heap, 2006
  98. Hardened OS exploitation techniques, 2004
  99. A Security Architecture for Microprocessors, 2003
  100. Hypervisor support for identifying covertly executing binaries, 2008
  101. Using instruction block signatures to counter code injection attacks, 2005
  102. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models, 2005
  103. Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software, 2006
  104. Bezoar: Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks, 2007
  105. Deploying dynamic code transformation in modern computing environments, 2006
  106. Binary rewriting and call interception for efficient runtime protection against buffer overflows, 2006
  107. Control-flow integrity: Principles, implementations, and applications, 2005
  108. Randomized instruction set emulation, 2005
  109. Implementation vulnerabilities and detection, 2007
  110. Proactive Obfuscation, 2009
  111. Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space, 2009
  112. An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors, 2006
  113. Paladin: Helping Programs Help Themselves with System Call Interposition, 2009
  114. Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities, 2009
  115. Classification of Malicious Distributed SELinux Activities, 2009
  116. Polymorphing Software By Randomizing Data Structure Layout, 2009
  117. Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks, 2009
  118. Finding the Bad in Good Code: Automated Return-Oriented Programming Exploit Discovery, 2009
  119. Experimental Validation of Architectural Solutions, 2009
  120. Multi-Variant Execution: Run-Time Defense against Malicious Code Injection Attacks, 2009
  121. Breaking the memory secrecy assumption, 2009
  122. Security by Design, 2009
  123. The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture, 2009
  124. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms, 2009
  125. Specification and evaluation of polymorphic shellcode properties using a new temporal logic, 2009
  126. Yataglass: Network-level Code Emulation for Analyzing Memory-scanning Attacks, 2009
  127. Protecting Xen hypercalls, 2009
  128. The Impact of Linux Superuser Privileges on System and Data Security Within a Cloud Computing Storage Architecture, 2009
  129. An Examination of the Generic Memory Corruption Exploit Prevention Mechanisms on Apple's Leopard Operating System, 2009
  130. A System Call Randomization Based Method for Countering Code-Injection Attacks, 2009
  131. Surgically returning to randomized lib (c), 2009
  132. Architecture Support for Operating System Survivability and Efficient Bulk Memory Copying and Initialization, 2009
  133. Leveraging Parallel Hardware to Detect, Quarantine, and Repair Malicious Code Injection, 2010
  134. Malicious Shellcode Detection with Virtual Memory Snapshots, 2010
  135. Program Differentiation, 2010
  136. A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC, 2008
  137. Intrusion detection for resource-constrained embedded control systems in the power grid, 2012
  138. Development of an Effective Runtime Defense Algorithm for Web Application Security, 2012
  139. RGBDroid: a novel response-based approach to android privilege escalation attacks, 2012
  140. Stack Layout Transformation: Towards Diversity for Securing Binary Programs, 2012
  141. Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication, 2012
  142. A Dynamic Detective Method against ROP Attack on ARM Platform, 2012
  143. Functionality-based application confinement: A parameterised and hierarchical approach to policy abstraction for rule-based application-oriented access controls, 2012
  144. STABILIZER: Statistically Sound Performance Evaluation, 2013
  145. Composable and reusable whole-system offline dynamic analysis, 2012
  146. Light-weight bounds checking, 2012
  147. Safe Loading A Foundation for Secure Execution of Untrusted Programs, 2012
  148. Body armor for binaries: preventing buffer overflows without recompilation, 2012
  149. Memento: Learning Secrets from Process Footprints, 2012
  150. An Empirical Study of Memory Sharing in Virtual Machines, 2012
  151. Automatic generation of policies and roles for role based access control [patent], 2011
  152. Secure sandboxing solution for GNU/Linux, 2011
  153. Attack Surface Reduction For Commodity OS Kernels, 2011
  154. A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds, 2011
  155. Lightweight intrusion detection for resource-constrained embedded control systems, 2011
  156. Identifying native applications with high assurance, 2011
  157. Enforcing kernel constraints by hardware-assisted virtualization, 2011
  158. An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS, 2011
  159. Autoscopy Jr.: Intrusion Detection for Embedded Control Systems, 2011
  160. PIGA-HIPS: Protection of a shared HPC cluster, 2011
  161. Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks, 2011
  162. Runtime Attacks: Buffer Overflow and Return-Oriented Programming, 2011
  163. RIPE: runtime intrusion prevention evaluator, 2011
  164. Efficient detection of the return-oriented programming malicious code, 2011
  165. Knowledge Base Model for the Linux Kernel, 2011
  166. Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables, 2011
  167. Address space randomization for mobile devices, 2011
  168. Q: Exploit Hardening Made Easy, 2011
  169. Jump-oriented programming: A new class of code-reuse attack, 2011
  170. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, 2011
  171. Privilege escalation attacks on Android, 2011
  172. Revisiting address space randomization, 2011
  173. In-Execution Dynamic Malware Analysis and Detection by Mining Information in Process Control Blocks of Linux OS, 2011
  174. Securing The Kernel via Static Binary Rewriting and Program Shepherding, 2011
  175. Effectiveness of Moving Target Defenses, 2011
  176. On the Expressiveness of Return-into-libc Attacks, 2011
  177. A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks, 2011
  178. ROPdefender: A detection tool to defend against return-oriented programming attacks, 2011
  179. Mitigating code-reuse attacks with control-flow locking, 2011
  180. Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems, 2011
  181. Fine-grained user-space security through virtualization, 2011
  182. A study of self-propagating mal-packets in sensor networks: Attacks and defenses, 2011
  183. Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures, 2011
  184. Faults in Linux: Ten years later, 2011
  185. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution, 2011
  186. DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations, 2011
  187. Detecting polymorphic threats [patent], 2010
  188. Countering polymorphic malicious computer code through code optimization [patent], 2009
  189. Dynamic out-of-process software components isolation for trustworthiness execution [patent], 2009
  190. Opening computer files quickly and safely over a network [patent], 2009
  191. Secure execution of a computer program [patent], 2009
  192. Method of address space layout randomization for windows operating systems [patent], 2010
  193. System and method for monitoring interactions between application programs and data stores [patent], 2010
  194. Secure execution of a computer program using a code cache [patent], 2009
  195. Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems, 2009
  196. Security through diversity: Leveraging virtual machine technology, 2009
  197. Protecting a computer coupled to a network from malicious code infections [patent], 2008
  198. Evaluation of Linux Security Frameworks, 2010
  199. Security in Web Applications and the Implementing of a Ticket Handling System, 2014
  200. Quantifiable Run-time Kernel Attack Surface Reduction, 2013
  201. FIREAXE: The DHS Secure Design Competition Pilot, 2012
  202. Vulnerability Discovery with Attack Injection Software, 2013
  203. ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection, 2013
  204. LGadget: ROP Exploit based on Long Instruction Sequences, 2013
  205. Protecting Function Pointers in Binary, 2013
  206. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring, 2013
  207. Towards Formal Verification of Liferay RBAC, 2013
  208. Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System, 2013
  209. Layout Randomization and Nondeterminism, 2014
  210. Booby Trapping Software, 2013
  211. Applications of Cybernetics and Control Theory for a New Paradigm in Cybersecurity, 2013
  212. SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks, 2014
  213. Analyzing the Security of Windows 7 and Linux for Cloud Computing, 2012
  214. Run-time Control Flow Authentication: An Assessment on Contemporary X86 Platforms, 2013
  215. Deadbolt: Locking Down Android Disk Encryption, 2013
  216. A Formal Model and Correctness Proof for an Access Control Policy Framework, 2013
  217. High Assurance Models for Secure Systems, 2013
  218. Operating System Security by Integrity Checking and Recovery Using Write-protected Storage, 2013
  219. Malicious Code Execution Prevention through Function Pointer Protection, 2013
  220. An Approach to Stack Overflow Counter-measures Using Kernel Properties, 2013
  221. Marlin: A fine grained randomization approach to defend against ROP attacks, 2013
  222. Defending against heap overflow by using randomization in nested virtual clusters, 2013
  223. ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware, 2013
  224. SecGOT: Secure Global Offset Tables in ELF Executables, 2013
  225. iProbe: A lightweight user-level dynamic instrumentation tool, 2013
  226. On Layout Randomization for Arrays and Functions, 2013
  227. JSGuard: Shellcode Detection in JavaScript, 2012
  228. Profile-guided Automated Software Diversity, 2013
  229. HeapSentry: Kernel-assisted Protection against Heap Overflows, 2013
  230. Gadge Me If You Can, 2013
  231. Systematic Analysis of Defenses Against Return-Oriented Programming, 2013
  232. Practical Control Flow Integrity & Randomization for Binary Executables, 2013
  233. SoK: Eternal War in Memory, 2013
  234. Practical Timing Side Channel Attacks Against Kernel Space ASLR, 2013
  235. ASIST: Architectural Support for Instruction Set Randomization, 2013
  236. A Systematic Analysis of Defenses Against Code Reuse Attacks, 2013
  237. SafeStack: Automatically Patching Stack-based Buffer Overflow Vulnerabilities, 2013
  238. SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks, 2013
  239. CPM: Masking Code Pointers to Prevent Code Injection Attacks, 2013
  240. Finding Focus in the Blur of Moving Target Techniques [abstract], 2013
  241. Diversity in Cloud Systems Through Runtime and Compile-time Relocation [abstract], 2013
  242. HyperCheck: A Hardware-Assisted Integrity Monitor [abstract], 2013
  243. A secure architecture design based on application isolation, code minimization and randomization [abstract], 2013
  244. Defending Return-oriented Programming Based on Virtualization Techniques [abstract], 2013
  245. Diversifying the Software Stack Using Randomized NOP Insertion [abstract], 2013
  246. JITSafe: A Framework Against Just-in-time Spraying Attacks [abstract], 2013
  247. Detecting Return Oriented Programming by Examining Positions of Saved Return Addresses [abstract], 2013
  248. Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation [abstract], 2013
  249. Mandatory Access Control with a Multi-level Reference Monitor: PIGA-cluster [abstract], 2013
  250. Detecting Code Injection Attacks at TLB Miss [abstract], 2013
  251. Software Crash Analysis for Automatic Exploit Generation on Binary Programs [abstract], 2014
  252. Software Cruising: A New Technology for Building Concurrent Software Monitor [abstract], 2014
  253. Permanent protection of information systems with method of automated security and integrity control [abstract], 2010
  254. The dark side of the Internet: Attacks, costs and responses [abstract], 2011
  255. Implicit Buffer Overflow Protection Using Memory Segregation, 2011
  256. OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel [abstract], 2011
  257. Automatic construction of jump-oriented programming shellcode (on the x86) [abstract], 2011
  258. Compiler-Generated Software Diversity, 2011
  259. Securing heap memory by data pointer encoding [abstract], 2011
  260. JITDefender: A Defense against JIT Spraying Attacks [abstract], 2011
  261. Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions [abstract], 2011
  262. Enhancing MAC Security Model with Meta-Policy approach using an Intelligent Anomaly based HIDS [abstract], 2011
  263. Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs [abstract], 2011
  264. Advanced MAC in HPC systems: performance improvement [abstract], 2012
  265. Surreptitious Deployment and Execution of Kernel Agents in Windows Guests [abstract], 2012
  266. Survey on malware evasion techniques: State of the art and challenges [abstract], 2012
  267. A New Data Randomization Method to Defend Buffer Overflow Attacks [abstract], 2012
  268. Directed Hidden-Code Extractor for Environment-Sensitive Malwares [abstract], 2012
  269. Improving Mandatory Access Control for HPC Clusters [abstract], 2012
  270. A Novel Approach Against the System Buffer Overflow [abstract], 2010
  271. Automated Software Vulnerability Analysis [abstract], 2009
  272. Probability Based Risk Analysis for a VoIP System [abstract], 2009
  273. A DLL Protection Mechanism with Larger Random Entropy for Windows Vista [abstract], 2009
  274. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks [abstract], 2009
  275. Address-space layout randomization using code islands [abstract], 2009
  276. Security Systems Design and Analysis Using an Integrated Rule-Based Systems Approach [abstract], 2005
  277. AIFD: A Runtime Solution to Buffer Overflow Attack [abstract], 2007
  278. Hardware Stack Design: Toward an Effective Defence Against Frame Pointer Overwrite Attacks [abstract], 2006
  279. An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks [abstract], 2005
  280. Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems [abstract], 2006
  281. Enforcement of Integrated Security Policy in Trusted Operating Systems [abstract], 2007
  282. Application of an Online Judge & Contester System in Academic Tuition [abstract], 2008
  283. Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks [abstract], 2006
  284. Rootkit modeling and experiments under Linux [abstract], 2008
  285. PrISM: Automatic Detection and Prevention from Cyber Attacks [abstract], 2008
  286. A Theory of Secure Control Flow [abstract], 2005
  287. Detection and Diagnosis of Control Interception [abstract], 2008
  288. Efficient and Practical Control Flow Monitoring for Program Security [abstract], 2008
  289. Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks [abstract], 2007
  290. Linux 2.6 kernel exploits [abstract], 2007
  291. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems [abstract], 2007
  292. Intrusion detection and security policy framework for distributed environments [abstract], 2005
  293. Integration of trusted operating system from open source [abstract], 2003
  294. Towards the specification of access control policies on multiple operating systems [abstract], 2004
  295. Detecting kernel-level rootkits through binary analysis [abstract], 2004
  296. A Collaborative Approach for Access Control, Intrusion Detection and Security Testing [abstract], 2006
  297. Buffer overflow protection based on adjusting code segment limit [abstract], 2005
  298. The Design of a Generic Intrusion Tolerant Architecture for Web Servers [abstract], 2008
  299. Supporting access control policies across multiple operating systems [abstract], 2005
  300. Model-driven configuration of os-level mandatory access control: research abstract [abstract], 2008
  301. A simple implementation and performance evaluation extended-role based access control [abstract], 2005
  302. Design space and analysis of worm defense strategies [abstract], 2006
  303. ASSURE: automatic software self-healing using rescue points [abstract], 2009
  304. Self-healing control flow protection in sensor applications [abstract], 2009
  305. Return Protector: A Protection Mechanism for Return-into-libc Attacks by Checking the Return Address [abstract], 2009
  306. A specification language for information security policies [abstract], 2009
  307. DROP: Detecting Return-Oriented Programming Malicious Code [abstract], 2009
  308. Enforcement of Security Properties for Dynamic MAC Policies [abstract], 2009
  309. Generation of Role Based Access Control Security Policies for Java Collaborative Applications [abstract], 2009
  310. A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability [abstract], 2009