grsecurity/PaX Citations in Academic Research
562 references from 2001 - 2020
- Protecting the core: Kernel exploitation mitigations, 2011
- Advanced Linux Security, 2013
- Gran: model checking grsecurity RBAC policies, 2012
- Granalyze: towards the automatic verification of Grsecurity RBAC policies, 2014
- Microsoft Research - RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization, 2007
- Microsoft Research - Data Randomization, 2008
- Microsoft Research - Control-flow integrity, 2005
- StackGhost: Hardware Facilitated Stack Protection, 2001
- A Decade of Linux Kernel Vulnerabilities, their Mitigation and Open Problems, 2018
- Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms, 2018
- SpecFuzz: Bringing Spectre-type vulnerabilities to the surface, 2019
- Secure program execution via dynamic information flow tracking, 2006
- Type-Assisted Dynamic Buffer Overflow Detection, 2002
- Address obfuscation: An efficient approach to combat a broad range of memory error exploits, 2003
- Protecting global and static variables from buffer overflow attacks without overhead, 2006
- Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths, 2004
- A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks, 2005
- e-nexsh: Achieving an effectively non-executable stack and heap via system-call policing, 2005
- Stackguard: Simple smash stack protection for GCC, 2003
- Run-time detection of heap-based overflows, 2003
- Avoiding Buffer Overflows and Related Problems, 2004
- Server Protection through Dynamic Patching, 2005
- SELinux and grsecurity: A Side-by-Size Comparison of Mandatory Access Control and Access Control List Implementations, 2003
- SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements, 2003
- RSBAC-a framework for enhanced Linux system security, 2005
- Secure computing: SELinux, 2007
- Attacking Signed Binaries, 2005
- Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach, 2006
- Formalisation et garantie de propriétés de sécurité système: application à la détection d'intrusions, 2007
- Securing a Linux-based Multi-User Web Server, 2006
- Exploiting 802.11 Wireless Driver Vulnerabilities on Windows, 2006
- Détection D'intrusion Orientée Méta-Politique, 2005
- Abstract Efficient Techniques for Comprehensive Protection from Memory Error Exploits, 2005
- Predicting Security Vulnerabilities from Function Calls, 2007
- ARMORY: An auxiliary testing tool for automatic buffer overflow vulnerability detection, 2008
- Next generation debuggers for reverse engineering, 2007
- Centralized security policy support for virtual machine, 2006
- Secure remote management and software distribution for wireless mesh networks, 2007
- Attack-Redirector: A Server Protection and Honeypot Bait System, 2008
- A novel approach for distributed updates of MAC policies using a meta-protection framework, 2004
- A Linux Implementation of Temporal Access Controls, 2007
- FormatShield: A Binary Rewriting Defense against Format String Attacks, 2008
- Playing with ptrace() for fun and profit, 2006
- Increasing Information Security with Mandatory Access Controls in the Operating System, 2006
- Address Space Layout Permutation: Increasing Resistance to Memory Corruption Attacks, 2005
- Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems, 2005
- On the effectiveness of address-space randomization, 2004
- Collaboration between MAC Policies and IDS based on a Meta-Policy approach, 2006
- An Architectural Approach to Preventing Code Injection Attacks, 2007
- Alternative Xbox copy protection designs, 2005
- Software Security through Targeted Diversification, 2007
- Code Injection Attacks on Harvard-Architecture Devices, 2008
- When good instructions go bad: generalizing return-oriented programming to RISC, 2008
- Covert Debugging Circumventing Software Armoring Techniques, 2007
- Buffer Overflow Vulnerabilities: Exploits and Defensive Techniques, 2004
- Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities, 2008
- The FOREVER service for fault/intrusion removal, 2008
- Detection and Subversion of Virtual Machines, 2006
- Persistence in dynamic code transformation systems, 2005
- Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?, 2007
- Improved Network Security and Disguising TCP/IP Fingerprint through Dynamic Stack Modification, 2005
- Corruption de la Memoire lors de l'Exploitation, 2006
- Defeating memory corruption attacks via pointer taintedness detection, 2005
- Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses, 2007
- Insecure Context Switching: Inoculating regular expressions for survivability, 2008
- Ensuring secure program execution in multiprocessor embedded systems: a case study, 2007
- Defeating Compiler-Level Buffer Overflow Protection, 2006
- Reverse Stack Execution, 2007
- Secure and practical defense against code-injection attacks using software dynamic translation, 2006
- Omniunpack: Fast, generic, and safe unpacking of malware, 2007
- Prevention of code-injection attacks by encrypting system call arguments, 2006
- Non-control-data attacks are realistic threats, 2005
- Combating Memory Corruption Attacks On Scada Devices, 2008
- Address-space randomization for Windows systems, 2006
- DieHard: Probabilistic memory safety for unsafe languages, 2006
- Secure Bit: Transparent, Hardware Buffer-Overflow Protection, 2006
- Improving address space randomization with a dynamic offset randomization technique, 2006
- x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique, 2005
- Known/chosen key attacks against software instruction set randomization, 2006
- A Survey of Randomization Techniques Against Common Mode Attacks, 2005
- An immune system inspired approach for protection from repetitive attacks, 2005
- Efficient protection against heap-based buffer overflows without resorting to magic, 2006
- Resilient Intrusion Tolerance through Proactive and Reactive Recovery, 2007
- Virtual machine-provided context sensitive page mappings, 2008
- Persistent code caching: Exploiting code reuse across executions and applications, 2007
- The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), 2007
- ARCHERR: Runtime environment driven program safety, 2004
- Foreign Code Detection on the Windows/X86 Platform, 2006
- Where's the FEEB?: The effectiveness of instruction set randomization, 2005
- Efficient techniques for comprehensive protection from memory error exploits, 2005
- Exterminator: Automatically correcting memory errors with high probability, 2007
- Automatic diagnosis and response to memory corruption vulnerabilities, 2005
- Data space randomization, 2008
- The Evolution of System-Call Monitoring, 2008
- MemSherlock: an automated debugger for unknown memory corruption vulnerabilities, 2007
- DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks, 2004
- A practical mimicry attack against powerful system-call monitors, 2008
- SigFree: A Signature-free Buffer Overflow Attack Blocker, 2006
- Kernel Support for Redundant Execution on Multiprocessor Systems, 2007
- Kernel Support for Deterministic Redundant Execution of Shared Memory Workloads on Multiprocessor Systems, 2007
- Real-world buffer overflow protection for userspace & kernelspace, 2008
- ASLR Smack & Laugh Reference: Seminar on Advanced Exploitation Techniques, 2008
- Comprehensively and efficiently protecting the heap, 2006
- Hardened OS exploitation techniques, 2004
- A Security Architecture for Microprocessors, 2003
- Hypervisor support for identifying covertly executing binaries, 2008
- Using instruction block signatures to counter code injection attacks, 2005
- Automatic generation of buffer overflow attack signatures: An approach based on program behavior models, 2005
- Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software, 2006
- Bezoar: Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks, 2007
- Deploying dynamic code transformation in modern computing environments, 2006
- Binary rewriting and call interception for efficient runtime protection against buffer overflows, 2006
- Control-flow integrity: Principles, implementations, and applications, 2005
- Randomized instruction set emulation, 2005
- Implementation vulnerabilities and detection, 2007
- Proactive Obfuscation, 2009
- Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space, 2009
- An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors, 2006
- Paladin: Helping Programs Help Themselves with System Call Interposition, 2009
- Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities, 2009
- Classification of Malicious Distributed SELinux Activities, 2009
- Polymorphing Software By Randomizing Data Structure Layout, 2009
- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks, 2009
- Finding the Bad in Good Code: Automated Return-Oriented Programming Exploit Discovery, 2009
- Experimental Validation of Architectural Solutions, 2009
- Multi-Variant Execution: Run-Time Defense against Malicious Code Injection Attacks, 2009
- Breaking the memory secrecy assumption, 2009
- Security by Design, 2009
- The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture, 2009
- Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms, 2009
- Specification and evaluation of polymorphic shellcode properties using a new temporal logic, 2009
- Yataglass: Network-level Code Emulation for Analyzing Memory-scanning Attacks, 2009
- Protecting Xen hypercalls, 2009
- The Impact of Linux Superuser Privileges on System and Data Security Within a Cloud Computing Storage Architecture, 2009
- An Examination of the Generic Memory Corruption Exploit Prevention Mechanisms on Apple's Leopard Operating System, 2009
- A System Call Randomization Based Method for Countering Code-Injection Attacks, 2009
- Surgically returning to randomized lib (c), 2009
- Architecture Support for Operating System Survivability and Efficient Bulk Memory Copying and Initialization, 2009
- Leveraging Parallel Hardware to Detect, Quarantine, and Repair Malicious Code Injection, 2010
- Malicious Shellcode Detection with Virtual Memory Snapshots, 2010
- Program Differentiation, 2010
- A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC, 2008
- Intrusion detection for resource-constrained embedded control systems in the power grid, 2012
- Development of an Effective Runtime Defense Algorithm for Web Application Security, 2012
- RGBDroid: a novel response-based approach to android privilege escalation attacks, 2012
- Stack Layout Transformation: Towards Diversity for Securing Binary Programs, 2012
- Effects of Memory Randomization, Sanitization and Page Cache on Memory Deduplication, 2012
- A Dynamic Detective Method against ROP Attack on ARM Platform, 2012
- Functionality-based application confinement: A parameterised and hierarchical approach to policy abstraction for rule-based application-oriented access controls, 2012
- STABILIZER: Statistically Sound Performance Evaluation, 2013
- Composable and reusable whole-system offline dynamic analysis, 2012
- Light-weight bounds checking, 2012
- Safe Loading A Foundation for Secure Execution of Untrusted Programs, 2012
- Body armor for binaries: preventing buffer overflows without recompilation, 2012
- Memento: Learning Secrets from Process Footprints, 2012
- An Empirical Study of Memory Sharing in Virtual Machines, 2012
- Automatic generation of policies and roles for role based access control [patent], 2011
- Secure sandboxing solution for GNU/Linux, 2011
- Attack Surface Reduction For Commodity OS Kernels, 2011
- A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds, 2011
- Lightweight intrusion detection for resource-constrained embedded control systems, 2011
- Identifying native applications with high assurance, 2011
- Enforcing kernel constraints by hardware-assisted virtualization, 2011
- An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS, 2011
- Autoscopy Jr.: Intrusion Detection for Embedded Control Systems, 2011
- PIGA-HIPS: Protection of a shared HPC cluster, 2011
- Practical Data-Leak Prevention for Legacy Applications in Enterprise Networks, 2011
- Runtime Attacks: Buffer Overflow and Return-Oriented Programming, 2011
- RIPE: runtime intrusion prevention evaluator, 2011
- Efficient detection of the return-oriented programming malicious code, 2011
- Knowledge Base Model for the Linux Kernel, 2011
- Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables, 2011
- Address space randomization for mobile devices, 2011
- Q: Exploit Hardening Made Easy, 2011
- Jump-oriented programming: A new class of code-reuse attack, 2011
- Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques Without Native Executable Code, 2011
- Privilege escalation attacks on Android, 2011
- Revisiting address space randomization, 2011
- In-Execution Dynamic Malware Analysis and Detection by Mining Information in Process Control Blocks of Linux OS, 2011
- Securing The Kernel via Static Binary Rewriting and Program Shepherding, 2011
- Effectiveness of Moving Target Defenses, 2011
- On the Expressiveness of Return-into-libc Attacks, 2011
- A Robust Kernel-Based Solution to Control-Hijacking Buffer Overflow Attacks, 2011
- ROPdefender: A detection tool to defend against return-oriented programming attacks, 2011
- Mitigating code-reuse attacks with control-flow locking, 2011
- Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems, 2011
- Fine-grained user-space security through virtualization, 2011
- A study of self-propagating mal-packets in sensor networks: Attacks and defenses, 2011
- Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures, 2011
- Faults in Linux: Ten years later, 2011
- Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution, 2011
- DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations, 2011
- Detecting polymorphic threats [patent], 2010
- Countering polymorphic malicious computer code through code optimization [patent], 2009
- Dynamic out-of-process software components isolation for trustworthiness execution [patent], 2009
- Opening computer files quickly and safely over a network [patent], 2009
- Secure execution of a computer program [patent], 2009
- Method of address space layout randomization for windows operating systems [patent], 2010
- System and method for monitoring interactions between application programs and data stores [patent], 2010
- Secure execution of a computer program using a code cache [patent], 2009
- Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems, 2009
- Security through diversity: Leveraging virtual machine technology, 2009
- Protecting a computer coupled to a network from malicious code infections [patent], 2008
- Evaluation of Linux Security Frameworks, 2010
- Security in Web Applications and the Implementing of a Ticket Handling System, 2014
- Quantifiable Run-time Kernel Attack Surface Reduction, 2013
- FIREAXE: The DHS Secure Design Competition Pilot, 2012
- Vulnerability Discovery with Attack Injection Software, 2013
- ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection, 2013
- LGadget: ROP Exploit based on Long Instruction Sequences, 2013
- Protecting Function Pointers in Binary, 2013
- Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring, 2013
- Towards Formal Verification of Liferay RBAC, 2013
- Buffer Overflow Attack Blocking Using MCAIDS - Machine Code Analysis Intrusion Detection System, 2013
- Layout Randomization and Nondeterminism, 2014
- Booby Trapping Software, 2013
- Applications of Cybernetics and Control Theory for a New Paradigm in Cybersecurity, 2013
- SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks, 2014
- Analyzing the Security of Windows 7 and Linux for Cloud Computing, 2012
- Run-time Control Flow Authentication: An Assessment on Contemporary X86 Platforms, 2013
- Deadbolt: Locking Down Android Disk Encryption, 2013
- A Formal Model and Correctness Proof for an Access Control Policy Framework, 2013
- High Assurance Models for Secure Systems, 2013
- Operating System Security by Integrity Checking and Recovery Using Write-protected Storage, 2013
- Malicious Code Execution Prevention through Function Pointer Protection, 2013
- An Approach to Stack Overflow Counter-measures Using Kernel Properties, 2013
- Marlin: A fine grained randomization approach to defend against ROP attacks, 2013
- Defending against heap overflow by using randomization in nested virtual clusters, 2013
- ModuleGuard: A Gatekeeper for Dynamic Module Loading Against Malware, 2013
- SecGOT: Secure Global Offset Tables in ELF Executables, 2013
- iProbe: A lightweight user-level dynamic instrumentation tool, 2013
- On Layout Randomization for Arrays and Functions, 2013
- JSGuard: Shellcode Detection in JavaScript, 2012
- Profile-guided Automated Software Diversity, 2013
- HeapSentry: Kernel-assisted Protection against Heap Overflows, 2013
- Gadge Me If You Can, 2013
- Systematic Analysis of Defenses Against Return-Oriented Programming, 2013
- Practical Control Flow Integrity & Randomization for Binary Executables, 2013
- SoK: Eternal War in Memory, 2013
- Practical Timing Side Channel Attacks Against Kernel Space ASLR, 2013
- ASIST: Architectural Support for Instruction Set Randomization, 2013
- A Systematic Analysis of Defenses Against Code Reuse Attacks, 2013
- SafeStack: Automatically Patching Stack-based Buffer Overflow Vulnerabilities, 2013
- SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks, 2013
- CPM: Masking Code Pointers to Prevent Code Injection Attacks, 2013
- FrankenSSL: Recombining Cryptographic Libraries to Create Software Variants, 2016
- Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems, 2016
- Intrusion Prevention and Detection in Grid Computing-The ALICE Case, 2015
- Firmwall: Protecting hard disk firmware, 2014
- Sandboxing in Linux: From Smartphone to Cloud, 2016
- Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite, 2016
- Reins to the Cloud: Compromising Cloud Systems via the Data Plane, 2016
- From chroot over containers to Docker, 2016
- Security Analysis of Linux Kernel Features for Embedded Software Systems in Vehicles, 2015
- Towards Access Control for Isolated Applications, 2016
- Apate Interpreter-A Kernel Hook Rule Engine, 2015
- Kernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance, 2014
- Hypervisor-vs. Container-based Virtualization, 2016
- Pitfalls of virtual machine introspection on modern hardware, 2014
- A Cyber Attack-Resilient Server Using Hybrid Virtualization, 2016
- Process Table Covert Channels: Exploitation and Countermeasures, 2016
- Secure Authentication: Eliminating Possible Backdoors in Client-Server Endorsement, 2016
- Writing parsers like it is 2017, 2017
- A visitation of sysdig, 2014
- Dynamic reconstruction of relocation information for stripped binaries, 2014
- Mitigation of Virtunoid Attacks on Cloud Computing Systems, 2015
- Bridging the detection gap: a study on a behavior-based approach using malware techniques, 2014
- Android patching from a mobile device management perspective, 2014
- Security by design, 2016
- Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity, 2017
- Virtual Machine Introspection with Xen on ARM, 2015
- A Tour Beyond BIOS-Security Enhancement to Mitigate Buffer Overflow in UEFI, 2016
- SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities, 2017
- Defeating ROP Through Dynamically Encrypted Return Addresses, 2014
- HARES: Hardened anti-reverse engineering system, 2015
- Apate-A Linux Kernel Module for High Interaction Honeypots, 2015
- Process authentication for high system assurance, 2014
- Breaking Active-Set Backward-Edge Control-Flow Integrity, 2017
- NFV: Security Threats and Best Practices, 2017
- Protecting Commodity Operating Systems through Strong Kernel Isolation, 2015
- Interrupt-oriented Bugdoor Programming: A minimalist approach to bugdooring embedded systems firmware, 2014
- Data Is Flowing in the Wind: A Review of Data-Flow Integrity Methods to Overcome Non-Control-Data Attacks, 2016
- Security analysis of mobile two-factor authentication schemes, 2014
- Advancing Future Network Science through Content Understanding, 2014
- Detecting Stack Layout Corruptions with Robust Stack Unwinding, 2016
- How the ELF Ruined Christmas, 2015
- Own Your Android! Yet Another Universal Root, 2015
- Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments, 2015
- Measuring the Impact of Spectre and Meltdown, 2018
- Anomaly Detection for RBAC Systems in UNIX/Linux Environment with User Behavior, 2018
- On the Effectiveness of Type-based Control Flow Integrity, 2018
- Taking Control of SDN-based Cloud Systems via the Data Plane, 2018
- SoK: Make JIT-Spray Great Again, 2018
- Towards Linux Kernel Memory Safety, 2018
- On the Effectiveness of Control-Flow Integrity Against Modern Attack Techniques, 2019
- Categorizing container escape methodologies in multi-tenant environments, 2018
- Component-oriented access control - Application servers meet tuple spaces for the masses, 2018
- FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities, 2018
- Mitigating Data Leakage by Protecting Memory-resident Sensitive Data, 2019
- A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory, 2018
- Control-Flow Integrity for the Linux kernel: A Security Evaluation, 2019
- Control-Flow Integrity: Attacks and Protections, 2019
- IskiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks, 2019
- Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS, 2018
- Examining the Network & Security Infrastructure of Skype Mobile Application, 2018
- Efficient security analysis of Administrative Access Control Policies, 2018
- Exploiting stack-based buffer overflow using modern day techniques, 2019
- Address space layout randomization next generation, 2019
- Evaluating Approaches for Detecting and Eliminating Memory Safety Errors in Linux Kernel Programming, 2019
- Hiding in the Shadows: Empowering ARM for Stealthy Virtual Machine Introspection, 2018
- Pex: A Permission check analysis framework for linux kernel, 2019
- Categorizing and predicting invalid vulnerabilities on common vulnerabilities and exposures, 2018
- A tool to compute approximation matching between windows processes, 2018
- Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking, 2018
- Dissecting QNX, 2018
- Industrial experiences with resource management under software randomization in ARIN653 avionics environments, 2018
- Diversity and information leaks, 2018
- Towards the Hypervision of Hardware-based Control Flow Integrity for Arm Platforms, 2019
- A binary-compatible unikernel, 2019
- A binary analysis approach to retrofit security in input parsing routines, 2018
- {KEPLER}: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities, 2019
- SlimGuard: Design and Implementation of a Memory Efficient and Secure Heap Allocator, 2020
- Code-Pointer Integrity, 2014
- Leakage is prohibited: memory protection extensions protected address space randomization, 2019
- KALD: Detecting Direct Pointer Disclosure Vulnerabilities, 2019
- Hardware control flow integrity, 2018
- Checked C: Making C safe by extension, 2018
- Security and Performance Analysis of Custom Memory Allocators, 2019
- ROPMate: Visually Assisting the Creation of ROP-based Exploits, 2018
- Cloud Platform for the Deployment of Online Data Analytics Application Oriented Services, 2018
- Sleak: automating address space layout derandomization, 2019
- Verifying Data-Oriented Gadgets in Binary Programs to Build Data-Only Exploits, 2018
- OS-level Attacks and Defenses: from Software to Hardware-based Exploits, 2019
- Arhuaco: Deep Learning and Isolation Based Security for Distributed High-Throughput Computing, 2019
- Achieving safety incrementally with checked c, 2019
- Technical Report: A Toolkit for Runtime Detection of Userspace Implants, 2019
- Designing Practical Software Bug Detectors Using Commodity Hardware and Common Programming Patterns, 2020
- Operating Systems & Virtualisation Security, 2019
- The ROP needle: hiding trigger-based injection vectors via code reuse, 2019
- KASLR-MT: Kernel Address Space Layout Randomization for Multi-Tenant cloud systems, 2020
- Automatic Exploitation of Fully Randomized Executables, 2019
- Idols with Feet of Clay: On the Security of Bootloaders and Firmware Updaters for the IoT, 2019
- Integrity verification of Docker containers for a lightweight cloud environment, 2019
- Nibbler: debloating binary shared libraries, 2019
- Is Less Really More? Why Reducing Code Reuse Gadget Counts via Software Debloating Doesn't Necessarily Lead to Better Security, 2019
- Block oriented programming: Automating data-only attacks, 2018
- Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers, 2019
- Automated vulnerability detection system based on commit messages, 2019
- SGXJail: Defeating Enclave Malware via Confinement, 2019
- Shredder: Breaking exploits through API specialization, 2018
- DR. SGX: automated and adjustable side-channel protection for SGX using data location randomization, 2019
- gExtractor: Towards Automated Extraction of Malware Deception Parameters, 2018
- Emerging Trends, Techniques and Open Issues of Containerization: A Review, 2019
- Testbed Design For Evaluation Of Active Cyber Defense Systems, 2018
- Vulnerability-tolerant secure architectures, 2018
- Enforcing unique code target property for control-flow integrity, 2018
- Back To The Epilogue: Evading Control Flow Guard via Unaligned Targets, 2018
- ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels, 2019
- Binary debloating for security via demand driven loading, 2019
- Multi-variant execution environments, 2018
- Slicedup: A Tenant-Aware Memory Deduplication for Cloud Computing, 2018
- Silhouette: Efficient Intra-Address Space Isolation for Protected Shadow Stacks on Embedded Systems, 2019
- {ACES}: Automatic Compartments for Embedded Systems, 2018
- STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming, 2019
- TF-BIV: transparent and fine-grained binary integrity verification in the cloud, 2019
- FIXER: Flow Integrity Extensions for Embedded RISC-V, 2019
- SADAN: Scalable Adversary Detection in Autonomous Networks, 2019
- Opportunistic Diversity-Based Detection of Injection Attacks in Web Applications, 2018
- Hardware-assisted memory safety, 2020
- {DEEPVSA}: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis, 2019
- A Survey of Research on Runtime Rerandomization Under Memory Disclosure, 2019
- From proof-of-concept to exploitable, 2019
- On the Effectiveness of Hardware Enforced Control Flow Integrity, 2018
- Exploiting Memory Corruption Vulnerabilities in Connman for IoT Devices, 2019
- From IP ID to Device ID and KASLR Bypass (Extended Version), 2019
- Investigation of x64 glibc heap exploitation techniques on Linux, 2019
- HW-CDI: Hard-Wired Control Data Integrity, 2019
- Evaluation of Register Number Abstraction for Enhanced Instruction Register Files, 2018
- Detecting and Surviving Intrusions: Exploring New Host-Based Intrusion Detection, Recovery, and Response Approaches, 2019
- Defeating denial-of-service attacks in a self-managing N-variant system, 2019
- Built-in Return Oriented Programs in Embedded Systems and Deep Learning for Hardware Trojan Detection, 2019
- BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation, 2018
- Development and Evaluation of a Generic Framework for Sensor Data Acquisition, Aggregation and Propagation in HPC Systems, 2019
- Survey of randomization defenses on cloud computing, 2018
- Code-less patching for heap vulnerabilities using targeted calling context encoding, 2018
- HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding, 2019
- iReplayer: in-situ and identail record-and-replay for multithreaded applications, 2018
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution, 2019
- To detect stack buffer overflow with polymorphic canaries, 2018
- DOPdefenderPlus: a data-oriented programming attack mitigation technique for complex software, 2019
- GMOD: a dynamic GPU memory overflow detector, 2018
- Position-independent code reuse: On the effectiveness of ASLR in the absence of information disclosure, 2018
- A tutorial on software obfuscation, 2018
- DRIVE: Dynamic Runtime Integrity Verification and Evaluation, 2018
- Identification and Exploitation of Vulnerabilities in a Large-Scale ITSystem, 2019
- On the Pitfalls and Vulnerabilities of Schedule Randomization against Schedule-Based Attacks, 2019
- SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation, 2019
- Extension Framework for file systems in user space, 2019
- Morpheus: A vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn, 2019
- Compiler-assisted code randomization, 2018
- Speculose: Analyzing the security implications of speculative execution in CPUs, 2018
- RVFUZZER: finding input validation bugs in robotic vehicles through control-guided testing, 2019
- Using Safety Properties to Generate Vulnerability Patches, 2019
- Record-replay architecture as a general security framework, 2018
- Fine-CFI: Fine-grained control flow integrity for operating system kernels, 2018
- Leveraging Processor Features for System Security, 2019
- Finding and Mitigating Memory Corruption Errors in Systems Software, 2018
- Mitigating Memory Randomization Weaknesses via Moving Target Defense, 2018
- Defeating Code-Reuse Attacks with Binary Instrumentation, 2018
- Kernel protection against just-in-time code reuse, 2019
- Efficient Anomalous Behavior Detection on ARM using the Debug Interface, 2018
- Making Code Re-randomization Practical with MARDU, 2019
- Security Applications of Static Program Analysis, 2018
- A Survey of various threats and current state of security in android platform, 2019
- Automated CFI Policy Assessment with Reckon, 2018
- REPICA: Rewriting Position Independent Code of ARM, 2018
- From hack to elaborate technique - a survey on binary rewriting, 2019
- Finding Focus in the Blur of Moving Target Techniques [abstract], 2013
- Diversity in Cloud Systems Through Runtime and Compile-time Relocation [abstract], 2013
- HyperCheck: A Hardware-Assisted Integrity Monitor [abstract], 2013
- A secure architecture design based on application isolation, code minimization and randomization [abstract], 2013
- Defending Return-oriented Programming Based on Virtualization Techniques [abstract], 2013
- Diversifying the Software Stack Using Randomized NOP Insertion [abstract], 2013
- JITSafe: A Framework Against Just-in-time Spraying Attacks [abstract], 2013
- Detecting Return Oriented Programming by Examining Positions of Saved Return Addresses [abstract], 2013
- Defense against Stack-Based Attacks Using Speculative Stack Layout Transformation [abstract], 2013
- Mandatory Access Control with a Multi-level Reference Monitor: PIGA-cluster [abstract], 2013
- Detecting Code Injection Attacks at TLB Miss [abstract], 2013
- Software Crash Analysis for Automatic Exploit Generation on Binary Programs [abstract], 2014
- Software Cruising: A New Technology for Building Concurrent Software Monitor [abstract], 2014
- Permanent protection of information systems with method of automated security and integrity control [abstract], 2010
- The dark side of the Internet: Attacks, costs and responses [abstract], 2011
- Implicit Buffer Overflow Protection Using Memory Segregation, 2011
- OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel [abstract], 2011
- Automatic construction of jump-oriented programming shellcode (on the x86) [abstract], 2011
- Compiler-Generated Software Diversity, 2011
- Securing heap memory by data pointer encoding [abstract], 2011
- JITDefender: A Defense against JIT Spraying Attacks [abstract], 2011
- Spy vs. Spy: counter-intelligence methods for backtracking malicious intrusions [abstract], 2011
- Enhancing MAC Security Model with Meta-Policy approach using an Intelligent Anomaly based HIDS [abstract], 2011
- Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs [abstract], 2011
- Advanced MAC in HPC systems: performance improvement [abstract], 2012
- Surreptitious Deployment and Execution of Kernel Agents in Windows Guests [abstract], 2012
- Survey on malware evasion techniques: State of the art and challenges [abstract], 2012
- A New Data Randomization Method to Defend Buffer Overflow Attacks [abstract], 2012
- Directed Hidden-Code Extractor for Environment-Sensitive Malwares [abstract], 2012
- Improving Mandatory Access Control for HPC Clusters [abstract], 2012
- A Novel Approach Against the System Buffer Overflow [abstract], 2010
- Automated Software Vulnerability Analysis [abstract], 2009
- Probability Based Risk Analysis for a VoIP System [abstract], 2009
- A DLL Protection Mechanism with Larger Random Entropy for Windows Vista [abstract], 2009
- Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks [abstract], 2009
- Address-space layout randomization using code islands [abstract], 2009
- Security Systems Design and Analysis Using an Integrated Rule-Based Systems Approach [abstract], 2005
- AIFD: A Runtime Solution to Buffer Overflow Attack [abstract], 2007
- Hardware Stack Design: Toward an Effective Defence Against Frame Pointer Overwrite Attacks [abstract], 2006
- An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks [abstract], 2005
- Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems [abstract], 2006
- Enforcement of Integrated Security Policy in Trusted Operating Systems [abstract], 2007
- Application of an Online Judge & Contester System in Academic Tuition [abstract], 2008
- Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks [abstract], 2006
- Rootkit modeling and experiments under Linux [abstract], 2008
- PrISM: Automatic Detection and Prevention from Cyber Attacks [abstract], 2008
- A Theory of Secure Control Flow [abstract], 2005
- Detection and Diagnosis of Control Interception [abstract], 2008
- Efficient and Practical Control Flow Monitoring for Program Security [abstract], 2008
- Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks [abstract], 2007
- Linux 2.6 kernel exploits [abstract], 2007
- A Policy Language for the Extended Reference Monitor in Trusted Operating Systems [abstract], 2007
- Intrusion detection and security policy framework for distributed environments [abstract], 2005
- Integration of trusted operating system from open source [abstract], 2003
- Towards the specification of access control policies on multiple operating systems [abstract], 2004
- Detecting kernel-level rootkits through binary analysis [abstract], 2004
- A Collaborative Approach for Access Control, Intrusion Detection and Security Testing [abstract], 2006
- Buffer overflow protection based on adjusting code segment limit [abstract], 2005
- The Design of a Generic Intrusion Tolerant Architecture for Web Servers [abstract], 2008
- Supporting access control policies across multiple operating systems [abstract], 2005
- Model-driven configuration of os-level mandatory access control: research abstract [abstract], 2008
- A simple implementation and performance evaluation extended-role based access control [abstract], 2005
- Design space and analysis of worm defense strategies [abstract], 2006
- ASSURE: automatic software self-healing using rescue points [abstract], 2009
- Self-healing control flow protection in sensor applications [abstract], 2009
- Return Protector: A Protection Mechanism for Return-into-libc Attacks by Checking the Return Address [abstract], 2009
- A specification language for information security policies [abstract], 2009
- DROP: Detecting Return-Oriented Programming Malicious Code [abstract], 2009
- Enforcement of Security Properties for Dynamic MAC Policies [abstract], 2009
- Generation of Role Based Access Control Security Policies for Java Collaborative Applications [abstract], 2009
- A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability [abstract], 2009
- Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems [abstract], 2015
- Protecting sensitive information in the volatile memory from disclosure attacks [abstract], 2016
- Monitoring translation lookahead buffers to detect code injection attacks [abstract], 2014
- Implementing a vertically hardened DNP3 control stack for power applications [abstract], 2016
- Complex event processing for reactive security monitoring in virtualized computer systems [abstract], 2015
- Providing Security in Container-Based HPC Runtime Environments [abstract], 2016
- Behavior based authentication mechanism to prevent malicious code attacks in windows [abstract], 2015
- Agent based public audit for secured cloud storage [abstract], 2015
- Attack Mitigation by Data Structure Randomization [abstract], 2016
- LRBAC: Flexible function-level hierarchical role based access control for Linux [abstract], 2015
- All your cluster-grids are belong to us: Monitoring the (in) security of infrastructure monitoring systems [abstract], 2015
- Umbra: Embedded Web Security Through Application-Layer Firewalls [abstract], 2015
- Randomization Can't Stop BPF JIT Spray [abstract], 2017
- Design and Implementation of Efficient Mitigation against Return-oriented Programming [abstract], 2014
- Improvement of Runtime Intrusion Prevention Evaluator (RIPE) [abstract], 2015
- Dynaguard: Armoring canary-based protections against brute-force attacks [abstract], 2015
- Detection Mechanism against Code Re-use Attack in Stack region [abstract], 2014
- Securing the cloud using Quantum Networking protocols [abstract], 2016
- Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data? [abstract], 2015
- StemJail: Dynamic Role Compartmentalization [abstract], 2016
- Caml crush: A pkcs#11 filtering proxy [abstract], 2014
- Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices [abstract], 2016
- A tale of two kernels: Towards ending kernel hardening wars with split kernel [abstract], 2014
- Component-oriented access control -- Application servers meet tuple spaces for the masses [abstract], 2017
- Toward preventing stack overflow using kernel properties [abstract], 2014
- Control jujutsu: On the weaknesses of fine-grained control flow integrity [abstract], 2015
- ROPMEMU: A framework for the analysis of complex code-reuse attacks [abstract], 2016
- SAFECode whitepaper: fundamental practices for secure software development [abstract], 2014
- Mandatory access protection within cloud systems [abstract], 2014
- Secure patrol: Patrolling against buffer overflow exploits [abstract], 2014
- DATAEvictor: To Reduce the Leakage of Sensitive Data Targeting Multiple Memory Copies and Data Lifetimes [abstract], 2014
- Fusion Trust Service Assessment for Crisis Management Environments [abstract], 2016
- A Systematic Exploit Strengthening Method Integrating with Penetration Testing Framework [abstract], 2015
- You can run but you can't read: Preventing disclosure exploits in executable code [abstract], 2014
- KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism [abstract], 2019
- A Survey of Code Reuse Attack and Defense [abstract], 2018
- A Correlation-aware Diverse Variant Placement to Increase Network Resilience [abstract], 2018
- Feedback control can make data structure layout randomization more cost-effective under zero-day attacks [abstract], 2018
- Low-Level Memory Attacks on Automotive Embedded Systems [abstract], 2018
- MTD Techniques for memory protection against zero-day attacks [abstract], 2019
- Evaluating control-flow restricting defenses [abstract], 2018
- Safe trans loader: mitigation and prevention of memory corruption attacks for released binaries [abstract], 2018
- A Comprehensive Detection of Memory Corruption Vulnerabilities for C/C++ Programs [abstract], 2018
- How memory safety violations enable exploitation of programs [abstract], 2018
- CloudCFI: Context-Sensitive and Incremental CFI in the Cloud Environment [abstract], 2019
- Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment [abstract], 2019
- How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems [abstract], 2018
- Protecting dynamic code [abstract], 2018
- Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks [abstract], 2020
- Profile-guided code identification and hardening using return oriented programming [abstract], 2019
- SMP: A New Mechanism to Mitigate Control-Flow Hijacking Attacks [abstract], 2018
- Attacking dynamic code [abstract], 2018
- Dynamic reencryption of return addresses [abstract], 2018
- Data-flow bending: On the effectiveness of data-flow integrity [abstract], 2019
- gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception [abstract], 2019
- DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton [abstract], 2019
- Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity [abstract], 2019
- STACKEEPER: A Static Source Code Analzyer to Detect Stack-based Uninitialized Use Vulnerabilities [abstract], 2018
- A survey of side-channel attacks on caches and countermeasures [abstract], 2018
- A survey on the moving target defense strategies: An architectural perspective [abstract], 2019
- Tmdfi: Tagged memory assisted for fine-grained data-flow integrity towards embedded systems against software exploitation [abstract], 2018
- An exploratory analysis of microcode as a building block for system defenses [abstract], 2018
- Exploiting buffer overflow vulnerabilities in software defined radios [abstract], 2018
- Breakpad: Diversified Binary Crash Reporting [abstract], 2018
- Semi-synchronized Non-blocking Concurrent Kernel Cruising [abstract], 2020
- Real-Time Address Leak Detection on the Dynamorio Platform Using Dynamic Taint Analysis [abstract], 2018
- Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes [abstract], 2018
- Function-oriented programming: A new class of code reuse attack in c applications [abstract], 2018
- MicroGuard: Securing Bare-Metal Microcontrollers against Code-Reuse Attacks [abstract], 2019
- A Survey of Exploitation Techniques and Defenses for Program Data Attacks [abstract], 2020
- HarTBleed: Using Hardware Trojans for Data Leakage Exploits [abstract], 2020
- Predictability of IP address allocations for cloud computing platforms [abstract], 2019
- Secure and Efficient Control Data Isolation with Register-based Data Cloaking [abstract], 2019
- Layered Object-Oriented Programming: Advanced VTable Reuse Attacks on Binary-Level Defense [abstract], 2018