More News >>  

Install Stable:
2.2.0-2.6.32.19
Last updated: 08/19/10

Test:
2.2.0-2.6.34.4
Last updated: 08/19/10
Academic Research Publications Mentioning grsecurity/PaX
We provide below links to academic research papers publications which mention grsecurity and/or PaX. If the full text PDF of the publication was not available, a link to its abstract is given. If you know of, or are the author of a research paper which should be included here, please contact me.
1. Microsoft Research - RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization, 2007

2. Microsoft Research - Data Randomization, 2008

3. Microsoft Research - Control-flow integrity, 2005

4. StackGhost: Hardware Facilitated Stack Protection, 2001

5. Secure program execution via dynamic information flow tracking, 2006

6. Type-Assisted Dynamic Buffer Overflow Detection, 2002

7. Address obfuscation: An efficient approach to combat a broad range of memory error exploits, 2003

8. Protecting global and static variables from buffer overflow attacks without overhead, 2006

9. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths, 2004

10. A Methodology for Designing Countermeasures Against Current and Future Code Injection Attacks, 2005

11. e-nexsh: Achieving an effectively non-executable stack and heap via system-call policing, 2005

12. Stackguard: Simple smash stack protection for GCC, 2003

13. Run-time detection of heap-based overflows, 2003

14. Avoiding Buffer Overflows and Related Problems, 2004

15. Server Protection through Dynamic Patching, 2005

16. SELinux and grsecurity: A Side-by-Size Comparison of Mandatory Access Control and Access Control List Implementations, 2003

17. SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements, 2003

18. RSBAC-a framework for enhanced Linux system security, 2005

19. Secure computing: SELinux, 2007

20. Attacking Signed Binaries, 2005

21. Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach, 2006

22. Formalisation et garantie de propriétés de sécurité système: application à la détection d'intrusions, 2007

23. Securing a Linux-based Multi-User Web Server, 2006

24. Exploiting 802.11 Wireless Driver Vulnerabilities on Windows, 2006

25. Détection D'intrusion Orientée Méta-Politique, 2005

26. Abstract Efficient Techniques for Comprehensive Protection from Memory Error Exploits, 2005

27. Predicting Security Vulnerabilities from Function Calls, 2007

28. ARMORY: An auxiliary testing tool for automatic buffer overflow vulnerability detection, 2008

29. Next generation debuggers for reverse engineering, 2007

30. Centralized security policy support for virtual machine, 2006

31. Secure remote management and software distribution for wireless mesh networks, 2007

32. Attack-Redirector: A Server Protection and Honeypot Bait System, 2008

33. A novel approach for distributed updates of MAC policies using a meta-protection framework, 2004

34. A Linux Implementation of Temporal Access Controls, 2007

35. FormatShield: A Binary Rewriting Defense against Format String Attacks, 2008

36. Playing with ptrace() for fun and profit, 2006

37. Increasing Information Security with Mandatory Access Controls in the Operating System, 2006

38. Address Space Layout Permutation: Increasing Resistance to Memory Corruption Attacks, 2005

39. Automatic Synthesis of Filters to Discard Buffer Overflow Attacks: A Step Towards Realizing Self-Healing Systems, 2005

40. On the effectiveness of address-space randomization, 2004

41. Collaboration between MAC Policies and IDS based on a Meta-Policy approach, 2006

42. An Architectural Approach to Preventing Code Injection Attacks, 2007

43. Alternative Xbox copy protection designs, 2005

44. Software Security through Targeted Diversification, 2007

45. Code Injection Attacks on Harvard-Architecture Devices, 2008

46. When good instructions go bad: generalizing return-oriented programming to RISC, 2008

47. Covert Debugging Circumventing Software Armoring Techniques, 2007

48. Buffer Overflow Vulnerabilities: Exploits and Defensive Techniques, 2004

49. Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities, 2008

50. The FOREVER service for fault/intrusion removal, 2008

51. Detection and Subversion of Virtual Machines, 2006

52. Persistence in dynamic code transformation systems, 2005

53. Panel: The Future of Biologically-Inspired Security: Is There Anything Left to Learn?, 2007

54. Improved Network Security and Disguising TCP/IP Fingerprint through Dynamic Stack Modification, 2005

55. Corruption de la Memoire lors de l'Exploitation, 2006

56. Defeating memory corruption attacks via pointer taintedness detection, 2005

57. Immunology, diversity, and homeostasis: The past and future of biologically inspired computer defenses, 2007

58. Insecure Context Switching: Inoculating regular expressions for survivability, 2008

59. Ensuring secure program execution in multiprocessor embedded systems: a case study, 2007

60. Defeating Compiler-Level Buffer Overflow Protection, 2006

61. Reverse Stack Execution, 2007

62. Secure and practical defense against code-injection attacks using software dynamic translation, 2006

63. Omniunpack: Fast, generic, and safe unpacking of malware, 2007

64. Prevention of code-injection attacks by encrypting system call arguments, 2006

65. Non-control-data attacks are realistic threats, 2005

66. Combating Memory Corruption Attacks On Scada Devices, 2008

67. Address-space randomization for Windows systems, 2006

68. DieHard: Probabilistic memory safety for unsafe languages, 2006

69. Secure Bit: Transparent, Hardware Buffer-Overflow Protection, 2006

70. Improving address space randomization with a dynamic offset randomization technique, 2006

71. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique, 2005

72. Known/chosen key attacks against software instruction set randomization, 2006

73. A Survey of Randomization Techniques Against Common Mode Attacks, 2005

74. An immune system inspired approach for protection from repetitive attacks, 2005

75. Efficient protection against heap-based buffer overflows without resorting to magic, 2006

76. Resilient Intrusion Tolerance through Proactive and Reactive Recovery, 2007

77. Virtual machine-provided context sensitive page mappings, 2008

78. Persistent code caching: Exploiting code reuse across executions and applications, 2007

79. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), 2007

80. ARCHERR: Runtime environment driven program safety, 2004

81. Foreign Code Detection on the Windows/X86 Platform, 2006

82. Where's the FEEB?: The effectiveness of instruction set randomization, 2005

83. Efficient techniques for comprehensive protection from memory error exploits, 2005

84. Exterminator: Automatically correcting memory errors with high probability, 2007

85. Automatic diagnosis and response to memory corruption vulnerabilities, 2005

86. Data space randomization, 2008

87. The Evolution of System-Call Monitoring, 2008

88. MemSherlock: an automated debugger for unknown memory corruption vulnerabilities, 2007

89. DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks, 2004

90. A practical mimicry attack against powerful system-call monitors, 2008

91. SigFree: A Signature-free Buffer Overflow Attack Blocker, 2006

92. Kernel Support for Redundant Execution on Multiprocessor Systems, 2007

93. Kernel Support for Deterministic Redundant Execution of Shared Memory Workloads on Multiprocessor Systems, 2007

94. Real-world buffer overflow protection for userspace & kernelspace, 2008

95. ASLR Smack & Laugh Reference: Seminar on Advanced Exploitation Techniques, 2008

96. Comprehensively and efficiently protecting the heap, 2006

97. Hardened OS exploitation techniques, 2004

98. A Security Architecture for Microprocessors, 2003

99. Hypervisor support for identifying covertly executing binaries, 2008

100. Using instruction block signatures to counter code injection attacks, 2005

101. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models, 2005

102. Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software, 2006

103. Bezoar: Automated Virtual Machine-based Full-System Recovery from Control-Flow Hijacking Attacks, 2007

104. Deploying dynamic code transformation in modern computing environments, 2006

105. Binary rewriting and call interception for efficient runtime protection against buffer overflows, 2006

106. Control-flow integrity: Principles, implementations, and applications, 2005

107. Randomized instruction set emulation, 2005

108. Implementation vulnerabilities and detection, 2007

109. Proactive Obfuscation, 2009

110. Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space, 2009

111. An Integrated Framework for Dependable and Revivable Architectures Using Multicore Processors, 2006

112. Paladin: Helping Programs Help Themselves with System Call Interposition, 2009

113. Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities, 2009

114. Classification of Malicious Distributed SELinux Activities, 2009

115. Polymorphing Software By Randomizing Data Structure Layout, 2009

116. Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks, 2009

117. Finding the Bad in Good Code: Automated Return-Oriented Programming Exploit Discovery, 2009

118. Experimental Validation of Architectural Solutions, 2009

119. Multi-Variant Execution: Run-Time Defense against Malicious Code Injection Attacks, 2009

120. Breaking the memory secrecy assumption, 2009

121. Security by Design, 2009

122. The Impact of Linux Superuser Privileges on System and Data Security within a Cloud Computing Storage Architecture, 2009

123. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms, 2009

124. Specification and evaluation of polymorphic shellcode properties using a new temporal logic, 2009

125. Yataglass: Network-level Code Emulation for Analyzing Memory-scanning Attacks, 2009

126. Protecting Xen hypercalls, 2009

127. The Impact of Linux Superuser Privileges on System and Data Security Within a Cloud Computing Storage Architecture, 2009

128. An Examination of the Generic Memory Corruption Exploit Prevention Mechanisms on Apple's Leopard Operating System, 2009

129. A System Call Randomization Based Method for Countering Code-Injection Attacks, 2009

130. Surgically returning to randomized lib (c), 2009

131. Architecture Support for Operating System Survivability and Efficient Bulk Memory Copying and Initialization, 2009

132. Leveraging Parallel Hardware to Detect, Quarantine, and Repair Malicious Code Injection, 2010

133. Malicious Shellcode Detection with Virtual Memory Snapshots, 2010

134. Program Differentiation, 2010

135. A Comprehensive Analysis of MAC Enhancements for Leveraging Distributed MAC, 2008

136. A Novel Approach Against the System Buffer Overflow [abstract], 2010

137. Automated Software Vulnerability Analysis [abstract], 2009

138. Probability Based Risk Analysis for a VoIP System [abstract], 2009

139. A DLL Protection Mechanism with Larger Random Entropy for Windows Vista [abstract], 2009

140. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks [abstract], 2009

141. Address-space layout randomization using code islands [abstract], 2009

142. Security Systems Design and Analysis Using an Integrated Rule-Based Systems Approach [abstract], 2005

143. AIFD: A Runtime Solution to Buffer Overflow Attack [abstract], 2007

144. Hardware Stack Design: Toward an Effective Defence Against Frame Pointer Overwrite Attacks [abstract], 2006

145. An Efficient Pointer Protection Scheme to Defend Buffer Overflow Attacks [abstract], 2005

146. Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems [abstract], 2006

147. Enforcement of Integrated Security Policy in Trusted Operating Systems [abstract], 2007

148. Application of an Online Judge & Contester System in Academic Tuition [abstract], 2008

149. Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks [abstract], 2006

150. Rootkit modeling and experiments under Linux [abstract], 2008

151. PrISM: Automatic Detection and Prevention from Cyber Attacks [abstract], 2008

152. A Theory of Secure Control Flow [abstract], 2005

153. Detection and Diagnosis of Control Interception [abstract], 2008

154. Efficient and Practical Control Flow Monitoring for Program Security [abstract], 2008

155. Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks [abstract], 2007

156. Linux 2.6 kernel exploits [abstract], 2007

157. A Policy Language for the Extended Reference Monitor in Trusted Operating Systems [abstract], 2007

158. Intrusion detection and security policy framework for distributed environments [abstract], 2005

159. Integration of trusted operating system from open source [abstract], 2003

160. Towards the specification of access control policies on multiple operating systems [abstract], 2004

161. Detecting kernel-level rootkits through binary analysis [abstract], 2004

162. A Collaborative Approach for Access Control, Intrusion Detection and Security Testing [abstract], 2006

163. Buffer overflow protection based on adjusting code segment limit [abstract], 2005

164. The Design of a Generic Intrusion Tolerant Architecture for Web Servers [abstract], 2008

165. Supporting access control policies across multiple operating systems [abstract], 2005

166. Model-driven configuration of os-level mandatory access control: research abstract [abstract], 2008

167. A simple implementation and performance evaluation extended-role based access control [abstract], 2005

168. Design space and analysis of worm defense strategies [abstract], 2006

169. ASSURE: automatic software self-healing using rescue points [abstract], 2009

170. Self-healing control flow protection in sensor applications [abstract], 2009

171. Return Protector: A Protection Mechanism for Return-into-libc Attacks by Checking the Return Address [abstract], 2009

172. A specification language for information security policies [abstract], 2009

173. DROP: Detecting Return-Oriented Programming Malicious Code [abstract], 2009

174. Enforcement of Security Properties for Dynamic MAC Policies [abstract], 2009

175. Generation of Role Based Access Control Security Policies for Java Collaborative Applications [abstract], 2009

176. A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability [abstract], 2009


Site design by Hal Bergman