All of lore.kernel.org
 help / color / mirror / Atom feed
* [kernel-hardening] Two interesting papers I've been reading (or, ASLR is not enough)
@ 2016-02-14 23:33 Theodore Ts'o
  0 siblings, 0 replies; only message in thread
From: Theodore Ts'o @ 2016-02-14 23:33 UTC (permalink / raw)
  To: kernel-hardening

Perhaps these techniques are well known in the security world (after
all, these papers are 2-3 years old), but I'm just a kernel progammer,
and I don't have time to necessarily keep up with the latest papers
coming out of academia regarding security (it's hard enough keeping up
with all of the papers out from the file system and storage
community!).  As a result, they were eye-opening to me in terms of
what the exploit writers have been working on:

Kevin Snow, Fabian Monrose, Lucas Davi, and Alexandra Dmitrienko.
"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address
Space Layout Randomization".  2013 IEEE Symptosium on Security and
Privacy.
http://www.ieee-security.org/TC/SP2013/papers/4977a574.pdf

Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe,
Stefan Nürnberger, and Jannik Pewny.  "You Can Run but You Can’t Read:
Preventing Disclosure Exploits in Executable Code".  CCS 2014.
https://www.infsec.cs.uni-saarland.de/wp-content/uploads/sites/2/2014/10/nuernberger2014ccs_disclosure.pdf

Anyway, maybe this is old news for everyone on the list, but if you
haven't read these papers, IMO they are definitely worth a read.  Does
anyone have a list of interesting security papers that might be of
interest to kernel programmers who want to know what the security
researchers have been up to?

Cheers,

					- Ted

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2016-02-14 23:33 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-02-14 23:33 [kernel-hardening] Two interesting papers I've been reading (or, ASLR is not enough) Theodore Ts'o

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.