Automated Diversity

Papers selected for review by P. Jungles
(same as suggested)


 * 1) Forrest, S., Somayaji, A., Ackley, D.: Building Diverse Computer Systems (http://www.cs.unm.edu/~immsec/publications/hotos-97.pdf)
 * 2) Barrantes, E. S., Forrest,S., A., Ackley, D., Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks (http://www.cs.unm.edu/~forrest/publications/p315-barrantes.ps)
 * 3) Gaurav, S., Keremytis, A., Prevelakis, V. Countering Code-Injection Attacks with Instruction-Set Randomization (http://www1.cs.columbia.edu/~angelos/Papers/instructionrandomization.pdf)
 * 4) Shacham, H., Page M., Pfaff, B., Goh, E., Modadugu, N. Boneh, D.: On the Effectiveness of Address-Space Randomization (http://www.stanford.edu/~blp/papers/asrandom.pdf)
 * 5) Durden T.: Bypassing PaX ASLR protection (http://www.phrack.com/issues.html?issue=59&id=9&mode=txt )"