Automated Diversity

From wiki.ucalgary.ca
Jump to: navigation, search

Papers selected for review by P. Jungles

(same as suggested)

  1. Forrest, S., Somayaji, A., Ackley, D.: Building Diverse Computer Systems (http://www.cs.unm.edu/~immsec/publications/hotos-97.pdf)
  2. Barrantes, E. S., Forrest,S., A., Ackley, D., Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks (http://www.cs.unm.edu/~forrest/publications/p315-barrantes.ps)
  3. Gaurav, S., Keremytis, A., Prevelakis, V. Countering Code-Injection Attacks with Instruction-Set Randomization (http://www1.cs.columbia.edu/~angelos/Papers/instructionrandomization.pdf)
  4. Shacham, H., Page M., Pfaff, B., Goh, E., Modadugu, N. Boneh, D.: On the Effectiveness of Address-Space Randomization (http://www.stanford.edu/~blp/papers/asrandom.pdf)
  5. Durden T.: Bypassing PaX ASLR protection (http://www.phrack.com/issues.html?issue=59&id=9&mode=txt )"