Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 14 Feb 2016 18:33:24 -0500
From: Theodore Ts'o <>
Subject: Two interesting papers I've been reading (or, ASLR is not enough)

Perhaps these techniques are well known in the security world (after
all, these papers are 2-3 years old), but I'm just a kernel progammer,
and I don't have time to necessarily keep up with the latest papers
coming out of academia regarding security (it's hard enough keeping up
with all of the papers out from the file system and storage
community!).  As a result, they were eye-opening to me in terms of
what the exploit writers have been working on:

Kevin Snow, Fabian Monrose, Lucas Davi, and Alexandra Dmitrienko.
"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address
Space Layout Randomization".  2013 IEEE Symptosium on Security and

Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe,
Stefan Nürnberger, and Jannik Pewny.  "You Can Run but You Can’t Read:
Preventing Disclosure Exploits in Executable Code".  CCS 2014.

Anyway, maybe this is old news for everyone on the list, but if you
haven't read these papers, IMO they are definitely worth a read.  Does
anyone have a list of interesting security papers that might be of
interest to kernel programmers who want to know what the security
researchers have been up to?


					- Ted

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.