Newest Stories by fro
Home
Recent
Comments
Search
Login
2
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization (2016)
☶
pdf
security
cc.gatech.edu
via
fro
1 year ago
|
cached
|
no comments
0
4
Defeating Zombie Gadgets by Re-randomizing Code Upon Disclosure
pdf
security
cs.stonybrook.edu
via
fro
1 year ago
|
cached
|
1 comment
1
1
Alpine Linux, Pt 2
linux
security
twistlock.com
via
fro
1 year ago
|
cached
|
no comments
0
2
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks
pdf
security
cs.vu.nl
via
fro
1 year ago
|
cached
|
no comments
0
22
Warning: Grsecurity: Potential contributory infringement and breach of contract risk for customers – Bruce Perens
law
linux
perens.com
via
fro
1 year ago
|
cached
|
1 comment
1
3
Reviving Instruction Set Randomization
pdf
security
cs.brown.edu
via
fro
1 year ago
|
cached
|
no comments
0
5
kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse
pdf
security
nsl.cs.columbia.edu
via
fro
1 year ago
|
cached
|
1 comment
1
1
NIST SP 800-63 Digital Identity Guidelines
security
pages.nist.gov
via
fro
1 year ago
|
cached
|
no comments
0
8
Alpine Linux: From vulnerability discovery to code execution (Pt 1 of 2)
linux
security
twistlock.com
via
fro
1 year ago
|
cached
|
1 comment
1
1
PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables
pdf
security
internetsociety.org
via
fro
1 year ago
|
cached
|
no comments
0
3
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks (2015)
pdf
security
taesoo.gtisc.gatech.edu
via
fro
1 year ago
|
cached
|
1 comment
1
<< Page 2