Grsecurity

Results: 29



#Item
11Linux / LXC / PaX / Address space layout randomization / Linux kernel / User space / OpenVZ / System software / Software / AppArmor

  Brad Spengler / grsecurity

Add to Reading List

Source URL: grsecurity.net

Language: English - Date: 2010-07-31 12:32:40
12Software engineering / Address space layout randomization / Grsecurity / PaX / Procfs / Ptrace / Pointer / ALGOL 68 / Computing / Computer programming / Unix

Linux ASLR Curiosities Tavis Ormandy Julien Tinnes Google Security Team ASLR

Add to Reading List

Source URL: www.cr0.org

Language: English - Date: 2009-04-22 19:17:58
13Access control / Access control list / Unix / Filesystem permissions / Mandatory access control / Role-based access control / Grsecurity / Access Control Matrix / Type enforcement / Computer security / Security / System software

SELinux and grsecurity: A Side-by-Side Comparison of Mandatory Access Control and Access Control List Implementations Michael Fox, John Giordano, Lori Stotler, Arun Thomas {mrf4u, jcg8f, les7j, at4a}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:33
14Linux kernel / PaX / Linux / Address space layout randomization / Grsecurity / Kernel / RSBAC / Mandatory access control / Loadable kernel module / Computer security / Software / System software

PaX Introduction PaX: Twelve Years of Securing Linux PaX Team

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-10-10 09:42:52
15PaX / NX bit / Address space layout randomization / Linux / Grsecurity / Debian / Return-to-libc attack / Kernel / Linux kernel / Software / System software / Computer architecture

PDF Document

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-06-03 20:41:41
16Compiler construction / Compilers / GNU Compiler Collection / PaX / C99 / Static single assignment form / C / Software / Computing / Computer programming

Introduction GCC & plugins Instrumentation 1

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2013-10-02 00:41:30
17Central processing unit / Linux kernel / Linux / Monolithic kernels / PaX / NX bit / Kernel / Buffer overflow / X86-64 / Computer architecture / Software / System software

Introduction Kernel Toolchain

Add to Reading List

Source URL: pax.grsecurity.net

Language: English - Date: 2012-10-10 09:43:40
18Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
19RSBAC / Linux kernel / Unix / Grsecurity / Kernel / Access control list / Loadable kernel module / FIFO / Tar / System software / Computer architecture / Software

Rule Set Based Access Control (RSBAC) Securing Linux from the Inside Contents II: 4 Selection of Implemented Models 4.1 Authentication Enforcement (AUTH)

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
20RSBAC / Linux kernel / Kernel / Grsecurity / Access control list / FIFO / Loadable kernel module / Tar / Architecture of Windows NT / System software / Computer architecture / Software

Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Linux Kongress[removed]One Day Workshop Contents II: 4 Selection of Implemented Models

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:01
UPDATE