DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» PaX
PaX
Security Assurance Requirements for Linux Application Container Deployments
Writing Kernel Exploits
New Security Enhancements in Red Hat Enterprise Linux V.3, Update 3
Integrity Checking for Process Hardening
Austin Group
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
Spacewalk 2.4 for Oracle® Linux Client Life Cycle Management Guide
Linux Exploit Mitigation
Chrome OS Hardening
Kguard: Lightweight Kernel Protection Against Return-To-User Attacks
Fast Intra-Kernel Isolation and Security with Iskios Spyridoula Gravani John Criswell Mohammad Hedayati Michael L
Hardened Kernels for Everyone
CSC 591 Systems Attacks and Defenses Linux Security
Requirements on Security Management for Adaptive Platform AUTOSAR AP Release 18-03
Protecting Commodity Operating Systems Through Strong Kernel Isolation
Practical Linux Forensics by Bruce Nikkel! As a Prepublication Title, This Book May Be Incom- Plete and Some Chapters May Not Have Been Proofread
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring
Linux Kernel Security Overview
Top View
Introduction to Low-Level Profiling and Tracing
On the Effectiveness of Full-ASLR on 64-Bit Linux
The State of Kernel Self Protection
Operating Systems – Linux Standard Base Common Definitions
Evaluating Approaches for Detecting and Eliminating Memory Safety Errors in Linux Kernel Programming
Digsig: Run-Time Authentication of Binaries at Kernel Level
Exploiting Linux and Pax ASLR's Weaknesses on 32
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring
STACKLEAK: a Long Way to the Linux Kernel Mainline Alexander Popov
VM-Based Security Overkill: a Lament for Applied Systems Security Research
Report Received April 2003
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After
Blue Book Summary of Changes in Appropriations
Pax - Kernel Self-Protection
How STACKLEAK Improves Linux Kernel Security Alexander Popov Positive Technologies
Hardening Linux and Introducing Securix GNU/Linux Hardening Basics
Software Security
Ruxcon 2011 Linux Security
Non Executable Data
Oracle® Linux 8 Installing Oracle Linux
A Comparison of Buffer Overflow Prevention Implementations and Weaknesses
Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels Alan M
Intel® Vtune™ Amplifier Installation Guide - Linux* OS (2018 Beta)
Linux Standard Base Core Specification 3.2
Control-Flow Integrity for the Linux Kernel: a Security Evaluation
CGX Data Sheet
Kr^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse
Mitigation of Virtunoid Attacks on Cloud Computing Systems
Linux Hardening
Wind River Linux 5.X and Intel Gateway Solutions for Iot
Analysis of ROP Attack on Grsecurity / Pax Linux Kernel Security Variables
Intrusion Detection for Resource-Constrained Embedded Control Systems in the Power Grid
Noyaux Durcis Pour Tout Le Monde
Understanding and Hardening Linux Containers June 29, 2016 – Version 1.1
IBM AIX to Oracle Solaris Technology Mapping Guide Preparing for the Move to Oracle Solaris 11
Pax: Twelve Years of Securing Linux
PAX (Partition Attributes Across), That Significantly Improves Cache Performance by Grouping Together All Values of Each Attribute Within Each Page
File System Independent Metadata Organization for Transcrypt
Address Space Layout Randomization Next Generation
Exploiting Linux and Pax ASLR's Weaknesses on 32- and 64-Bit
Oracle® Linux 7 Installation Guide
KIDS – Kernel Intrusion Detection System
Towards Linux Kernel Memory Safety
On the Effectiveness of Full-ASLR on 64-Bit Linux