Research paper collection for Linux kernel security from top security conferences.
☆80Jan 5, 2018Updated 8 years ago
Alternatives and similar repositories for linux-security-papers
Users that are interested in linux-security-papers are comparing it to the libraries listed below
Sorting:
- ☆24Nov 23, 2019Updated 6 years ago
- My MS thesis on survey of a decade fo Linux Kernel CVEs, their categories and various mitigations that exist.☆159Oct 9, 2018Updated 7 years ago
- ☆13Oct 17, 2021Updated 4 years ago
- Security papers about software vulnerabilities and exploits☆14Jan 16, 2019Updated 7 years ago
- LLVM Implementation of different ShadowStack schemes for x86_64☆39May 2, 2020Updated 5 years ago
- ☆21Apr 15, 2022Updated 3 years ago
- ☆12Apr 22, 2023Updated 2 years ago
- A POSIX Filesystem for Enclaves with a Mechanized Safety Proof☆17Sep 20, 2019Updated 6 years ago
- WhiteEgret LSM module☆14Oct 30, 2018Updated 7 years ago
- kR^X: Comprehensive Kernel Protection Against Just-In-Time Code Reuse☆13Aug 21, 2017Updated 8 years ago
- blog☆17Apr 27, 2020Updated 5 years ago
- ☆61Jun 20, 2022Updated 3 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- ☆372Oct 30, 2025Updated 4 months ago
- Benchmark to test different stop the exploit mitigations☆18Jan 8, 2019Updated 7 years ago
- C++ wrapers to simplify working with the JsRT interface to the Chakra JavaScript engine.☆16Nov 16, 2015Updated 10 years ago
- Recent Paper About Bug Detection☆32Sep 27, 2019Updated 6 years ago
- Open-source release for MemSentry (EuroSys'17)☆47May 5, 2021Updated 4 years ago
- Linux kernels (CGC DECREE and vanilla) with S2E extensions☆24Jul 6, 2024Updated last year
- Container (Docker) escape exploits☆53Dec 15, 2021Updated 4 years ago
- Linux kernel source tree☆18Mar 11, 2026Updated last week
- UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages☆43Nov 5, 2021Updated 4 years ago
- linux kernel system call hooking☆18Dec 13, 2014Updated 11 years ago
- ☆29Apr 20, 2021Updated 4 years ago
- Something about CTF and vulnerability environment, mainly about kernel exploit.☆48Nov 11, 2022Updated 3 years ago
- PARTS / LLVM compiler☆31Aug 14, 2019Updated 6 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- kprochide is an LKM for hiding processes from the userland. The module is able to hide multiple processes and is able to dynamically rece…☆22Oct 9, 2020Updated 5 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Пример руткита для ядра линукс 5☆19Dec 4, 2020Updated 5 years ago
- ☆24Mar 24, 2016Updated 9 years ago
- ☆17Mar 15, 2026Updated last week
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- A collection of links related to Linux kernel security and exploitation☆6,386Mar 7, 2026Updated 2 weeks ago
- Control-Flow Integrity implementation for the Linux Kernel 3.19☆22Feb 19, 2020Updated 6 years ago
- ☆74Dec 5, 2019Updated 6 years ago
- Trace deep kernel events through eBPF and lsm hooks☆42Feb 9, 2021Updated 5 years ago
- ☆13Apr 9, 2022Updated 3 years ago