Filters








18 Hits in 8.2 sec

You Can Run but You Can't Read

Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;14</a> </i> &nbsp;
However, disclosure attacks allow an adversary to scan a processeven remotely-and enable her to read executable memory on-the-fly, thereby allowing the just-in-time assembly of exploits on the target site  ...  To the best of our knowledge, XnR is the first approach to prevent memory disclosure attacks of executable code and JIT-ROP attacks in general.  ...  The research was supported in part by the DFG Research Training Group GRK 1817/1. We also thank the anonymous reviewers and our shepherd Zhiqiang Lin for their valuable insights and comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660378">doi:10.1145/2660267.2660378</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BackesHKKNP14.html">dblp:conf/ccs/BackesHKKNP14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/itz47sha3zgkdasqqxn4qhnylu">fatcat:itz47sha3zgkdasqqxn4qhnylu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218125728/https://static.aminer.org/pdf/20170130/pdfs/ccs/c7cwuozd0418jhrqnesjumpvlxge5a2x.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/54/24/5424a7cd6a6393ceb8759494ee6a7f7f16a0a179.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660378"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Binary Debloating for Security via Demand Driven Loading [article]

Girish Mururu, Chris Porter, Prithayan Barua, Santosh Pande
<span title="2019-02-18">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
For example, a very large number of return oriented programming gadgets exist in glibc that allow stitching together semantically valid but malicious Turing-complete programs.  ...  We show that on average, the proposed scheme cuts the exposed code surface of libraries by 97.2%, reduces ROP gadgets present in linked libraries by 97.9%, achieves a prediction accuracy in most cases  ...  There has been work on control pointer integrity (CPI) checking [5, 28] , Address Space Layout Randomization [49] , as well as control flow integrity (CFI) checking [1, 10, 22, 30, 63] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.06570v1">arXiv:1902.06570v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ifva6g656rgnvbfztflrbnxlxy">fatcat:ifva6g656rgnvbfztflrbnxlxy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20191023021231/https://arxiv.org/pdf/1902.06570v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/0d/1b/0d1b0c1860f354a3be64e1c4ce173d08c7f860a0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1902.06570v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Runtime Integrity Checking for Exploit Mitigation on Lightweight Embedded Devices [chapter]

Matthias Neugschwandtner, Collin Mulliner, William Robertson, Engin Kirda
<span title="">2016</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Because of their limited resources, such systems often lack the protection mechanisms that have been introduced to the desktop and server world.  ...  Entering the age of the Internet of things, embedded devices are everywhere. They are built using common hardware such as RISC-based ARM and MIPS platforms, and lightweight open software components.  ...  We leverage common properties of the RISC architecture to design and build an exploit mitigation system that is practical and low-overhead and thus lends itself specifically for the use in systems with  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-45572-3_4">doi:10.1007/978-3-319-45572-3_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2lmpzvd2efahzaoebrkl5she3e">fatcat:2lmpzvd2efahzaoebrkl5she3e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190226111248/http://pdfs.semanticscholar.org/7077/01c014bcf953cdb44c1ec08b0184249c75d2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/70/77/707701c014bcf953cdb44c1ec08b0184249c75d2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-45572-3_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

On the Effectiveness of Hardware Enforced Control Flow Integrity

Austin Gadient
<span title="">2018</span> <i title="Hawaii International Conference on System Sciences"> Proceedings of the 51st Hawaii International Conference on System Sciences </i> &nbsp; <span class="release-stage">unpublished</span>
As a result, security researchers have turned towards Control Flow Integrity (CFI) to defend systems.  ...  The NSA proposed a CFI system which integrates new hardware and program instrumentation. The purpose of this research is to assess and improve this proposal.  ...  The NSA's proposal mixes coarse-grained CFI with fine-grained CFI. Fine-grained CFI attempts to match actual code flow with that of the intended program perfectly [2] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24251/hicss.2018.696">doi:10.24251/hicss.2018.696</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b3noujubfjdujoodft2hg3pwze">fatcat:b3noujubfjdujoodft2hg3pwze</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428042032/https://scholarspace.manoa.hawaii.edu/bitstream/10125/50585/1/paper0698.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/28/af/28afca76b238d60065b74cbe22f9e99fec00871d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.24251/hicss.2018.696"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Preventing Code Reuse Attacks On Modern Operating Systems

Marios Pomonis
<span title="2020-02-11">2020</span>
CPUs that provide hardware assistance (~2.32%). kSplitStack, on the other hand, provides stronger protection against leaks of return addresses and guarantees both their secrecy and their integrity by  ...  In this dissertation, we present novel protection mechanisms that render such methodologies ineffective and improve the security of today's operating systems.  ...  Substitution attacks resemble the techniques for overcoming coarse-grained CFI by stitching together call-preceded gadgets [23, 55, 86].  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7916/d8-83r5-1c58">doi:10.7916/d8-83r5-1c58</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zurdcl4ksvdrhcfisfghb5owxu">fatcat:zurdcl4ksvdrhcfisfghb5owxu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200709181212/https://academiccommons.columbia.edu/doi/10.7916/d8-tfyp-t394/download" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/c1/52c12150747e967a624cc18d744f5bcd3bc5aa24.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7916/d8-83r5-1c58"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Binary Exploitation in Industrial Control Systems: Past, Present and Future

Qi Liu, Kaibin Bao, Veit Hagenmeyer
<span title="">2022</span>
the proliferation of industrial internet of things (IIoT), we argue that we will see an increased number of cyber attacks leveraging binary exploitation on ICS in the near future.  ...  Apart from providing an analysis of the past cyber attacks leveraging binary exploitation on ICS and the ongoing attack surface transition, we give a review of the attack techniques and mitigation techniques  ...  The effectiveness of a coarse-grained CFI depends on the degree of over-approximation. As shown in [54] , coarse-grained CFI in general can be easily defeated by advanced code-reuse attacks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5445/ir/1000146568">doi:10.5445/ir/1000146568</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e2vc46v7wzar5pceqch3pkgone">fatcat:e2vc46v7wzar5pceqch3pkgone</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220525231817/https://publikationen.bibliothek.kit.edu/1000146568/148787109" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/12/3a/123a52527bf847de9b3a0676d28cfb3f27c9c398.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5445/ir/1000146568"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Formal Model of Exploit-Resistant Systems

SEPEHR MINAGAR
<span title="2018-07-08">2018</span>
The proposed model will prevent an adversary from executing malicious code on a target system.  ...  In this thesis methods to enhance the security of computer systems are proposed and formally proven to be correct.  ...  Coarse-Grained CFI The second category of CFI is Coarse-Grained where the security is sacrificed for better performance.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26180/5b41944ea9f47">doi:10.26180/5b41944ea9f47</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rvssrs65jned3lj25l5e3w7v2a">fatcat:rvssrs65jned3lj25l5e3w7v2a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200227133953/https://au-east.erc.monash.edu.au/fpfiles/12350951/MinagarSepehrPhDThesisFinalRevision5July2018.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/72/f8/72f8f83df07a4a451081841e9485fae98a896789.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26180/5b41944ea9f47"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Protecting Commodity Operating Systems through Strong Kernel Isolation

Vasileios Kemerlis
<span title="2017-06-14">2017</span>
-bit OS kernel from ret2usr attacks. kGuard enforces strong address space segregation by instrumenting exploitable control transfers with dynamic Control- Flow Assertions (CFAs).  ...  However, this design choice provides a unique vantage point to local attackers, as it allows them to control—both in terms of permissions and contents—part of the memory that is accessible by the kernel  ...  ), enable systems to adapt the (a.) granularity (coarse-grain vs. fine-grain), (b.) intensity, and (c.) layering, of the deployed protection mechanisms, based on the (i) environment in which the software  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7916/d89c6wz6">doi:10.7916/d89c6wz6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4n2whagu6vemfl6zb7djxfljhm">fatcat:4n2whagu6vemfl6zb7djxfljhm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200210072400/https://academiccommons.columbia.edu/doi/10.7916/D8K64RPZ/download" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/9b/909b0d8d254cb697caf1d6ba998e13e0b9939231.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7916/d89c6wz6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Unbounding the future: the nanotechnology revolution

<span title="1992-03-01">1992</span> <i title="American Library Association"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/pjjljho22jhnrmpk3k2jxhxzv4" style="color: black;">ChoiceReviews</a> </i> &nbsp;
Personal computers empowered individuals and took away centralized control of communication technology.  ...  Strategies of how to stay ahead of the process are proposed, but the ultimate responsibility for the wholesome use and development of nanotechnology falls on every person aware of it.  ...  Thanks also go to technical audiences at laboratories in the United States, Japan, and Switzerland for their critiques of these concepts.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5860/choice.29-3855">doi:10.5860/choice.29-3855</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rau5y74cnnhcngoryh5la2v27e">fatcat:rau5y74cnnhcngoryh5la2v27e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100331183702/http://www.foresight.org:80/UTF/download/unbound.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/37/97/379783683491ca8c9ad91b78ca89e4fc1cbf8a13.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5860/choice.29-3855"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Repurposing Software Defenses with Specialized Hardware

Kanad Sinha
<span title="2019-05-29">2019</span>
However, hardware vendors also have to factor in the cost of integrating security solutions from the perspective of effectiveness, longevity, and cost of development, while allaying the customer's concerns  ...  As a result, the community has started looking elsewhere for continued protection, as attacks continue to become progressively more sophisticated.  ...  Many are to blame for getting me past the finish line. Needless to say, the biggest credit goes to my advisor, Simha. Beyond the wealth of know-  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7916/d8-e6tc-kr63">doi:10.7916/d8-e6tc-kr63</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5mmez4ypdzfqffukip6xzaotve">fatcat:5mmez4ypdzfqffukip6xzaotve</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200302030523/https://academiccommons.columbia.edu/doi/10.7916/d8-wv3s-ng36/download" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/68/c9/68c9170bbe2c5a93f241bea618b0f18d557439c7.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.7916/d8-e6tc-kr63"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Taken Out of Context: American Teen Sociality in Networked Publics

danah boyd
<span title="">2008</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/tol7woxlqjeg5bmzadeg6qrg3e" style="color: black;">Social Science Research Network</a> </i> &nbsp;
My analysis centers on how social network sites can be understood as networked publics which are simultaneously (1) the space constructed through networked Table of Contents Chapter 1: Introduction 1  ...  While social network sites were predominantly used by teens as a peer-based social outlet, the unchartered nature of these sites generated fear among adults.  ...  Nissenbaum (2004) argues that we need to approach privacy through the lens of contextual integrity, at least in terms of legal protections.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2139/ssrn.1344756">doi:10.2139/ssrn.1344756</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yijalpqxtrc7rhzzyaj2opqp5u">fatcat:yijalpqxtrc7rhzzyaj2opqp5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20110902013906/http://www.danah.org:80/papers/TakenOutOfContext.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/32/ec/32ec3d0b14c345b303df1096df3d9f7cef3dd94b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2139/ssrn.1344756"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ssrn.com </button> </a>

Artmaking materials in the classroom during the depression era and World War II years as revealed in some art education texts for teachers

D. Wendy Bullen Stephenson
<span title="">1998</span>
Other aspects of artmaking materials considered include attitudes to safety regarding the use of certain materials, the effect of subject integration on artmaking materials, and gender associations with  ...  Questions addressed in the study relate to the basis of selection of materials and reasons why certain materials were chosen over others, economic assumptions of authors, information on scarcity of artmaking  ...  , combs, loosely woven cloth, translucent flakes; also grass, grain tops, plastic or glass prism, gadgets of interesting contour, works from a discarded clock, 3-d cellophane or cellulose forms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14288/1.0054920">doi:10.14288/1.0054920</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pjbqaxiwfrfmdjihzaavi4bzti">fatcat:pjbqaxiwfrfmdjihzaavi4bzti</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200208055412/https://open.library.ubc.ca/media/download/pdf/831/1.0054920/1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14288/1.0054920"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Understanding the noticeability and distraction of interactive highlighting techniques [article]

Joshua Leung, University Of Canterbury
<span title="2017-11-23">2017</span>
Although highlighting techniques are a common and important part of user interfaces, there is a lack of understanding about how to select, apply, and control their effects for achieving the best results  ...  However, the lack of understanding of how noticeability and distraction relate to each other, along with not knowing how we can manipulate the techniques to affect the balance between these complicates  ...  blocks can be arranged to describe different control flow constructs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26021/1791">doi:10.26021/1791</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vcymbpmjsvaxjexexkzzcu24hq">fatcat:vcymbpmjsvaxjexexkzzcu24hq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190131034943/https://ir.canterbury.ac.nz/bitstream/handle/10092/14651/Leung,%20Joshua_Final%20PhD%20Thesis.pdf?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fb/bb/fbbb017f5297cb74e377128c1243e961055cd358.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.26021/1791"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Creative writing practice and pedagogy : a Jungian approach

Madeline Sonik
<span title="">2006</span>
integrated and expressed.  ...  This thesis, drawing on the work of Carl Jung, as well as of Jungians and post-Jungians, advocates that the unconscious, in fact, needs to be valued and worked with purposefully in the Creative Writing  ...  Psychologically and creatively, the writer experiences these moments or periods of coniunctio when the self and ego are one and the writing flows.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14288/1.0093036">doi:10.14288/1.0093036</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3yifd5ayxzftncf4myu4ythrm4">fatcat:3yifd5ayxzftncf4myu4ythrm4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200223003538/https://open.library.ubc.ca/media/download/pdf/831/1.0093036/1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8e/d2/8ed276877c32463c6c7e624a0fb652f55a22e9c8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14288/1.0093036"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Geometries of Life

Simon Barber
<span title="">2018</span>
A final chapter works with with the notebooks Marx kept of his readings on indigenous societies in the last few years of his life.  ...  It also conducts a reading of Marx from the perspective of the Māori concepts described in the first cha [...]  ...  This thread of my whakapapa is double-stitched to this meeting place of the encounter between worlds.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.25602/gold.00024372">doi:10.25602/gold.00024372</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4yvdwht4pffelgnb7mzbrs27oa">fatcat:4yvdwht4pffelgnb7mzbrs27oa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200213185342/https://research.gold.ac.uk/24372/1/VIS_thesis_BarberS_2018.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/28/d9284ea7e352a1a58363a4eaabe730c29b148463.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.25602/gold.00024372"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 18 results