-
1
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E.G. Barrantes, D.H. Ackley, S. Forrest, T.S. Palmer, D. Stefanovic, and D.D. Zovi, "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS), 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS)
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
7
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, "PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities," Proc. 12th USENIX Security Symp., 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
8
-
-
0035400735
-
Recovery of jump table case statements from binary code
-
C. Cifuentes and M. Van Emmerik, "Recovery of Jump Table Case Statements from Binary Code," Science of Computer Programming, vol. 40, nos. 2-3, pp. 171-188, 2001.
-
(2001)
Science of Computer Programming
, vol.40
, Issue.2-3
, pp. 171-188
-
-
Cifuentes, C.1
Van Emmerik, M.2
-
14
-
-
0030417556
-
Partial automation of an integrated reverse engineering environment of binary code
-
C. Cifuentes, "Partial Automation of an Integrated Reverse Engineering Environment of Binary Code," Proc. Working Conf. Reverse Eng., pp. 50-56, 1996.
-
(1996)
Proc. Working Conf. Reverse Eng.
, pp. 50-56
-
-
Cifuentes, C.1
-
15
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan.
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh USENIX Security Symp., pp. 63-78, Jan. 1998.
-
(1998)
Proc. Seventh USENIX Security Symp.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
17
-
-
0037702242
-
CSSV: Towards a realistic tool for statically detecting all buffer overflows in C
-
N. Dor, M. Rodeh, and M. Sagiv, "CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C," Proc. ACM SIGPLAN 2003 Conf. Programming Language Design and Implementation, pp. 155-167, 2003.
-
(2003)
Proc. ACM SIGPLAN 2003 Conf. Programming Language Design and Implementation
, pp. 155-167
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
18
-
-
17644419356
-
SELF: A transparent security extension for ELF binaries
-
D.C. DuVarney, V.N. Venkatakrishnan, and S. Bhatkar, "SELF: A Transparent Security Extension for ELF Binaries," Proc. 2003 Workshop New Security Paradigms, pp. 29-38, 2003.
-
(2003)
Proc. 2003 Workshop New Security Paradigms
, pp. 29-38
-
-
Duvarney, D.C.1
Venkatakrishnan, V.N.2
Bhatkar, S.3
-
19
-
-
0036147522
-
Improving security using extensible lightweight static analysi
-
D. Evans and D. Larochelle, "Improving Security Using Extensible Lightweight Static Analysi," IEEE Software, vol. 19, no. 1, pp. 42-51, 2002.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
22
-
-
84875947153
-
Detours: Binary interception of win32 functions
-
G. Hunt and D. Brubacher, "Detours: Binary Interception of Win32 Functions," Proc. Third USENIX NT Symp., pp. 135-144, 1999.
-
(1999)
Proc. Third USENIX NT Symp.
, pp. 135-144
-
-
Hunt, G.1
Brubacher, D.2
-
26
-
-
85084164164
-
Cyclone: A safe dialect of C
-
June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang, "Cyclone: A Safe Dialect of C," Proc. USENIX Ann. Technical Conf., June 2002.
-
(2002)
Proc. USENIX Ann. Technical Conf.
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
28
-
-
84858544590
-
Execute disable bit functionality blocks malware code execution
-
Intel
-
S. Kuo, "Execute Disable Bit Functionality Blocks Malware Code Execution," White paper, Intel, 2005, http://www.intel.com/cd/ids/ developer/asmo-na/eng/dc/pentium4/optimization/149308.htm.
-
(2005)
White Paper
-
-
Kuo, S.1
-
29
-
-
32844468524
-
Rewriting executable files to measure program behavior
-
Univ. of Wisconsin, Madison, 25 Mar.
-
J.R. Larus and T. Ball, "Rewriting Executable Files to Measure Program Behavior," Technical Report CS-TR-92-1083, Univ. of Wisconsin, Madison, 25 Mar. 1992.
-
(1992)
Technical Report
, vol.CS-TR-92-1083
-
-
Larus, J.R.1
Ball, T.2
-
32
-
-
21644489172
-
Enlisting hardware architecture to thwart malicious code injection
-
Mar.
-
R.B. Lee, D.K. Karig, J.P. McGregor, and Z. Shi, "Enlisting Hardware Architecture to Thwart Malicious Code Injection," Proc. Int'l Conf. Security in Pervasive Computing (SPC-2003), Mar. 2003.
-
(2003)
Proc. Int'l Conf. Security in Pervasive Computing (SPC-2003)
-
-
Lee, R.B.1
Karig, D.K.2
McGregor, J.P.3
Shi, Z.4
-
34
-
-
84858544194
-
Microsoft visual C++ compiler options: /gs (control stack checking calls)
-
"Microsoft Visual C++ Compiler Options: /gs (Control Stack Checking Calls),"Online documentation, 2001, http://msdn.microsoft.com/library/ default.asp?url=/library/en-us/vccore/html/_core_.2f.gs.asp.
-
(2001)
Online Documentation
-
-
-
35
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
G.C. Necula, S. McPeak, and W. Weimer, "CCured: Type-Safe Retrofitting of Legacy Code," Proc. Symp. Principles of Programming Languages, pp. 128-139, 2002.
-
(2002)
Proc. Symp. Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
36
-
-
32844457475
-
Install-time vaccination of windows executables to defend against stack smashing attacks
-
School of Electrical Eng., Tel Aviv Univ.
-
D. Nebenzahl and A. Wool, "Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks," Technical Report EES2003-9, School of Electrical Eng., Tel Aviv Univ., 2003.
-
(2003)
Technical Report
, vol.EES2003-9
-
-
Nebenzahl, D.1
Wool, A.2
-
37
-
-
72849146986
-
Install-time vaccination of windows executables to defend against stack smashing attacks
-
Aug.
-
D. Nebenzahl and A. Wool, "Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks," Proc. 19th IFIP Int'l Information Security Conf., pp. 225-240, Aug. 2004.
-
(2004)
Proc. 19th IFIP Int'l Information Security Conf.
, pp. 225-240
-
-
Nebenzahl, D.1
Wool, A.2
-
43
-
-
84881146783
-
-
Solar Designer, "Nonexecutable User Stack," http://www.false.com/security/linux-stack/, 2006.
-
Nonexecutable User Stack
-
-
-
44
-
-
0003545819
-
The internet worm program: An analysis
-
Purdue Univ., West Lafayette, IN 47907-2004
-
E.H. Spafford, "The Internet Worm Program: An Analysis," Technical Report CSD-TR-823, Purdue Univ., West Lafayette, IN 47907-2004, 1988.
-
(1988)
Technical Report
, vol.CSD-TR-823
-
-
Spafford, E.H.1
-
45
-
-
4444220816
-
-
Standard Performance Evaluation Corporation
-
SPEC CPU2000 V1.2. Standard Performance Evaluation Corporation, 2000, http://www.specbench.org/osg/cpu2000/.
-
(2000)
SPEC CPU2000 V1.2
-
-
-
46
-
-
0032116284
-
MISFIT: A tool for constructing safe extensible systems
-
C. Small and M. Seltzer, "MISFIT: A Tool for Constructing Safe Extensible Systems," IEEE Concurrency, pp. pp. 33-41, 1998.
-
(1998)
IEEE Concurrency
, pp. 33-41
-
-
Small, C.1
Seltzer, M.2
-
47
-
-
84858542864
-
-
Stackshield, 2000, http://www.angelfire.com/sk/stackshield.
-
(2000)
Stackshield
-
-
-
48
-
-
84944726311
-
Defending embedded systems against buffer overflow via hardware/software
-
Z. Shao, Q. Zhuge, Y. He, and E.H.-M. Sha, "Defending Embedded Systems against Buffer Overflow via Hardware/Software," Proc. Ann. Computer Security Applications Conf., 2003.
-
(2003)
Proc. Ann. Computer Security Applications Conf.
-
-
Shao, Z.1
Zhuge, Q.2
He, Y.3
Sha, E.H.-M.4
-
49
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Feb.
-
D. Wagner, J.S. Foster, E.A. Brewer, and A. Aiken, "A First Step towards Automated Detection of Buffer Overrun Vulnerabilities," Proc. Network and Distributed System Security Symp. (NDSS), pp. 3-17, Feb. 2000.
-
(2000)
Proc. Network and Distributed System Security Symp. (NDSS)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
|