-
1
-
-
33745769112
-
-
The PaX team, http://pax.grsecurity.net.
-
-
-
-
3
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. Barrantes et al. Randomized instruction set emulation to disrupt binary code injection attacks. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Barrantes, E.1
-
4
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Bhatkar, S.1
DuVarney, D.2
Sekar, R.3
-
5
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, R. Sekar, and D. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.3
-
6
-
-
85062418620
-
Non-control-hijacking attacks are realistic threats
-
S. Chen, J. Xu, E. Sezer, P. Gauriar, and R. Iyer. Non-control-hijacking attacks are realistic threats. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Chen, S.1
Xu, J.2
Sezer, E.3
Gauriar, P.4
Iyer, R.5
-
7
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
T. Chiueh and F. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS, 2001.
-
(2001)
ICDCS
-
-
Chiueh, T.1
Hsu, F.2
-
9
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
M. Costa et al. Vigilante: End-to-end containment of Internet worms. In SOSP, 2005.
-
(2005)
SOSP
-
-
Costa, M.1
-
10
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security, 1998.
-
(1998)
USENIX Security
-
-
Cowan, C.1
-
12
-
-
33745777666
-
CTCP: A centralized TCP/IP architecture for networking security
-
F. Hsu and T. Chiueh. CTCP: A centralized TCP/IP architecture for networking security. In ACSAC, 2004.
-
(2004)
ACSAC
-
-
Hsu, F.1
Chiueh, T.2
-
14
-
-
12544250338
-
Backwards-compatible bounds checking for arrays and pointers in C programs
-
R. Jones and P. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Intl. Workshop on Automated Debugging, 1997.
-
(1997)
Intl. Workshop on Automated Debugging
-
-
Jones, R.1
Kelly, P.2
-
15
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
G. Kc, A. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Kc, G.1
Keromytis, A.2
Prevelakis, V.3
-
16
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Kim, H.1
Karp, B.2
-
17
-
-
33646048960
-
Honeycomb - Creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets-II, 2003.
-
(2003)
HotNets-II
-
-
Kreibich, C.1
Crowcroft, J.2
-
18
-
-
33846294027
-
Automatic generation of buffer overflow attack signatures: An approach based on program behavior models
-
Z. Liang and R. Sekar. Automatic generation of buffer overflow attack signatures: An approach based on program behavior models. In ACSAC, 2005.
-
(2005)
ACSAC
-
-
Liang, Z.1
Sekar, R.2
-
20
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
G. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In POPL, 2002.
-
(2002)
POPL
-
-
Necula, G.1
McPeak, S.2
Weimer, W.3
-
21
-
-
33745772237
-
Polygraph: Automatically generating signatures for polymorphic worms
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE S&P, 2005.
-
(2005)
IEEE S&P
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
23
-
-
26444472580
-
Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
-
A. Pasupulati et al. Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities. In IEEE/IFIP Network Operation and Management Symposium, 2004.
-
(2004)
IEEE/IFIP Network Operation and Management Symposium
-
-
Pasupulati, A.1
-
25
-
-
2642547913
-
On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization
-
J. Reynolds, J. Just, L. Clough, and R. Maglich. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization. In Hawaii International Conference on System Sciences, 2003.
-
(2003)
Hawaii International Conference on System Sciences
-
-
Reynolds, J.1
Just, J.2
Clough, L.3
Maglich, R.4
-
26
-
-
21644473822
-
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
-
M. Rinard, C. Cadar, D. Roy, and D. Dumitran. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC, 2004.
-
(2004)
ACSAC
-
-
Rinard, M.1
Cadar, C.2
Roy, D.3
Dumitran, D.4
-
27
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, 2004.
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.2
-
28
-
-
20444442399
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati. A fast automaton-based method for detecting anomalous program behaviors. In IEEE S&P, 2001.
-
(2001)
IEEE S&P
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
29
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In ACM CCS, 2004.
-
(2004)
ACM CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
33
-
-
84882623448
-
DIRA: Automatic detection, identification and repair of control-hijacking attacks
-
A. Smimov and T. Chiueh. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS, 2005.
-
(2005)
NDSS
-
-
Smimov, A.1
Chiueh, T.2
-
35
-
-
84906818067
-
Where's the FEEB?: The effectiveness of instruction set randomization
-
A. Sovarel, D. Evans, and N. Paul. Where's the FEEB?: The effectiveness of instruction set randomization. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Sovarel, A.1
Evans, D.2
Paul, N.3
-
36
-
-
25844462447
-
Defending against Internet worms: A signature-based approach
-
Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In INFOCOM, 2005.
-
(2005)
INFOCOM
-
-
Tang, Y.1
Chen, S.2
-
37
-
-
1642268792
-
Accurate buffer overflow detection via abstract payload execution
-
T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In RAID, 2002.
-
(2002)
RAID
-
-
Toth, T.1
Kruegel, C.2
-
38
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
H. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In SIGCOMM, 2004.
-
(2004)
SIGCOMM
-
-
Wang, H.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
39
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
K. Wang and S. Stolfo. Anomalous payload-based network intrusion detection. In RAID, 2004.
-
(2004)
RAID
-
-
Wang, K.1
Stolfo, S.2
-
40
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In ACM CCS, 2005.
-
(2005)
ACM CCS
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
-
41
-
-
20344383014
-
An efficient and backwards-compatible transformation to ensure memory safety of C programs
-
W. Xu, D. DuVarney, and R. Sekar, An efficient and backwards-compatible transformation to ensure memory safety of C programs, In FSE, 2004.
-
(2004)
FSE
-
-
Xu, W.1
DuVarney, D.2
Sekar, R.3
|