-
2
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
October
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks. In Proceedings of the 10th ACM Conference On Computer And Communication Security, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
4
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington D.C., August
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIX Security Symposium, Washington D.C., August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
5
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Baltimore, MD, August
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
9
-
-
84860025056
-
-
eEye Digital Security. July
-
eEye Digital Security. ANALYSIS. ida "Code Red" Worm, July 2001. http://www.eeye.com/html/research/advisories/AL20010717.html.
-
(2001)
ANALYSIS:.ida "Code Red" Worm
-
-
-
13
-
-
33751050803
-
-
Technical report, Department of Computer Science, Stony Brook University, May
-
Z. Liang and R. Sekar. Automated, Sub-second Attack Signature Generation: A Basis for Building Self-Protecting Servers. Technical report, Department of Computer Science, Stony Brook University, May 2005.
-
(2005)
Automated, Sub-second Attack Signature Generation: A Basis for Building Self-Protecting Servers
-
-
Liang, Z.1
Sekar, R.2
-
16
-
-
84860028076
-
-
segvguard
-
openwall. segvguard. ftp://ftp.pl.openwall.com/misc/segvguard/.
-
-
-
-
18
-
-
14844328033
-
On the effectiveness of address space randomization
-
Washington, DC, USA, October
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the Effectiveness of Address Space Randomization. In Proceedings of the 11th ACM Conference On Computer And Communication Security, Washington, DC, USA, October 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communication Security
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
19
-
-
84860023880
-
Solar designer
-
Solar Designer. Non-Executable User Stack. http://www.openwall.com/ lintrx/.
-
Non-executable User Stack
-
-
-
20
-
-
84906818067
-
Where's the FEEB? the effectiveness of instruction set randomization
-
Baltimore, MD, August
-
N. Sovarel, D. Evans, and N. Paul. Where's the FEEB? The Effectiveness of Instruction Set Randomization. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Sovarel, N.1
Evans, D.2
Paul, N.3
-
23
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy, October
-
J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent Runtime Randomization for Security. In Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS), Florence, Italy, October 2003.
-
(2003)
Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS)
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
24
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
Alexandria, VA, November
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic Diagnosis and Response to Memory Corruption Vulnerabilities. In Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, November 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
|