-
1
-
-
34547529234
-
-
Alexander Anisimov, Positive Technologies. Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass. http://www.maxpatrol.com/defeating- xpsp2-heap-protection.htm, 2005.
-
Alexander Anisimov, Positive Technologies. Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass. http://www.maxpatrol.com/defeating- xpsp2-heap-protection.htm, 2005.
-
-
-
-
2
-
-
33846557496
-
Once upon afree()
-
Anonymous
-
Anonymous. Once upon afree(). Phrack Magazine, 57(9), 2001.
-
(2001)
Phrack Magazine
, vol.57
, Issue.9
-
-
-
4
-
-
0034442456
-
Hoard: A Scalable Memory Allocator for Multithreaded Applications
-
ASPLOS-IX
-
E. D. Berger, K. S. McKinley, R. D. Blumofe, and P. R. Wilson. Hoard: A Scalable Memory Allocator for Multithreaded Applications, in Proc. of the 9th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), pages 117-128, 2000.
-
(2000)
Proc. of the 9th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems
, pp. 117-128
-
-
Berger, E.D.1
McKinley, K.S.2
Blumofe, R.D.3
Wilson, P.R.4
-
5
-
-
84862209017
-
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
-
S. Bhatkar, D. C.DuVarney, and R.Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits, in Proc. of the 12th USENIX Security Symp., pages 105-120, 2003.
-
(2003)
Proc. of the 12th USENIX Security Symp
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
6
-
-
85062418620
-
Non-Control-Data Attacks Are Realistic Threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-Control-Data Attacks Are Realistic Threats, in Proc. of the 14th USENIX Security Symp., pages .177-192, 2005.
-
(2005)
Proc. of the 14th USENIX Security Symp
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
7
-
-
85009448253
-
PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities, in Proc. of the 12th USENIX Security Symp., pages 91-104, 2003.
-
(2003)
Proc. of the 12th USENIX Security Symp
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
8
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, in Proc. of the 7th USENIXSecurity Symp., pages 63-78, 1998.
-
(1998)
Proc. of the 7th USENIXSecurity Symp
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
12844267418
-
-
G. Suh, J. Lee, and S. Devadas. Secure program, execution via dynamic information flow tracking. In Proc. of the 11th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems. Boston, MA, 2004.
-
G. Suh, J. Lee, and S. Devadas. Secure program, execution via dynamic information flow tracking. In Proc. of the 11th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems. Boston, MA, 2004.
-
-
-
-
13
-
-
14844328033
-
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address space randomization. In Proc. of the ACM Conf. on Computer and Communications Security, 2004.
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address space randomization. In Proc. of the ACM Conf. on Computer and Communications Security, 2004.
-
-
-
-
14
-
-
21644482450
-
-
J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. To appear in Proc. of the 37th Intl. Symp. on Microarchitecture. Portland, OR, 2004.
-
J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. To appear in Proc. of the 37th Intl. Symp. on Microarchitecture. Portland, OR, 2004.
-
-
-
-
15
-
-
33846509327
-
Garbage Collection: Algorithms for Automatic Dynamic Memory Management
-
Jones, Richard, and Rafael Lins. Garbage Collection: Algorithms for Automatic Dynamic Memory Management. John Wiley & Sons, New York, 1996.
-
(1996)
John Wiley & Sons, New York
-
-
Jones, R.1
Lins, R.2
-
17
-
-
34547530864
-
-
Linux Programmer's Manual. Man Pages MSGOP(2). 2002.
-
Linux Programmer's Manual. Man Pages MSGOP(2). 2002.
-
-
-
-
22
-
-
34547545654
-
-
R. Wojtczuk. Defeating Solar Designer Non-executable Stack Patch, http://seclists.org/lists/bugtraq, experimental study of security vulnerabilities caused by ermrs. In Pmc. of the IEEE Intl. Conf, 1998.
-
R. Wojtczuk. Defeating Solar Designer Non-executable Stack Patch, http://seclists.org/lists/bugtraq, experimental study of security vulnerabilities caused by ermrs. In Pmc. of the IEEE Intl. Conf, 1998.
-
-
-
-
23
-
-
84988573030
-
Data Execution Prevention
-
Memory Protection Technologies
-
S. Andersen and V. Abella. Data Execution Prevention. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/ sp2mempr.mspx, 2004.
-
(2004)
Changes to Functionality in Microsoft Windows XP Service Pack
, vol.2
, Issue.PART 3
-
-
Andersen, S.1
Abella, V.2
-
26
-
-
34547540699
-
-
Security Focus. Microsoft Windows winhlp32.exe Heap Overflow Vulnerability. http://www.securityfocus.com/archive/1/385332/2004-12-20/2004- 12-26/2, 2004.
-
Security Focus. Microsoft Windows winhlp32.exe Heap Overflow Vulnerability. http://www.securityfocus.com/archive/1/385332/2004-12-20/2004- 12-26/2, 2004.
-
-
-
-
27
-
-
29144465623
-
-
Standard Performance Evaluation Corporation
-
Standard Performance Evaluation Corporation. SPEC CPU2000 Benchmarks, http://www.spec.org/osg/cpu2000/, 2000.
-
(2000)
SPEC CPU2000 Benchmarks
-
-
-
28
-
-
84858088535
-
-
US-CERT. CVS Heap Overflow Vulnerability, www.uscert.gov/cas/ techalerts/index.html, pages TA04-147A, 2004.
-
(2004)
CVS Heap Overflow Vulnerability
-
-
-
29
-
-
33846525003
-
HTTP Parsing Vulnerabilities in Checkpoint Firewall-1
-
US-CERT. HTTP Parsing Vulnerabilities in Checkpoint Firewall-1. www.uscert.gov/cas/techalerts/index.html, pages TA04-036A, 2004.
-
(2004)
-
-
-
30
-
-
34547495054
-
-
US-CERT. Microsoft Internet Explorer vulnerable to buffer overflow via FRAME and IFRAME elements, http://www.kb.cert.org/vuls/id/842160, page VU 842160, 2004.
-
US-CERT. Microsoft Internet Explorer vulnerable to buffer overflow via FRAME and IFRAME elements, http://www.kb.cert.org/vuls/id/842160, page VU 842160, 2004.
-
-
-
|