-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
November
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 7(49), November 1996.
-
(1996)
Phrack Magazine
, vol.7
, Issue.49
-
-
One, A.1
-
4
-
-
34748845128
-
-
C. C. A. W. Alex Ho, Michael Fetterman and S. Hand. Practical taint-based protection using demand emulation. In Proc. of the 1st EuroSys Conference, Arpil 2006.
-
C. C. A. W. Alex Ho, Michael Fetterman and S. Hand. Practical taint-based protection using demand emulation. In Proc. of the 1st EuroSys Conference, Arpil 2006.
-
-
-
-
5
-
-
85063636742
-
-
F. Bellard. QEMU, a fast and portable dynamic translator. In In Proc. of the USENIX Annual Technical Conference, pages 41-46, April 2005.
-
F. Bellard. QEMU, a fast and portable dynamic translator. In In Proc. of the USENIX Annual Technical Conference, pages 41-46, April 2005.
-
-
-
-
6
-
-
79961204066
-
FFPF: Fairly Fast Packet Filters
-
San Francisco, CA, December
-
H. Bos, W. de Bruijn, M. Cristea, T. Nguyen, and G. Portokalidis. FFPF: Fairly Fast Packet Filters. In Proceedings of OSDI'04, San Francisco, CA, December 2004.
-
(2004)
Proceedings of OSDI'04
-
-
Bos, H.1
de Bruijn, W.2
Cristea, M.3
Nguyen, T.4
Portokalidis, G.5
-
7
-
-
34748814203
-
-
bulba and Kil3r. Bypassing Stackguard and Stackshield. Phrack Magazine, 10(56), January 2000.
-
bulba and Kil3r. Bypassing Stackguard and Stackshield. Phrack Magazine, 10(56), January 2000.
-
-
-
-
8
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. of the 7th USENIX Security Symposium, 1998.
-
(1998)
Proc. of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
9
-
-
85084161775
-
-
C. Cowan, M. Barringer, S. Beattie and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities. In In Proc. of the 10th Usenix Security Symposium, August 2001.
-
C. Cowan, M. Barringer, S. Beattie and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities. In In Proc. of the 10th Usenix Security Symposium, August 2001.
-
-
-
-
10
-
-
85009448253
-
-
C. Cowan, S. Beattie, J. Johansen and P. Wagle. Point Guard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
C. Cowan, S. Beattie, J. Johansen and P. Wagle. Point Guard: Protecting pointers from buffer overflow vulnerabilities. In In Proc. of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
-
-
-
11
-
-
34748830204
-
-
M. Conover. w00w00 on heap overflows. http://www.w00w00.org/articles. html, January 1999.
-
M. Conover. w00w00 on heap overflows. http://www.w00w00.org/articles. html, January 1999.
-
-
-
-
12
-
-
21644482450
-
-
J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In In Proc. of the 37th annual International Symposium on Microarchitecture, pages 221-232, 2004.
-
J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In In Proc. of the 37th annual International Symposium on Microarchitecture, pages 221-232, 2004.
-
-
-
-
13
-
-
33745800941
-
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
-
Vienna, Austria, July
-
J. R. Crandall, S. F. Wu, and F. T. Chong. Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities. In Intrusion and Malware Detection and Vulnerability Assessment: Second International Conference (DIMVA05), Vienna, Austria, July 2005.
-
(2005)
Intrusion and Malware Detection and Vulnerability Assessment: Second International Conference (DIMVA05)
-
-
Crandall, J.R.1
Wu, S.F.2
Chong, F.T.3
-
14
-
-
78249251033
-
Protocol-independent adaptive replay of application dialog
-
San Diego, CA, February
-
W. Cui, V. Paxson, N. Weaver, and R. Katz. Protocol-independent adaptive replay of application dialog. In The 13th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2006.
-
(2006)
The 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.4
-
15
-
-
34748860207
-
-
Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection RAID
-
D. Dagonand, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine and Henry Owen. HoneyStat: Local worm detection using honeypots. In In Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), 2004.
-
(2004)
HoneyStat: Local worm detection using honeypots
-
-
Dagonand, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
16
-
-
18744376889
-
-
Proc. of the 10th ACM Conference on Computer and Communications Security CCS, October
-
E. G. Barrantes, D.H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovix and D.D. Zovi. Randomized instruction set emulation to disrupt code injection attacks. In In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS), pages 281-289, October 2003.
-
(2003)
Randomized instruction set emulation to disrupt code injection attacks
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovix, D.5
Zovi, D.D.6
-
17
-
-
33845428560
-
Secure program execution via dynamic information flow tracking
-
86-96, December, SESSION: Security
-
G. E. Suh, J. W. Lee, D. Zhang and S. Devadas. Secure program execution via dynamic information flow tracking. ACM SIGOPS Operating Systems Review, 38(5):86-96, December 2004. SESSION: Security.
-
(2004)
ACM SIGOPS Operating Systems Review
, vol.38
, Issue.5
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
18
-
-
14844317200
-
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In In Proc. of the ACM Computer and Communications Security (CCS) Conference, pages 272-280, October 2003.
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In In Proc. of the ACM Computer and Communications Security (CCS) Conference, pages 272-280, October 2003.
-
-
-
-
20
-
-
34748857244
-
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In In Proc. of the 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS), February 2003.
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In In Proc. of the 10th ISOC Symposium on Network and Distributed Systems Security (SNDSS), February 2003.
-
-
-
-
21
-
-
34748842480
-
Advances in format string exploitation
-
July
-
gera and riq. Advances in format string exploitation. Phrack Magazine, 11(59), July 2002.
-
(2002)
Phrack Magazine
, vol.11
, Issue.59
-
-
gera1
riq2
-
23
-
-
85084163246
-
-
K. Hyang-Ah and B. Karp. Autograph: Toward automated, distributed worm signature detection. In In Proc. of the 13th USENIX Security Symposium, 2004.
-
K. Hyang-Ah and B. Karp. Autograph: Toward automated, distributed worm signature detection. In In Proc. of the 13th USENIX Security Symposium, 2004.
-
-
-
-
24
-
-
18844437024
-
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In In Proc. of the ACM workshop on Rapid Malcode, 2003.
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In In Proc. of the ACM workshop on Rapid Malcode, 2003.
-
-
-
-
25
-
-
18744376132
-
GCC extension for protecting applications from stack-smashing attacks
-
Technical report, IBM, June 2000
-
J. Etoh. GCC extension for protecting applications from stack-smashing attacks. Technical report, IBM, June 2000.
-
-
-
Etoh, J.1
-
26
-
-
34748877074
-
Remote windows kernel exploitation - step into the ring 0
-
B. Jack. Remote windows kernel exploitation - step into the ring 0. eEye Digital Security Whitepaper, www.eeye.com/~data/publish/whitepapers/research/ 0T20050205.FILE.pdf, 2005.
-
(2005)
eEye Digital Security Whitepaper
-
-
Jack, B.1
-
28
-
-
33845391802
-
-
Proc. of the 20th ACM Symposium on Operating Systems Principles SOSP, Brighton, UK, October
-
M. Costa, J. Crowcroft, M. Castro, A Rowstron, L. Zhou, L. Zhang and P. Barham. Vigilante: End-to-end containment of internet worms. In In Proc. of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Vigilante: End-to-end containment of internet worms
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
29
-
-
85084163372
-
-
M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In In Proc. of the 10th USENIX Security Symposium, pages 55-66, August 2001.
-
M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In In Proc. of the 10th USENIX Security Symposium, pages 55-66, August 2001.
-
-
-
-
30
-
-
0037702242
-
-
N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a realistic tool for statically detecting all buffer overlows in C. In In Proc. of the ACM Conference on Object-Oriented Programming, Systems, Languages and Application, October 2003.
-
N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a realistic tool for statically detecting all buffer overlows in C. In In Proc. of the ACM Conference on Object-Oriented Programming, Systems, Languages and Application, October 2003.
-
-
-
-
32
-
-
34748857243
-
SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots, (An extended version of this report was accepted by Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems), TR IR-CS-015
-
Technical report, Vrije Universiteit Amsterdam, May
-
G. Portokalidis and H. Bos. SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots, (An extended version of this report was accepted by Elsevier Journal on Computer Networks, Special Issue on Security through Self-Protecting and Self-Healing Systems), TR IR-CS-015. Technical report, Vrije Universiteit Amsterdam, May 2005.
-
(2005)
-
-
Portokalidis, G.1
Bos, H.2
-
34
-
-
34748909934
-
-
rix. Smashing C++ VPTRS. Phrack Magazine, 10(56), January 2000.
-
rix. Smashing C++ VPTRS. Phrack Magazine, 10(56), January 2000.
-
-
-
-
36
-
-
84862209017
-
-
S. Bhatkar, D.C. Du Varney and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In In Proc. of the 12th USENIX Security Symposium, pages 105-120, August 2003.
-
S. Bhatkar, D.C. Du Varney and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In In Proc. of the 12th USENIX Security Symposium, pages 105-120, August 2003.
-
-
-
-
37
-
-
84991765629
-
-
S. Singh, C. Estan, G. Varghese and S. Savage. Automated worm fingerprinting. In In Proc. of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 45-60, 2004.
-
S. Singh, C. Estan, G. Varghese and S. Savage. Automated worm fingerprinting. In In Proc. of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 45-60, 2004.
-
-
-
-
38
-
-
34748884825
-
Using execution transactions to recover from buffer overflow attacks
-
Columbia, University
-
S. Sidiroglou and A. D. Keromytis. Using execution transactions to recover from buffer overflow attacks. Cucs-031-04, Columbia, University, 2004.
-
(2004)
Cucs-031-04
-
-
Sidiroglou, S.1
Keromytis, A.D.2
-
39
-
-
34748831503
-
Win32 buffer overows (location, exploitation, and prevention)
-
D. Spyrit. Win32 buffer overows (location, exploitation, and prevention). Phrack 55, 1999.
-
(1999)
Phrack
, vol.55
-
-
Spyrit, D.1
-
41
-
-
85084164620
-
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In In Proc. of the 10th USENIX Security Symposium, pages 201-216, August 2001.
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In In Proc. of the 10th USENIX Security Symposium, pages 201-216, August 2001.
-
-
-
-
42
-
-
85084162336
-
-
V. Kiriansky, D. Bruening and S. Amarasinghe. Secure execution via program shepherding. In In Proc. of the 11th USENIX Security Symposium, 2002.
-
V. Kiriansky, D. Bruening and S. Amarasinghe. Secure execution via program shepherding. In In Proc. of the 11th USENIX Security Symposium, 2002.
-
-
-
-
43
-
-
84948951525
-
Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
-
Las Vegas, Nevada
-
M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In Proc. of ACSAC Security Conference, Las Vegas, Nevada, 2002.
-
(2002)
Proc. of ACSAC Security Conference
-
-
Williamson, M.M.1
|