-
1
-
-
84906818067
-
Where's the FEEB? The Effectiveness of Instruction Set Randomization
-
August
-
Ana Nora Sovarel and David Evans and Nathanael Paul. Where's the FEEB? The Effectiveness of Instruction Set Randomization. In 14th USENIX Security Symposium, August 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Nora Sovarel, A.1
Evans, D.2
Paul, N.3
-
2
-
-
84886393009
-
N-Variant Systems: A Secretless Framework for Security through Diversity
-
Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser. N-Variant Systems: A Secretless Framework for Security through Diversity. In 15th USENIX Security Symposium, 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
3
-
-
85062418620
-
Non-Control-Data Attacks Are Realistic Threats
-
August
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-Control-Data Attacks Are Realistic Threats. In 14th USENIX Security Symposium, August 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
4
-
-
36349014388
-
-
Research Laboratories, http://www.hpl.hp.com/research/linux/httperf/, Hewlett-Packard
-
D. Mosberger (main author), S. Eranian, and D. Carter, httperf - HTTP performance measurement tool. http://www.hpl.hp.com/research/linux/httperf/ - Hewlett-Packard Research Laboratories.
-
HTTP performance measurement tool
-
-
Mosberger, D.1
Eranian, S.2
Carter, D.3
-
5
-
-
84868370608
-
Fault Interpretation: Fine-Grain Monitoring of Page Accesses
-
Daniel R. Edelson. Fault Interpretation: Fine-Grain Monitoring of Page Accesses. In USENIX Winter, pages 395-404, 1993.
-
(1993)
USENIX Winter
, pp. 395-404
-
-
Edelson, D.R.1
-
6
-
-
36349032937
-
Diversified Process Replicæ for Defeating Memory Error Exploits
-
14-06, Università degli Studi di Milano
-
Danilo Bruschi, Lorenzo Cavallaro, and Andrea Lanzi. Diversified Process Replicæ for Defeating Memory Error Exploits. Technical Report RT 14-06, Università degli Studi di Milano, 2006.
-
(2006)
Technical Report RT
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
-
8
-
-
36348978186
-
-
Elias Aleph One Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, 0x07, Issue #49, Phile 14 of 16, December 1998.
-
Elias "Aleph One" Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, Volume 0x07, Issue #49, Phile 14 of 16, December 1998.
-
-
-
-
9
-
-
0038825045
-
Anomaly Detection using Call Stack Information
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly Detection using Call Stack Information. IEEE Symposium on Security and Privacy, Oakland, California, 2003.
-
(2003)
IEEE Symposium on Security and Privacy, Oakland, California
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
12
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization
-
New York, NY, USA, ACM Press
-
Hovav Shacham and Matthew Page and Ben Pfaff and Eu-Jin Goh and Nagendra Modadugu and Dan Boneh. On the Effectiveness of Address-Space Randomization. In CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security, pages 298-307, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
13
-
-
36348959201
-
-
J. Poskanzer. thttpd, tiny/turbo/throttling, version 2.23betal-3sargel, server. http://www.acme.com/software/thttpd
-
J. Poskanzer. thttpd - tiny/turbo/throttling HTTP server. http://www.acme.com/software/thttpd/ - version 2.23betal-3sargel.
-
-
-
-
14
-
-
14944374640
-
Mitigating Buffer Overflows by Operating System Randomization
-
Technical Report CMU-CS-02-197, Carnegie Mellon University, December
-
M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Technical Report CMU-CS-02-197, Carnegie Mellon University, December 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
15
-
-
36348945887
-
-
Rafal Nergal Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
-
Rafal "Nergal" Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
-
-
-
-
16
-
-
0030697765
-
Building Diverse Computer Systems
-
Washington, DC, USA, IEEE Computer Society
-
S. Forrest and A. Somayaji and D. Ackley. Building Diverse Computer Systems. In HOTOS '97: Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI), page 67, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
HOTOS '97: Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
, pp. 67
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
17
-
-
84862209017
-
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
-
Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. In 12th USENIX Security Symposium, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
18
-
-
84954188728
-
Efficient Techniques for Comprehensive Protection from Memory Error Exploits
-
Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. In 14th USENIX Security Symposium, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Sandeep Bhatkar, R.S.1
DuVarney, D.C.2
-
19
-
-
36348988012
-
-
scut, team teso. Exploiting Format String Vulnerabilities, September 2001. version 1.2
-
scut / team teso. Exploiting Format String Vulnerabilities, September 2001. version 1.2.
-
-
-
-
22
-
-
0030086704
-
-
Thomas C. Bressoud Fred B. Schneider. Hypervisor-based fault tolerance. In ACM Transactions on Computer Systems, pages 14(1):80-107, February 1996.
-
Thomas C. Bressoud Fred B. Schneider. Hypervisor-based fault tolerance. In ACM Transactions on Computer Systems, pages 14(1):80-107, February 1996.
-
-
-
|