-
1
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
New York, NY, USA, October 27-31, ACM Press
-
E. G. Barrantes, D. Ackley, S. Forrest, T. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pages 281-289, New York, NY, USA, October 27-31 2003. ACM Press.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.2
Forrest, S.3
Palmer, T.4
Stefanovic, D.5
Zovi, D.D.6
-
2
-
-
16644362894
-
Randomized instruction set emulation
-
February
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovic. Randomized instruction set emulation. ACM Transactions on Information and System Security (TISSEC), 8(1):3-40, February 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
4
-
-
39049148954
-
-
CERT Coordination Center. Cert advisory ca-2001-33. multiple vulnerabilities in WUFTPD, 2001.
-
CERT Coordination Center. Cert advisory ca-2001-33. multiple vulnerabilities in WUFTPD, 2001.
-
-
-
-
5
-
-
33745800714
-
Noncontrol-data attacks are realistic threats
-
S. Chen, J. Xu, E. Sezer, P. Gauriar, and R. Iyer. Noncontrol-data attacks are realistic threats. In Proceedings of the Usenix Security Symposium, page 177192, 2005.
-
(2005)
Proceedings of the Usenix Security Symposium
, pp. 177192
-
-
Chen, S.1
Xu, J.2
Sezer, E.3
Gauriar, P.4
Iyer, R.5
-
6
-
-
14844288825
-
Bypassing PaX ASLR protection
-
June
-
T. Durden. Bypassing PaX ASLR protection. Phrack, 59(9), June 2002.
-
(2002)
Phrack
, vol.59
, Issue.9
-
-
Durden, T.1
-
8
-
-
14844307465
-
Vudo malloc tricks
-
M. Kaempf. Vudo malloc tricks. Phrack, 57(8), 2001.
-
(2001)
Phrack
, vol.57
, Issue.8
-
-
Kaempf, M.1
-
9
-
-
3042716872
-
Multics security evaluation: Vulnerability analysis
-
Technical report, HQ Electronic Systems Division, June
-
P. A. Karger and R. R. Schell. Multics security evaluation: Vulnerability analysis. Technical report, HQ Electronic Systems Division, http://csrc.nist.gov/publications/history/karg74.pdf, June 1974.
-
(1974)
-
-
Karger, P.A.1
Schell, R.R.2
-
10
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
New York, NY, USA, October 27-31, ACM Press
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 272-280, New York, NY, USA, October 27-31 2003. ACM Press.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
12
-
-
84979252604
-
Exec Shield - new linux security feature
-
May
-
I. Moinar. Exec Shield - new linux security feature. NewsForge, May 2003.
-
(2003)
NewsForge
-
-
Moinar, I.1
-
13
-
-
39049100936
-
-
PaX team. Documentation for the PaX project. In
-
PaX team. Documentation for the PaX project. In http://pax.grsecurity. net/docs/index.html, 2006.
-
(2006)
-
-
-
15
-
-
12344323612
-
-
Scut and Team Teso, September 1
-
Scut and Team Teso. Exploiting format string vulnerabilities. In http://http://www.team-teso.net/articles /formatstring/, September 1 2001.
-
(2001)
Exploiting format string vulnerabilities
-
-
-
17
-
-
14844328033
-
On the effectiveness of address-space randomization
-
New York, NY, USA, ACM Press
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS '04: Proceedings of the 11 th ACM conference on Computer and communications security, pages 298-307, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11 th ACM conference on Computer and communications security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
19
-
-
18744401718
-
-
Tool Interface Standards Committee, May
-
Tool Interface Standards Committee. Executable and Linking Format (ELF), May 1995.
-
(1995)
Executable and Linking Format (ELF)
-
-
-
20
-
-
39049117949
-
-
Y. Weiss and E. G. Barrantes. Known/chosen key attacks against RISE: Attacking the immune system. Technical Report TR-ECCI-01-2006, E.C.C.I., Universidad de Costa Rica, http://www.ecci.ucr.ac.cr/, September 2006.
-
Y. Weiss and E. G. Barrantes. Known/chosen key attacks against RISE: Attacking the immune system. Technical Report TR-ECCI-01-2006, E.C.C.I., Universidad de Costa Rica, http://www.ecci.ucr.ac.cr/, September 2006.
-
-
-
|