-
1
-
-
33646767376
-
Control-flow integrity
-
Alexandria, VA, Nov
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In Proc. of the 12th ACM Conf. on Computer and Communications Security, Alexandria, VA, Nov. 2005.
-
(2005)
Proc. of the 12th ACM Conf. on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack, 49, 1996.
-
(1996)
Phrack
, vol.49
-
-
One, A.1
-
4
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
Orlando, FL, June
-
T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient detection of all pointer and array access errors. In Proc. of the ACM SIGPLAN '94 Conf. on Programming Language Design and Implementation, Orlando, FL, June 1994.
-
(1994)
Proc. of the ACM SIGPLAN '94 Conf. on Programming Language Design and Implementation
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
5
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
San Diego, CA, June
-
A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing attacks. In USENIX 2000 Annual Technical Conf. Proc., San Diego, CA, June 2000.
-
(2000)
USENIX 2000 Annual Technical Conf. Proc
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
6
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, DC, Oct
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanović, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proc. of the 10th ACM Conf. on Computer and Communications Security, Washington, DC, Oct. 2003.
-
(2003)
Proc. of the 10th ACM Conf. on Computer and Communications Security
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanović, D.5
Zovi, D.D.6
-
7
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington, DC, Aug
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. of the 12th USENIX Security Symp., Washington, DC, Aug. 2003.
-
(2003)
Proc. of the 12th USENIX Security Symp
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
8
-
-
39049141171
-
-
Bulba and Kil3r. Bypassing Stackguard and stackshield. Phrack, 56, 2000.
-
Bulba and Kil3r. Bypassing Stackguard and stackshield. Phrack, 56, 2000.
-
-
-
-
9
-
-
85062418620
-
Noncontrol-data attacks are realistic threats
-
Baltimore, MD, Aug
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Noncontrol-data attacks are realistic threats. In Proc. of the 14th USENIX Security Symp., Baltimore, MD, Aug. 2005.
-
(2005)
Proc. of the 14th USENIX Security Symp
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
11
-
-
85009448253
-
Point-Guard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, DC, Aug
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. Point-Guard: protecting pointers from buffer overflow vulnerabilities. In Proc. of the 12th USENIX Security Symp., Washington, DC, Aug. 2003.
-
(2003)
Proc. of the 12th USENIX Security Symp
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
12
-
-
85084160243
-
Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX, Jan
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. of the 7th USENIX Security Symp., San Antonio, TX, Jan. 1998.
-
(1998)
Proc. of the 7th USENIX Security Symp
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
13
-
-
14944385012
-
Protecting from stack-smashing attacks
-
Technical report, IBM Research Divison, Tokyo Research Laboratory, June
-
H. Etoh and K. Yoda. Protecting from stack-smashing attacks. Technical report, IBM Research Divison, Tokyo Research Laboratory, June 2000.
-
(2000)
-
-
Etoh, H.1
Yoda, K.2
-
14
-
-
0034226001
-
Spec cpu2000: Measuring cpu performance in the new millennium
-
July
-
J. L. Henning. Spec cpu2000: Measuring cpu performance in the new millennium. Computer, 33(7), July 2000.
-
(2000)
Computer
, vol.33
, Issue.7
-
-
Henning, J.L.1
-
15
-
-
39049141642
-
-
R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proc. of the 3rd Int. Workshop on Automatic Debugging, Linköping, Sweden, 1997.
-
R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proc. of the 3rd Int. Workshop on Automatic Debugging, Linköping, Sweden, 1997.
-
-
-
-
16
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Washington, DC, Oct
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. of the 10th ACM Conf. on Computer and Communications Security, Washington, DC, Oct. 2003.
-
(2003)
Proc. of the 10th ACM Conf. on Computer and Communications Security
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
18
-
-
85084162336
-
Secure execution via program shepherding
-
San Francisco, CA, Aug
-
V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In Proc. of the 11th USENIX Security Symp., San Francisco, CA, Aug. 2002.
-
(2002)
Proc. of the 11th USENIX Security Symp
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
19
-
-
3042541202
-
The frame pointer overwrite
-
klog. The frame pointer overwrite. Phrack, 55, 1999.
-
(1999)
Phrack
, vol.55
-
-
klog1
-
20
-
-
35048849061
-
Enlisting hardware architecture to thwart malicious code injection
-
Proc. of the First Int. Conf. on Security in Pervasive Computing, of
-
R. B. Lee, D. K. Karig, J. P. McGregor, and Z. Shi. Enlisting hardware architecture to thwart malicious code injection. In Proc. of the First Int. Conf. on Security in Pervasive Computing, volume 2802 of LNCS, 2003.
-
(2003)
LNCS
, vol.2802
-
-
Lee, R.B.1
Karig, D.K.2
McGregor, J.P.3
Shi, Z.4
-
23
-
-
20344387381
-
Failsafe ANSI-C compiler: An approach to making C programs secure: Progress report
-
Tokyo, Japan, Nov
-
Y. Oiwa, T. Sekiguchi, E. Sumii, and A. Yonezawa. Failsafe ANSI-C compiler: An approach to making C programs secure: Progress report. In Proc. of Int. Symp. on Software Security 2002, Tokyo, Japan, Nov. 2002.
-
(2002)
Proc. of Int. Symp. on Software Security 2002
-
-
Oiwa, Y.1
Sekiguchi, T.2
Sumii, E.3
Yonezawa, A.4
-
25
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization
-
Washington, DC, Oct
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the Effectiveness of Address-Space Randomization. In Proc. of the 11th ACM Conf. on Computer and communications security, Washington, DC, Oct. 2004.
-
(2004)
Proc. of the 11th ACM Conf. on Computer and communications security
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
27
-
-
84906818067
-
Where's the FEEB? the effectiveness of instruction set randomization
-
Baltimore, MD, Aug
-
N. Sovarel, D. Evans, and N. Paul. Where's the FEEB? the effectiveness of instruction set randomization. In Proc. of the 14th USENIX Security Symp., Baltimore, MD, Aug. 2005.
-
(2005)
Proc. of the 14th USENIX Security Symp
-
-
Sovarel, N.1
Evans, D.2
Paul, N.3
-
30
-
-
21844444349
-
Defeating Solar Designer's Non-executable Stack Patch
-
R. Wojtczuk. Defeating Solar Designer's Non-executable Stack Patch. Bugtraq mailinglist, 1998.
-
(1998)
Bugtraq mailinglist
-
-
Wojtczuk, R.1
-
31
-
-
12344316966
-
Architecture support for defending against buffer overflow attacks
-
San Jose, CA, Oct
-
J. Xu, Z. Kalbarczyk, S. Patel, and K. I. Ravishankar. Architecture support for defending against buffer overflow attacks. In Second Workshop on Evaluating and Architecting System dependability, San Jose, CA, Oct. 2002.
-
(2002)
Second Workshop on Evaluating and Architecting System dependability
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Ravishankar, K.I.4
-
32
-
-
20344383014
-
An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs
-
Newport Beach, CA, October-November
-
W. Xu, D. C. DuVarney, and R. Sekar. An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs. In Proc. of the 12th ACM SIGSOFT Int. Symp. on Foundations of Software Engineering, Newport Beach, CA, October-November 2004.
-
(2004)
Proc. of the 12th ACM SIGSOFT Int. Symp. on Foundations of Software Engineering
-
-
Xu, W.1
DuVarney, D.C.2
Sekar, R.3
-
33
-
-
38849147719
-
Code injection in C and C++ : A survey of vulnerabilities and countermeasures
-
Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July
-
Y. Younan, W. Joosen, and F Piessens. Code injection in C and C++ : A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July 2004.
-
(2004)
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
34
-
-
84908340657
-
A methodology for designing countermeasures against current and future code injection attacks
-
College Park, MD, Mar
-
Y. Younan, W. Joosen, and F. Piessens. A methodology for designing countermeasures against current and future code injection attacks. In Proc. of the Third IEEE Int. Information Assurance Workshop 2005, College Park, MD, Mar. 2005.
-
(2005)
Proc. of the Third IEEE Int. Information Assurance Workshop 2005
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
35
-
-
70349131292
-
Efficient protection against heap-based buffer overflows without resorting to magic
-
Raleigh, NC, Dec
-
Y. Younan, W. Joosen, and F. Piessens. Efficient protection against heap-based buffer overflows without resorting to magic. In Proc. of the Int. Conf. on Information and Communication Security, Raleigh, NC, Dec. 2006.
-
(2006)
Proc. of the Int. Conf. on Information and Communication Security
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
|