-
1
-
-
33646767376
-
Control-flow integrity - principles, implementations, and applications
-
CCS, Alexandria, VA November
-
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity - principles, implementations, and applications. In: ACM conference on Computer and Communications Security (CCS), Alexandria, VA (November 2005)
-
(2005)
ACM conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
50249149602
-
-
Akritidis, P., Cadar, C., Raiciu, C., Costa, M., Castro, M.: Preventing memory error exploits with wit. In: IEEE Symposium on Security and Privacy (May 2008)
-
Akritidis, P., Cadar, C., Raiciu, C., Costa, M., Castro, M.: Preventing memory error exploits with wit. In: IEEE Symposium on Security and Privacy (May 2008)
-
-
-
-
3
-
-
33845946966
-
-
analysis and specialization for the C programming language. PhD Thesis, DIKU, University of Copenhagen May
-
Andersen, L.O.: Program analysis and specialization for the C programming language. PhD Thesis, DIKU, University of Copenhagen (May 1994), ftp.diku.dk/pub/diku/semantics/papers/D-203.dvi.Z
-
(1994)
Program
-
-
Andersen, L.O.1
-
4
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
Orlando, Florida, pp, June
-
Austin, T.M., Breach, S.E., Sohi, G.S.: Efficient detection of all pointer and array access errors. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, Orlando, Florida, pp. 290-301 (June 1994)
-
(1994)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
5
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
Berkeley, CA, pp, June
-
Baratloo, A., Singh, N., Tsai, T.: Transparent run-time defense against stack smashing attacks. In: USENIX Annual Technical Conference, Berkeley, CA, pp. 251-262 (June 2000)
-
(2000)
USENIX Annual Technical Conference
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
6
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, DC October
-
Barrantes, E.G., Ackley, D.H., Forrest, S., Palmer, T.S., Stefanović, D., Zovi, D.D.: Randomized instruction set emulation to disrupt binary code injection attacks. In: ACM conference on Computer and Communications Security (CCS), Washington, DC (October 2003)
-
(2003)
ACM conference on Computer and Communications Security (CCS)
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanović, D.5
Zovi, D.D.6
-
7
-
-
33746101822
-
DieHard: Probabilistic memory safety for unsafe languages
-
Ottawa, Canada, pp, June
-
Berger, E.D., Zorn, B.G.: DieHard: Probabilistic memory safety for unsafe languages. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, Ottawa, Canada, pp. 158-168 (June 2006)
-
(2006)
ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
9
-
-
84862209017
-
-
Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: USENIX Security Symposium (August 2003)
-
Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: USENIX Security Symposium (August 2003)
-
-
-
-
10
-
-
84954188728
-
Efficient techniques for comprehensive protection, from memory error exploits
-
Baltimore, MD August
-
Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection, from memory error exploits. In: USENIX Security Symposium, Baltimore, MD (August 2005)
-
(2005)
USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
11
-
-
49949117696
-
-
Bruschi, D., Cavallaro, L., Lanzi, A.: Diversified process replicae for defeating memory error exploits. In: International Workshop on Information Assurance (WIA) (April 2007)
-
Bruschi, D., Cavallaro, L., Lanzi, A.: Diversified process replicae for defeating memory error exploits. In: International Workshop on Information Assurance (WIA) (April 2007)
-
-
-
-
12
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
Seattle, WA November
-
Castro, M., Costa, M., Harris, T.: Securing software by enforcing data-flow integrity. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI), Seattle, WA (November 2006)
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
14
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Technical Report CMU-CS-02-197, Carnegie Mellon. University December
-
Chew, M., Song, D.: Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS-02-197, Carnegie Mellon. University (December 2002)
-
(2002)
-
-
Chew, M.1
Song, D.2
-
15
-
-
0035017559
-
RAD: A. compile-time solution, to buffer overflow attacks
-
Phoenix, Arizona April
-
Chiueh, T., Hsu, F.: RAD: A. compile-time solution, to buffer overflow attacks. In: IEEE International Conference on Distributed Computing Systems, Phoenix, Arizona (April 2001)
-
(2001)
IEEE International Conference on Distributed Computing Systems
-
-
Chiueh, T.1
Hsu, F.2
-
16
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
Cowan, C., Barringer, M., Beattie, S., Kroah-Hartman, G.: FormatGuard: Automatic protection from printf format string vulnerabilities. In: USENIX Security Symposium (2001)
-
(2001)
USENIX Security Symposium
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
17
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, DC August
-
Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: Protecting pointers from buffer overflow vulnerabilities. In: USENIX Security Symposium, Washington, DC (August 2003)
-
(2003)
USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
18
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, pp, January
-
Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: USENIX Security Symposium, San Antonio, Texas, pp. 63-78 (January 1998)
-
(1998)
USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
19
-
-
84886393009
-
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: A secretless framework for security through diversity. In: USENIX Security Symposium (August 2006)
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: A secretless framework for security through diversity. In: USENIX Security Symposium (August 2006)
-
-
-
-
21
-
-
0027961597
-
Context-sensitive interprocedural points-to analysis in the presence of function pointers
-
June
-
Emami, M., Ghiya, R., Hendren, L.J.: Context-sensitive interprocedural points-to analysis in the presence of function pointers. In: ACM SIGPLAN Conference on. Programming Language Design and Implementation, pp. 242-256 (June 1994)
-
(1994)
ACM SIGPLAN Conference on. Programming Language Design and Implementation
, pp. 242-256
-
-
Emami, M.1
Ghiya, R.2
Hendren, L.J.3
-
23
-
-
0030697765
-
Building diverse computer systems
-
IEEE Computer Society Press, Los Alamitos
-
Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In: Workshop on Hot Topics in Operating Systems, pp. 67-72. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
25
-
-
0000998787
-
Interprocedural pointer alias analysis
-
Hind, M., Burke, M., Carini, P., Choi, J.-D.: Interprocedural pointer alias analysis. In: ACM Transactions on Programming Languages and Systems (TOPLAS) (July 1999)
-
(1999)
ACM Transactions on Programming Languages and Systems (TOPLAS) (July
-
-
Hind, M.1
Burke, M.2
Carini, P.3
Choi, J.-D.4
-
27
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Washington, DC, pp, October
-
Kc, G.S., Keromytis, A.D., Prevelakis, V.: Countering code-injection attacks with instruction-set randomization. In: ACM conference on Computer and Communications Security (CCS), Washington, DC, pp. 272-280 (October 2003)
-
(2003)
ACM conference on Computer and Communications Security (CCS)
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
29
-
-
1542355459
-
CIL: Intermediate language and tools for C program, analysis and transformation
-
McPeak, S., Necula, G.G., Rahul, S.P., Weimer, W.: CIL: Intermediate language and tools for C program, analysis and transformation. In: Conference on Compiler Construction (2002)
-
(2002)
Conference on Compiler Construction
-
-
McPeak, S.1
Necula, G.G.2
Rahul, S.P.3
Weimer, W.4
-
31
-
-
35448955693
-
Exterminator: Automatically correcting memory errors with high probability
-
San Diego, CA, pp, June
-
Novark, G., Berger, E.D., Zorn, B.G.: Exterminator: Automatically correcting memory errors with high probability. In: ACM SIGPLAN Conference on Programming Language Design, and Implementation, San Diego, CA, pp. 1-11 (June 2007)
-
(2007)
ACM SIGPLAN Conference on Programming Language Design, and Implementation
, pp. 1-11
-
-
Novark, G.1
Berger, E.D.2
Zorn, B.G.3
-
32
-
-
49949092725
-
-
PaX
-
PaX (2001), http://pax.grsecurity.net
-
(2001)
-
-
-
34
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
San Diego, CA, pp, February
-
Ruwase, O., Lam, M.S.: A practical dynamic buffer overflow detector. In: Network and Distributed System Security Symposium, San Diego, CA, pp. 159-169 (February 2004)
-
(2004)
Network and Distributed System Security Symposium
, pp. 159-169
-
-
Ruwase, O.1
Lam, M.S.2
-
35
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Washington, DC, pp, October
-
Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: ACM conference on Computer and Communications Security (CCS), Washington, DC, pp. 298-307 (October 2004)
-
(2004)
ACM conference on Computer and Communications Security (CCS)
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
36
-
-
84957608458
-
-
Steensgaard, B.: Points-to analysis by type inference of programs with structures and unions. In: Gyimóthy, T. (ed.) CC 1996. LNCS, 1060, pp. 136-150. Springer, Heidelberg (1996)
-
Steensgaard, B.: Points-to analysis by type inference of programs with structures and unions. In: Gyimóthy, T. (ed.) CC 1996. LNCS, vol. 1060, pp. 136-150. Springer, Heidelberg (1996)
-
-
-
-
38
-
-
0034836394
-
-
Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy (May 2001)
-
Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy (May 2001)
-
-
-
-
40
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy October
-
Xu, J., Kalbarczyk, Z., Iyer, R.K.: Transparent runtime randomization for security. In: Symposium on Reliable and Distributed Systems (SRDS), Florence, Italy (October 2003)
-
(2003)
Symposium on Reliable and Distributed Systems (SRDS)
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
41
-
-
20344383014
-
-
Xu, W, DuVarney, D.C, Sekar, R, An efficient and backwards-compatible transformation to ensure memory safety of C programs. In: ACM SIGSOFT International Symposium on the Foundations of Software Engineering, November
-
Xu, W., DuVarney, D.C., Sekar, R.: An efficient and backwards-compatible transformation to ensure memory safety of C programs. In: ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Newport Beach, CA (November 2004)
-
(2004)
-
-
Newport Beach, C.A.1
|