-
2
-
-
16644362894
-
Randomized instruction set emulation
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanović. Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur., 8(1):3-40, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanović, D.4
-
3
-
-
33745217853
-
Diehard: Probabilistic memory safety for unsafe languages
-
New York, NY, USA, ACM Press
-
E. D. Berger and B. G. Zorn. Diehard: probabilistic memory safety for unsafe languages. In PLDI '06: Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation, pages 158-168, New York, NY, USA, 2006. ACM Press.
-
(2006)
PLDI '06: Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
4
-
-
53149117570
-
-
Bulba and Kil3r. Bypassing stackguard and stackshield. Phrack Magazine, 0xA(0x38), May 2000.
-
Bulba and Kil3r. Bypassing stackguard and stackshield. Phrack Magazine, 0xA(0x38), May 2000.
-
-
-
-
5
-
-
53149116018
-
Rad: A compile-time solution to buffer overflow attacks
-
00:0409
-
T. cker Chiueh and F.-H. Hsu. Rad: A compile-time solution to buffer overflow attacks, icdcs, 00:0409, 2001.
-
(2001)
icdcs
-
-
cker Chiueh, T.1
Hsu, F.-H.2
-
6
-
-
85084160243
-
Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, jan 1998.
-
(1998)
Proc. 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
7
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
Berkeley, CA, USA, USENIX Association
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: a secretless framework for security through diversity. In USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium, pages 8-8, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
USENIX-SS'06: Proceedings of the 15th conference on USENIX Security Symposium
, pp. 8-8
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
8
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
Washington, DC, USA, IEEE Computer Society
-
J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, pages 221-232, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
, pp. 221-232
-
-
Crandall, J.R.1
Chong, F.T.2
-
10
-
-
85084163372
-
Stackghost: Hardware facilitated stack protection
-
Berkeley, CA, USA, USENIX Association
-
M. Frantzen and M. Shuey. Stackghost: Hardware facilitated stack protection. In SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium, pages 5-5, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium
, pp. 5-5
-
-
Frantzen, M.1
Shuey, M.2
-
11
-
-
59449108823
-
-
National Institute of Standards and Technologies
-
National Institute of Standards and Technologies. National Vulnerability Database, http://nvd.nist.gov.
-
National Vulnerability Database
-
-
-
12
-
-
3042642332
-
The advanced return-into-lib(c) exploits: Pax case study
-
0xB0x3A, December
-
Nergal. The advanced return-into-lib(c) exploits: Pax case study. Phrack Magazine, 0xB(0x3A), December 2001.
-
(2001)
Phrack Magazine
-
-
Nergal1
-
13
-
-
33947731872
-
Microarchitectural protection against stack-based buffer overflow attacks
-
Y.-J. Park, Z. Zhang, and G. Lee. Microarchitectural protection against stack-based buffer overflow attacks. IEEE Micro, 26(4):62-71, 2006.
-
(2006)
IEEE Micro
, vol.26
, Issue.4
, pp. 62-71
-
-
Park, Y.-J.1
Zhang, Z.2
Lee, G.3
-
14
-
-
53149088307
-
-
PaX. http://pax.grsecurity.net.
-
PaX. http
-
-
-
17
-
-
84906818067
-
Where's the feeb? the effectiveness of instruction set randomization
-
Berkeley, CA, USA, USENIX Association
-
A. N. Sovarel, D. Evans, and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium
-
-
Sovarel, A.N.1
Evans, D.2
Paul, N.3
-
18
-
-
53149099814
-
-
Standard Performance Evaluation Corporation SPEC
-
Standard Performance Evaluation Corporation (SPEC). http://www.spec.org.
-
-
-
-
19
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
New York, NY, USA, ACM Press
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, New York, NY, USA, 2004. ACM Press.
-
(2004)
ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
21
-
-
33751528515
-
A reliable return address stack: Microarchitectural features to defeat stack smashing
-
D. Ye and D. Kaeli. A reliable return address stack: microarchitectural features to defeat stack smashing. SIGARCH Computer Architecture News, 33(1):73-80, 2005.
-
(2005)
SIGARCH Computer Architecture News
, vol.33
, Issue.1
, pp. 73-80
-
-
Ye, D.1
Kaeli, D.2
|