-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One, Smashing the stack for fun and profit, Phrack, vol. 7(49), 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
2
-
-
55549093289
-
-
S. Alexander, Defeating compiler-level buker overflow protection,; login: The USENIX Magazine, 30(3), pp. 59-71, 2005.
-
S. Alexander, Defeating compiler-level buker overflow protection,; login: The USENIX Magazine, vol. 30(3), pp. 59-71, 2005.
-
-
-
-
3
-
-
84860095094
-
Once upon a free()
-
Anonymous
-
Anonymous, Once upon a free(), Phrack, vol. 10(57), 2001.
-
(2001)
Phrack
, vol.10
, Issue.57
-
-
-
5
-
-
55549099440
-
-
A. Baratloo, T. Tsai and N. Singh, libsafe: Protecting critical elements of stacks, White Paper, Avaya, Basking Ridge, New Jersey (pubs.research.avayalabs.com/pdfs/ALR-2001-019-whpaper.pdf), 1999.
-
A. Baratloo, T. Tsai and N. Singh, libsafe: Protecting critical elements of stacks, White Paper, Avaya, Basking Ridge, New Jersey (pubs.research.avayalabs.com/pdfs/ALR-2001-019-whpaper.pdf), 1999.
-
-
-
-
6
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. Barrantes, D. Ackley, T. Palmer, D. Stefanovic and D. Zovi, Randomized instruction set emulation to disrupt binary code injection attacks, Proceedings of the Tenth ACM Conference on Computer and Communications Security, pp. 281-289, 2003.
-
(2003)
Proceedings of the Tenth ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.1
Ackley, D.2
Palmer, T.3
Stefanovic, D.4
Zovi, D.5
-
7
-
-
55549148287
-
A proactive defense line in SCADA systems
-
SCADA protocol obfuscation:, presented at the
-
C. Bellettini and J. Rrushi, SCADA protocol obfuscation: A proactive defense line in SCADA systems, presented at the SCADA Security Scientific Symposium, 2007.
-
(2007)
SCADA Security Scientific Symposium
-
-
Bellettini, C.1
Rrushi, J.2
-
9
-
-
55549136608
-
-
Bulba and Kil3r, Bypassing StackGuard and StackShield, Phrack, 10(56), 2000.
-
Bulba and Kil3r, Bypassing StackGuard and StackShield, Phrack, vol. 10(56), 2000.
-
-
-
-
10
-
-
84902507067
-
Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics
-
Y. Deswarte, F. Cuppens, S. Jajodia and L. Wang Eds, Kluwer, Boston, Massachusetts, pp
-
S. Chen, K. Pattabiraman, Z. Kalbarczyk and R. Iyer, Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics, in Security and Protection in Information Processing Systems, Y. Deswarte, F. Cuppens, S. Jajodia and L. Wang (Eds.), Kluwer, Boston, Massachusetts, pp. 83-100, 2004.
-
(2004)
Security and Protection in Information Processing Systems
, pp. 83-100
-
-
Chen, S.1
Pattabiraman, K.2
Kalbarczyk, Z.3
Iyer, R.4
-
11
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk and R. Iyer, Defeating memory corruption attacks via pointer taintedness detection, Proceedings of the International Conference on Dependable Systems and Networks, pp. 378-387, 2005.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 378-387
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.5
-
12
-
-
85062418620
-
Non-control data attacks are realistic threats
-
S. Chen, J. Xu, E. Sezer, P. Gauriar and R. Iyer, Non-control data attacks are realistic threats, Proceedings of the Fourteenth USENIX Security Symposium, pp. 177-192, 2005.
-
(2005)
Proceedings of the Fourteenth USENIX Security Symposium
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.3
Gauriar, P.4
Iyer, R.5
-
13
-
-
55549113407
-
-
M. Conover and w00w00 Security Team, w00w00 on heap overflows (www.w00w00.org/lles/articles/heaptut.txt), 1999.
-
M. Conover and w00w00 Security Team, w00w00 on heap overflows (www.w00w00.org/lles/articles/heaptut.txt), 1999.
-
-
-
-
14
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen and J. Lokier, FormatGuard: Automatic protection from printf format string vulnerabilities, Proceedings of the Tenth USENIX Security Symposium pp. 191-200, 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 191-200
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
15
-
-
85009448253
-
PointGuard: Protecting pointers from buker overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen and P. Wagle, PointGuard: Protecting pointers from buker overflow vulnerabilities, Proceedings of the Twelfth USENIX Security Symposium, pp. 91-104, 2003.
-
(2003)
Proceedings of the Twelfth USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
16
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buker overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang, StackGuard: Automatic adaptive detection and prevention of buker overflow attacks, Proceedings of the Seventh USENIX Security Symposium, pp. 63-78, 1998.
-
(1998)
Proceedings of the Seventh USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
18
-
-
55549106675
-
-
Gera and Riq, Advances in format string exploitation, Phrack, 10(59), 2002.
-
Gera and Riq, Advances in format string exploitation, Phrack, vol. 10(59), 2002.
-
-
-
-
19
-
-
55549098020
-
-
iDefense Labs, LiveData Protocol Server heap overflow vulnerability, Sterling, Virginia (labs.idefense.com/intelligence/vulnerabilities/ display.php?id=523), 2007.
-
iDefense Labs, LiveData Protocol Server heap overflow vulnerability, Sterling, Virginia (labs.idefense.com/intelligence/vulnerabilities/ display.php?id=523), 2007.
-
-
-
-
20
-
-
55549103210
-
-
International Electrotechnical Commission, Telecontrol Equipment and Systems - Part 6-503: Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations - TASE.2 Services and Protocol, IEC Publication 60870-6-503, Geneva, Switzerland, 2002.
-
International Electrotechnical Commission, Telecontrol Equipment and Systems - Part 6-503: Telecontrol Protocols Compatible with ISO Standards and ITU-T Recommendations - TASE.2 Services and Protocol, IEC Publication 60870-6-503, Geneva, Switzerland, 2002.
-
-
-
-
21
-
-
18144395592
-
-
Huthig, Heidelberg, Germany
-
F. Iwanitz and J. Lange, OPC - Fundamentals, Implementation and Application, Huthig, Heidelberg, Germany, 2006.
-
(2006)
OPC - Fundamentals, Implementation and Application
-
-
Iwanitz, F.1
Lange, J.2
-
22
-
-
14844307465
-
Vudo malloc tricks
-
M. Kaempf, Vudo malloc tricks, Phrack, vol. 11(57), 2001.
-
(2001)
Phrack
, vol.11
, Issue.57
-
-
Kaempf, M.1
-
24
-
-
3042541202
-
Frame pointer overwriting
-
Klog, Frame pointer overwriting, Phrack, vol. 9(55), 1999.
-
(1999)
Phrack
, vol.9
, Issue.55
-
-
Klog1
-
27
-
-
55549100468
-
-
L. Mora, OPC exposed: Part I, presented at the SCADA Security Scientific Symposium, 2007.
-
L. Mora, OPC exposed: Part I, presented at the SCADA Security Scientific Symposium, 2007.
-
-
-
-
28
-
-
3042642332
-
Advanced return-into-lib(c) exploits: PaX case study
-
Nergal, Advanced return-into-lib(c) exploits: PaX case study, Phrack vol. 10(58), 2001.
-
(2001)
Phrack
, vol.10
, Issue.58
-
-
Nergal1
-
29
-
-
16244366310
-
valgrind: A program supervision framework
-
N. Nethercote and J. Seward, valgrind: A program supervision framework, Electronic Notes in Theoretical Computer Science, vol. 89(2), pp. 44-66, 2003.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.89
, Issue.2
, pp. 44-66
-
-
Nethercote, N.1
Seward, J.2
-
30
-
-
84898272718
-
Format string technique
-
bc/ NN-formats.txt
-
NOP Ninjas, Format string technique (julianor.tripod.com/bc/ NN-formats.txt), 2001.
-
(2001)
-
-
Ninjas, N.O.P.1
-
31
-
-
55549134858
-
From source to binary: The inner workings of GCC
-
December
-
D. Novillo, From source to binary: The inner workings of GCC, Red Hat Magazine (www.redhat.com/magazine/002dec04/features/gcc), December 2004.
-
(2004)
Red Hat Magazine
-
-
Novillo, D.1
-
33
-
-
55549110632
-
Documentation for the PaX Project
-
PaX-Team, pax.grsecurity.net/docs
-
PaX-Team, Documentation for the PaX Project (pax.grsecurity.net/docs), 2008.
-
(2008)
-
-
-
38
-
-
84902123731
-
Securing control systems with multilayer static mutation
-
presented at the
-
S. Simmons, D. Edwards and N. Wilde, Securing control systems with multilayer static mutation, presented at the Process Control Systems Forum Annual Meeting (www.pcsforum.org/events/2007/atlanta/documents/ west.pdf), 2007.
-
(2007)
Process Control Systems Forum Annual Meeting
-
-
Simmons, S.1
Edwards, D.2
Wilde, N.3
-
41
-
-
55549121078
-
Washington, DC
-
US-CERT, LiveData ICCP Server heap buker overflow vulnerability, Vulnerability Note VU#190617
-
US-CERT, LiveData ICCP Server heap buker overflow vulnerability, Vulnerability Note VU#190617, Washington, DC (www.kb.cert.org/vuls/id/ 190617), 2006.
-
(2006)
-
-
-
42
-
-
55549133470
-
-
US-CERT, Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles, Vulnerability note VU#926551, Washington, DC (www.kb.cert.org/vuls/id/926551), 2007.
-
US-CERT, Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles, Vulnerability note VU#926551, Washington, DC (www.kb.cert.org/vuls/id/926551), 2007.
-
-
-
-
44
-
-
55549133134
-
-
C. Walter, FreeMODBUS: A Modbus ASCII/RTU and TCP implementation (v1.3), FreeMODBUS, Vienna, Austria (freemodbus.berlios.de), 2007.
-
C. Walter, FreeMODBUS: A Modbus ASCII/RTU and TCP implementation (v1.3), FreeMODBUS, Vienna, Austria (freemodbus.berlios.de), 2007.
-
-
-
|