-
1
-
-
68149109525
-
-
Aleph One, Smashing the stack for fun and profit, www.Phrack.org 7(49) (1996), file no. 14.
-
Aleph One, Smashing the stack for fun and profit, www.Phrack.org 7(49) (1996), file no. 14.
-
-
-
-
2
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, DC, USA, October
-
E.G. Barrantes, D.H. Ackley, S. Forrest, T.S. Palmer, D. Stefanovic and D.D. Zovi, Randomized instruction set emulation to disrupt binary code injection attacks, in: Proceedings of the 10th ACM Conference On Computer And Communication Security, Washington, DC, USA, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference On Computer And Communication Security
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
3
-
-
84862372891
-
Enhancements to the linux kernel for blocking buffer overflow based attacks
-
Atlanta, GA, USA, October
-
M. Bernaschi, E. Gabrielli and L.V. Mancini, Enhancements to the linux kernel for blocking buffer overflow based attacks, in: 4th Linux Showcase & Conference, Atlanta, GA, USA, October 2000.
-
(2000)
4th Linux Showcase & Conference
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
4
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington, DC, USA, August
-
S. Bhatkar, D.C. DuVarney and R. Sekar, Address obfuscation: An efficient approach to combat a broad range of memory error exploits, in: Proceedings of the 12th USENIX Security Symposium, Washington, DC, USA, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
5
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Baltimore, MD, USA, August
-
S. Bhatkar, R. Sekar and D.C. DuVarney, Efficient techniques for comprehensive protection from memory error exploits. in: Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
6
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, DC, USA, August
-
C. Cowan, S. Beattie, J. Johansen and P. Wagle, Pointguard: Protecting pointers from buffer overflow vulnerabilities, in: Proceedings of the 12th USENIX Security Symposium, Washington, DC, USA, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
8
-
-
68149118478
-
-
T. Durden, Bypassing PaX ASLR protection, www.Phrack.org 11(59) (2002), file no. 9.
-
T. Durden, Bypassing PaX ASLR protection, www.Phrack.org 11(59) (2002), file no. 9.
-
-
-
-
9
-
-
68149113534
-
-
eEye Digital Security, Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access), June 2001; http://www.eeye.com/html/ Research/Advisories/AD20010618.html.
-
eEye Digital Security, Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access), June 2001; http://www.eeye.com/html/ Research/Advisories/AD20010618.html.
-
-
-
-
10
-
-
68149173691
-
-
eEye Digital Security, ANALYSIS: .ida Code Red Worm, July 2001; http://www.eeye.com/html/ research/advisories/AL20010717.html.
-
eEye Digital Security, ANALYSIS: .ida "Code Red" Worm, July 2001; http://www.eeye.com/html/ research/advisories/AL20010717.html.
-
-
-
-
11
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, USA
-
S. Forrest, S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, A sense of self for unix processes, in: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
12
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Washington, DC, USA, October
-
G.S. Kc, A.D. Keromytis and V. Prevelakis, Countering code-injection attacks with instruction-set randomization, in: Proceedings of the 10th ACM Conference On Computer And Communication Security, Washington, DC, USA, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference On Computer And Communication Security
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
13
-
-
68149127718
-
-
Z. Liang and R. Sekar, Automated, sub-second attack signature generation: A basis for building self-protecting servers, Technical report, Department of Computer Science, Stony Brook University, May 2005.
-
Z. Liang and R. Sekar, Automated, sub-second attack signature generation: A basis for building self-protecting servers, Technical report, Department of Computer Science, Stony Brook University, May 2005.
-
-
-
-
14
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Alexandria, VA, USA, November
-
Z. Liang and R. Sekar, Fast and automated generation of attack signatures: A basis for building self-protecting servers, in: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, November 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Liang, Z.1
Sekar, R.2
-
15
-
-
68149109524
-
-
Nergal, The advanced return-into-lib(c) exploits, www.Phrack.org 11(58) (2001), file no. 4.
-
Nergal, The advanced return-into-lib(c) exploits, www.Phrack.org 11(58) (2001), file no. 4.
-
-
-
-
16
-
-
68149135817
-
-
Openwall, Segvguard; ftp://ftp.pl.openwall.com/misc/segvguard/.
-
Segvguard
-
-
-
18
-
-
14844328033
-
On the effectiveness of address space randomization
-
Washington, DC, USA, October
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu and D. Boneh, On the effectiveness of address space randomization, in: Proceedings of the 11th ACM Conference On Computer And Communication Security, Washington, DC, USA, October 2004.
-
(2004)
Proceedings of the 11th ACM Conference On Computer And Communication Security
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
20
-
-
84906818067
-
Where's the FEEB? The effectiveness of instruction set randomization
-
Baltimore, MD, USA, August
-
N. Sovarel, D. Evans and N. Paul, Where's the FEEB? The effectiveness of instruction set randomization, in: Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Sovarel, N.1
Evans, D.2
Paul, N.3
-
22
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Washington, DC, USA, November
-
D. Wagner and P. Soto, Mimicry attacks on host-based intrusion detection systems, in: Proceedings of the 9th ACM Conference On Computer And Communication Security, Washington, DC, USA, November 2002.
-
(2002)
Proceedings of the 9th ACM Conference On Computer And Communication Security
-
-
Wagner, D.1
Soto, P.2
-
23
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy, October
-
J. Xu, Z. Kalbarczyk and R.K. Iyer, Transparent runtime randomization for security, in: Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS), Florence, Italy, October 2003.
-
(2003)
Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS)
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
24
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
Alexandria, VA, USA, November
-
J. Xu, P. Ning, C. Kil, Y. Zhai and C. Bookholt, Automatic diagnosis and response to memory corruption vulnerabilities, in: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, November 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
|