-
1
-
-
71549117703
-
-
The pax project
-
The pax project (2004), http://pax.grsecurity.net/
-
(2004)
-
-
-
2
-
-
71549170628
-
-
linux/x86 execve(/bin/sh, [/bin/sh, null]). milw0rm (2006), http://www.milw0rm.com/shellcode/1635
-
linux/x86 execve("/bin/sh", ["/bin/sh", null]). milw0rm (2006), http://www.milw0rm.com/shellcode/1635
-
-
-
-
3
-
-
71549135971
-
-
linux/x86 execve(rm -rf /) shellcode. milw0rm (2006), http://www.milw0rm.com/shellcode/2801
-
linux/x86 execve(rm -rf /) shellcode. milw0rm (2006), http://www.milw0rm.com/shellcode/2801
-
-
-
-
4
-
-
71549155745
-
-
linux/x86 normal exit w/ random (so to speak) return value. milw0rm (2006), http://www.milw0rm.com/shellcode/1435
-
linux/x86 normal exit w/ random (so to speak) return value. milw0rm (2006), http://www.milw0rm.com/shellcode/1435
-
-
-
-
5
-
-
71549146995
-
-
linux/x86 portbind (define your own port). milw0rm (2006), http://www.milw0rm.com/shellcode/1979
-
linux/x86 portbind (define your own port). milw0rm (2006), http://www.milw0rm.com/shellcode/1979
-
-
-
-
6
-
-
71549120497
-
-
linux/x86 /sbin/iptables -f. milw0rm (2007), http://www.milw0rm.com/ shellcode/3445
-
linux/x86 /sbin/iptables -f. milw0rm (2007), http://www.milw0rm.com/ shellcode/3445
-
-
-
-
7
-
-
71549141738
-
-
linux/x86 edit /etc/sudoers for full access. milw0rm (2008), http://www.milw0rm.com/shellcode/7161
-
linux/x86 edit /etc/sudoers for full access. milw0rm (2008), http://www.milw0rm.com/shellcode/7161
-
-
-
-
8
-
-
71549119934
-
-
linux/x86 chmod (/etc/shadow,666) & exit(0). milw0rm (2009), http://www.milw0rm.com/shellcode/8081
-
linux/x86 chmod ("/etc/shadow",666) & exit(0). milw0rm (2009), http://www.milw0rm.com/shellcode/8081
-
-
-
-
9
-
-
71549127222
-
-
linux/x86 killall5 shellcode. milw0rm (2009), http://www.milw0rm.com/ shellcode/8972
-
linux/x86 killall5 shellcode. milw0rm (2009), http://www.milw0rm.com/ shellcode/8972
-
-
-
-
10
-
-
71549133487
-
-
linux/x86 push reboot(). milw0rm (2009), http://www.milw0rm.com/ shellcode/7808
-
linux/x86 push reboot(). milw0rm (2009), http://www.milw0rm.com/ shellcode/7808
-
-
-
-
11
-
-
71549129640
-
-
linux/x86 setreuid(geteuid(),geteuid()),execve(/bin/sh,0,0). milw0rm (2009), http://www.milw0rm.com/shellcode/8972
-
linux/x86 setreuid(geteuid(),geteuid()),execve("/bin/sh",0,0). milw0rm (2009), http://www.milw0rm.com/shellcode/8972
-
-
-
-
12
-
-
33646767376
-
Control-flow integrity
-
ACM Press, New York
-
Abadi, M., Budiu, M., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security(CCS), pp. 340-353. ACM Press, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security(CCS)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Ligatti, J.3
-
13
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
USENIX Association, Berkeley
-
Baratloo, A., Singh, N., Tsai, T.: Transparent run-time defense against stack smashing attacks. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, p. 21. USENIX Association, Berkeley (2000)
-
(2000)
Proceedings of the Annual Conference on USENIX Annual Technical Conference
, pp. 21
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
14
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to risc
-
ACM, New York
-
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to risc. In: Proceedings of the 15th ACM Conference on Computer and Communications Security(CCS), pp. 27-38. ACM, New York (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security(CCS)
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
15
-
-
57049157796
-
Lisabeth: Automated content-based signature generator for zero-day polymorphic worms
-
ACM, New York
-
Cavallaro, L., Lanzi, A., Mayer, L., Monga, M.: Lisabeth: automated content-based signature generator for zero-day polymorphic worms. In: Proceedings of the 4th International Workshop on Software Engineering for Secure Systems(SESS), pp. 41-48. ACM, New York (2008)
-
(2008)
Proceedings of the 4th International Workshop on Software Engineering for Secure Systems(SESS)
, pp. 41-48
-
-
Cavallaro, L.1
Lanzi, A.2
Mayer, L.3
Monga, M.4
-
16
-
-
59349121868
-
Vigilante: End-to-end containment of internet worm epidemics
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: End-to-end containment of internet worm epidemics. ACM Transactions on Computer Systems (TOCS) 26(4), 1-68 (2008)
-
(2008)
ACM Transactions on Computer Systems (TOCS)
, vol.26
, Issue.4
, pp. 1-68
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
17
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
USENIX Association, Berkeley
-
Cowan, C., Pu, C., Maier, D.,Walpole, J., Bakke, P., Beattie, S., Grier, A.,Wagle, P., Zhang, Q.: Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. In: Proceedings of the 7th Conference on USENIX Security Symposium, p. 5. USENIX Association, Berkeley (1998)
-
(1998)
Proceedings of the 7th Conference on USENIX Security Symposium
, pp. 5
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
18
-
-
0006025720
-
Formatguard: Automatic protection from printf format string vulnerabilities
-
Cowan, C., Barringer, M., Beattie, S., Kroah-Hartman, G., Frantzen, M., Lokier, J.: Formatguard: Automatic protection from printf format string vulnerabilities. In: Proceedings of the 10th conference on USENIX Security Symposium, p. 2003 (2000)
-
(2000)
Proceedings of the 10th conference on USENIX Security Symposium
, pp. 2003
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
19
-
-
85009448253
-
Pointguardtm: Protecting pointers from buffer overflow vulnerabilities
-
USENIX Association, Berkeley
-
Cowan, C., Beattie, S., Johansen, J., Wagle, P.: Pointguardtm: protecting pointers from buffer overflow vulnerabilities. In: Proceedings of the 12th Conference on USENIX Security Symposium, p. 7. USENIX Association, Berkeley (2003)
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 7
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
20
-
-
33745788387
-
On deriving unknown vulnerabilities from zeroday polymorphic and metamorphic worm exploits
-
Crandall, J.R., Su, Z.,Wu, S.F., Chong, F.T.: On deriving unknown vulnerabilities from zeroday polymorphic and metamorphic worm exploits. In: Proceedings of the 12th ACM Conference on Computer and Communications Security(CCS), pp. 235-248 (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security(CCS)
, pp. 235-248
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
22
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
USENIX Association, Berkeley
-
Kim, H.A., Karp, B.: Autograph: toward automated, distributed worm signature detection. In: Proceedings of the 13th Conference on USENIX Security Symposium, p. 19. USENIX Association, Berkeley (2004)
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 19
-
-
Kim, H.A.1
Karp, B.2
-
23
-
-
71549157865
-
X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique
-
Krahmer, S.: X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Phrack Magazine (2005), http://www.suse.de/krahmer/no- nx.pdf
-
(2005)
Phrack Magazine
-
-
Krahmer, S.1
-
24
-
-
33645791274
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
Kreibich, C., Crowcroft, J.: Honeycomb: creating intrusion detection signatures using honeypots. ACM SIGCOMM Computer Communication Review 34(1), 51-56 (2004)
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.1
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
25
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Li, Z., Sanghi, M., Chen, Y., Kao, M.Y., Chavez, B.: Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, pp. 32-47 (2006)
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
, pp. 32-47
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.Y.4
Chavez, B.5
-
26
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
ACM, New York
-
Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 190-200. ACM, New York (2005)
-
(2005)
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
28
-
-
71549140754
-
-
milw0rm: http://www.milw0rm.com/shellcode/linux/x86
-
milw0rm: http://www.milw0rm.com/shellcode/linux/x86
-
-
-
-
29
-
-
3042642332
-
The advanced return-into-lib(c) exploits (pax case study)
-
Nergal: The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine (2001), http://www.phrack.org/archives/58/p58-0x04
-
(2001)
Phrack Magazine
-
-
Nergal1
-
30
-
-
67650085819
-
-
Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proceedings of the 2007 PLDI Conference, 42(6), pp. 89-100 (2007)
-
Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proceedings of the 2007 PLDI Conference, vol. 42(6), pp. 89-100 (2007)
-
-
-
-
31
-
-
84882740544
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
Newsome, J., Brumley, D., Song, D.: Vulnerability-specific execution filtering for exploit prevention on commodity software. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium, NDSS (2006)
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium, NDSS
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
-
32
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 226-241 (2005)
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
34
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Berkeley, CA, USA, p
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Proceedings of the 7th Conference on USENIX Security Symposium, Berkeley, CA, USA, p. 3 (1998)
-
(1998)
Proceedings of the 7th Conference on USENIX Security Symposium
, pp. 3
-
-
Paxson, V.1
-
35
-
-
33746446345
-
Network-level polymorphic shellcode detection using emulation
-
Büschkes, R, Laskov, P, eds, DIMVA 2006, Springer, Heidelberg
-
Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Network-level polymorphic shellcode detection using emulation. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 54-73. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4064
, pp. 54-73
-
-
Polychronakis, M.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
36
-
-
38149093160
-
-
Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of nonself-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 87-106. Springer, Heidelberg (2007)
-
Polychronakis, M., Anagnostakis, K.G., Markatos, E.P.: Emulation-based detection of nonself-contained polymorphic shellcode. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 87-106. Springer, Heidelberg (2007)
-
-
-
-
37
-
-
71549168416
-
-
in review
-
Roemer, R., Buchanan, E., Shacham, H., Savage, S.: Return-oriented programming: Systems, languages, and applications (2009) (in review)
-
(2009)
Return-oriented programming: Systems, languages, and applications
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
42
-
-
84991765629
-
Automated worm fingerprinting
-
USENIX Association, Berkeley
-
Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation( OSDI), p. 4. USENIX Association, Berkeley (2004)
-
(2004)
Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation( OSDI)
, pp. 4
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
43
-
-
71549154814
-
Sigfree: A signature-free buffer overflow attack blocker
-
Wang, X., Pan, C.C., Liu, P., Zhu, S.: Sigfree: A signature-free buffer overflow attack blocker. IEEE Transactions on Dependable and Secure Computing 99(2) (2006)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.99
, Issue.2
-
-
Wang, X.1
Pan, C.C.2
Liu, P.3
Zhu, S.4
-
44
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
USENIX Association, Berkeley
-
Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In: Proceedings of the 15th Conference on USENIX Security Symposium (USENIX-SS 2006). USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium (USENIX-SS
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
45
-
-
34748920757
-
Analyzing network traffic to detect selfdecrypting exploit code
-
ACM, New York
-
Zhang, Q., Reeves, D.S., Ning, P., Iyer, S.P.: Analyzing network traffic to detect selfdecrypting exploit code. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, pp. 4-12. ACM, New York (2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 4-12
-
-
Zhang, Q.1
Reeves, D.S.2
Ning, P.3
Iyer, S.P.4
|