-
1
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
[BAF+03], Washington, DC
-
[BAF+03] E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proc. 10th ACM Conf. Computer and Communications Security (CCS), Washington, DC, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Communications Security (CCS
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
3
-
-
84902494537
-
-
[Bug03] Microsoft Windows RegEdit.exe registry key value buffer overflow vulnerability. Bugtraq id 7411, 16 April
-
[Bug03] Microsoft Windows RegEdit.exe registry key value buffer overflow vulnerability. Bugtraq id 7411, 16 April 2003. http://www.securityfocus.com/bid/7411.
-
(2003)
-
-
-
5
-
-
0035400735
-
Recovery of jump table case statements from binary code
-
[CE01]
-
[CE01] Cristina Cifuentes and Mike Van Emmerik. Recovery of jump table case statements from binary code. Science of Computer Proqramminq, 40(2-3):171-188, 2001.
-
(2001)
Science of Computer Proqramminq
, vol.40
, Issue.2-3
, pp. 171-188
-
-
Cifuentes, C.1
Van Emmerik, M.2
-
6
-
-
84902494538
-
-
[CER02] CERT/cc statistics 1988-2001, 2002
-
[CER02] CERT/cc statistics 1988-2001, 2002. http://www.cert.org/stats/.
-
-
-
-
7
-
-
84902494539
-
-
[CER03a] CERT advisory CA-2003-16: Buffer overflow in Microsoft RPC, 17 July 2003
-
[CER03a] CERT advisory CA-2003-16: Buffer overflow in Microsoft RPC, 17 July 2003. http://www.cert.org/advisories/CA-2003-16.html.
-
-
-
-
8
-
-
84902494540
-
-
[CER03b] CERT advisory CA-2003-20: W32/Blaster worm, 11 August 2003
-
[CER03b] CERT advisory CA-2003-20: W32/Blaster worm, 11 August 2003. http://www.cert.org/advisories/CA-2003-20.html.
-
-
-
-
9
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
[CPM+98], San Antonio, Texas, January
-
[CPM+98] Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Symposium, pages 63-78, San Antonio, Texas, January 1998.
-
(1998)
Proc. 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Calton, P.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
10
-
-
84890090975
-
Cleanness checking of string manipulations in C programs via integer analysis
-
[DRS01], Paris, France, Springer-Verlag
-
[DRS01] Nurit Dor, Michael Rodeh, and Mooly Sagiv. Cleanness checking of string manipulations in C programs via integer analysis. In Proc. 8th International Static Analysis Symposium (SAS), LNCS 2126, Paris, France, 2001. Springer-Verlag.
-
(2001)
Proc. 8th International Static Analysis Symposium (SAS), LNCS 2126
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
11
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
[EL02]
-
[EL02] David Evans and David Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1):42-51, 2002.
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
13
-
-
84875947153
-
Detours: Binary interception of Win32 functions
-
[HB99]
-
[HB99] Galen Hunt and Doug Brubacher. Detours: Binary interception of Win32 functions. In Proc. 3rd USENIX NT Symposium, pages 135-144, 1999.
-
(1999)
Proc. 3rd USENIX NT Symposium
, pp. 135-144
-
-
Hunt, G.1
Brubacher, D.2
-
15
-
-
84902494542
-
-
[IDA03] The IDA Pro disassembler and debugger
-
[IDA03] The IDA Pro disassembler and debugger, v4.51, 2003. http://www.datarescue.com/idabase/.
-
(2003)
, vol.4
, Issue.51
-
-
-
16
-
-
84902494543
-
-
[Imm03] Immunix secured solutions
-
[Imm03] Immunix secured solutions, 2003. http://www.immnnix.com.
-
(2003)
-
-
-
17
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
[KKP03], Washington, DC
-
[KKP03] Gaurav S. Kc, Angelos D. Keromytis, and Vassilis Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. 10th ACM Conf. Computer and Communications Security (CCS), Washington, DC, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Communications Security (CCS)
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
19
-
-
84902494544
-
-
[MicOl] Microsoft Visual CH-I- compiler options: /gs (control stack checking calls). Online documentation
-
[MicOl] Microsoft Visual CH-I- compiler options: /gs (control stack checking calls). Online documentation, 2001. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vccore/html/_core_.2f.gs.asp.
-
(2001)
-
-
-
21
-
-
79958108049
-
Four different tricks to bypass StackShield and Stack- Guard protection
-
[Ric02]
-
[Ric02] Gerardo Richarte. Four different tricks to bypass StackShield and Stack- Guard protection. Core Security Technologies, 2002. http://downloads.securityfocus.com/library/StackGuard.pdf.
-
(2002)
Core Security Technologies
-
-
Richarte, G.1
-
22
-
-
84881146783
-
-
[Sol]Solar Designer
-
[Sol]Solar Designer. Nonexecutable user stack, http://www.false.com/security/linux-stack/.
-
Nonexecutable User Stack
-
-
-
25
-
-
84902494530
-
-
[StaOO] Stackshield
-
[StaOO] Stackshield, 2000. http://www.angelfire.com/sk/stackshield.
-
(2000)
-
-
-
26
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
[WFBA00], San Diego, CA, February 2000
-
[WFBA00] David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proc. Network and Distributed System Security Symposium (NDSS), pages 3-17, San Diego, CA, February 2000.
-
Proc. Network and Distributed System Security Symposium (NDSS)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
27
-
-
34247546866
-
A comparison of publicly available tools for dynamic buffer overflow prevention
-
[WK03], San Diego, California, February 2003
-
[WK03] John Wilander and Mariam Kamkar. A comparison of publicly available tools for dynamic buffer overflow prevention. In Proceedings of the 10th Network and Distributed System Security Symposium (NDSS), pages 149162, San Diego, California, February 2003.
-
Proceedings of the 10th Network and Distributed System Security Symposium (NDSS)
, pp. 149162
-
-
Wilander, J.1
Kamkar, M.2
|