-
4
-
-
85084160243
-
Stackguard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks. In Proceedings of the USENIX Security Symposium, pages 63-78, 1998.
-
(1998)
Proceedings of the USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
5
-
-
33644565261
-
Polymorphic Shellcode Engine Using Spectrum Analysis
-
August
-
T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. V. Underduk. Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack, 11(61), August 2003.
-
(2003)
Phrack
, vol.11
, Issue.61
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.S.V.4
-
6
-
-
14844288825
-
Bypassing PaX ASLR Protection
-
July
-
T. Durden. Bypassing PaX ASLR Protection. Phrack, 11(59), July 2002.
-
(2002)
Phrack
, vol.11
, Issue.59
-
-
Durden, T.1
-
7
-
-
74049147273
-
-
K2. ADMmutate. See http://www.ktwo.ca/c/ADMmutate-0.8.4.tar.gz.
-
K2. ADMmutate. See
-
-
-
8
-
-
74049095979
-
A Practical Approach for Detecting Executable Codes in Network Traffic
-
I. Kim, K. Kang, Y. Choi, D. Kim, J. Oh, and K. Han. A Practical Approach for Detecting Executable Codes in Network Traffic. In Asia-Pacific Network Operations and Management Symposium, 2007.
-
(2007)
Asia-Pacific Network Operations and Management Symposium
-
-
Kim, I.1
Kang, K.2
Choi, Y.3
Kim, D.4
Oh, J.5
Han, K.6
-
9
-
-
31844441673
-
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic
-
Technical Report GIT-CC-05-09, Georgia Institute of Technology
-
O. Kolesnikov, D. Dagon, and W. Lee. Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. Technical Report GIT-CC-05-09, Georgia Institute of Technology, 2005.
-
(2005)
-
-
Kolesnikov, O.1
Dagon, D.2
Lee, W.3
-
10
-
-
74049133723
-
Punk Ode: Hiding Shellcode in Plain Sight
-
G. MacManus and M. Sutton. Punk Ode: Hiding Shellcode in Plain Sight. In Black Hat USA, 2006.
-
(2006)
Black Hat USA
-
-
MacManus, G.1
Sutton, M.2
-
11
-
-
33746464030
-
Building IA32 Unicode-Proof Shellcodes
-
August
-
Obscou. Building IA32 Unicode-Proof Shellcodes. Phrack, 11(61), August 2003.
-
(2003)
Phrack
, vol.11
, Issue.61
-
-
Obscou1
-
12
-
-
0006100649
-
Smashing The Stack For Fun And Profit
-
November
-
A. One. Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
13
-
-
4544239482
-
Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities
-
May
-
A. Pasupulati, J. Coit, K. Levitt, S. F. Wu, S. H. Li, R. C. Kuo, and K. P. Fan. Buttercup: on Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In IEEE/IFIP Network Operation and Management Symposium, pages 235-248, May 2004.
-
(2004)
IEEE/IFIP Network Operation and Management Symposium
, pp. 235-248
-
-
Pasupulati, A.1
Coit, J.2
Levitt, K.3
Wu, S.F.4
Li, S.H.5
Kuo, R.C.6
Fan, K.P.7
-
18
-
-
38149098941
-
Writing IA32 Alphanumeric Shellcode
-
August
-
Rix. Writing IA32 Alphanumeric Shellcode. Phrack, 11(57), August 2001.
-
(2001)
Phrack
, vol.11
, Issue.57
-
-
Rix1
-
19
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Oct
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of ACM Conference on Computer and Communications Security, pages 298-307, Oct. 2004.
-
(2004)
Proceedings of ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
20
-
-
41549098765
-
On the Infeasibility of Modeling Polymorphic Shellcode
-
Y. Song, M. E. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the Infeasibility of Modeling Polymorphic Shellcode. In Proceedings of ACM Conference on Computer and Communications Security, pages 541-551, 2007.
-
(2007)
Proceedings of ACM Conference on Computer and Communications Security
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
21
-
-
78650018752
-
Bypassing Browser Memory Protections
-
A. Sotirov and M. Dowd. Bypassing Browser Memory Protections. In Black Hat USA, 2008.
-
(2008)
Black Hat USA
-
-
Sotirov, A.1
Dowd, M.2
-
24
-
-
84935113569
-
-
A. J. Viterbi. Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm. IEEE Transactions on Information Theory, 13(2):260-269, April 1967.
-
A. J. Viterbi. Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm. IEEE Transactions on Information Theory, 13(2):260-269, April 1967.
-
-
-
-
25
-
-
74049136897
-
Writing UTF-8 compatible shellcodes
-
July
-
T. Wana. Writing UTF-8 compatible shellcodes. Phrack, 11(62), July 2004.
-
(2004)
Phrack
, vol.11
, Issue.62
-
-
Wana, T.1
-
26
-
-
60649104827
-
STILL: Exploit Code Detection via Static Taint and Initialization Analyses
-
December
-
X. Wang, Y.-C. Jhi, S. Zhu, and P. Liu. STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Proceedings of the Annual Computer Security Applications Conference, pages 289-298, December 2008.
-
(2008)
Proceedings of the Annual Computer Security Applications Conference
, pp. 289-298
-
-
Wang, X.1
Jhi, Y.-C.2
Zhu, S.3
Liu, P.4
-
27
-
-
34748920757
-
Analyzing Network Traffic to Detect Self-decrypting Exploit Code
-
Q. Zhang, D. S. Reeves, P. Ning, and S. P. Iyer. Analyzing Network Traffic to Detect Self-decrypting Exploit Code. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, 2007.
-
(2007)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
-
-
Zhang, Q.1
Reeves, D.S.2
Ning, P.3
Iyer, S.P.4
|