-
1
-
-
33646767376
-
Control-fow integrity: Principles, implementations, and applications
-
ACM
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-fow integrity: Principles, implementations, and applications. In CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security, pages 340-353. ACM, 2005.
-
(2005)
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 1996.
-
(1996)
Phrack Magazine
, vol.49
, Issue.14
-
-
One, A.1
-
3
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
Oakland, CA, May, IEEE Computer Society
-
W. A. Arbaugh, D. J. Farber, and J. M. Smith. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 65-71, Oakland, CA, May 1997. IEEE Computer Society.
-
(1997)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 65-71
-
-
Arbaugh, W.A.1
Farber, D.J.2
Smith, J.M.3
-
5
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
ACM
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: generalizing return-oriented programming to RISC. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 27-38. ACM, 2008.
-
(2008)
CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
6
-
-
85077019413
-
Dynamic instrumentation of production systems
-
Berkeley, CA, USA, USENIX Association
-
B. M. Cantrill, M. W. Shapiro, and A. H. Leventhal. Dynamic instrumentation of production systems. In Proceedings of USENIX 2004 Annual Technical Conference, pages 15-28, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of USENIX 2004 Annual Technical Conference
, pp. 15-28
-
-
Cantrill, B.M.1
Shapiro, M.W.2
Leventhal, A.H.3
-
8
-
-
34547335786
-
Tainttrace: Efficient flow tracing with dynamic binary rewriting
-
IEEE
-
W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. Tainttrace: Efficient flow tracing with dynamic binary rewriting. In Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), pages 749-754. IEEE, 2006.
-
(2006)
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006)
, pp. 749-754
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
13
-
-
70449690094
-
-
Internet Crime Complaint Center
-
Internet Crime Complaint Center. 2008 Internet Crime Report. http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf, 2008.
-
(2008)
Internet Crime Report
, pp. 2008
-
-
-
14
-
-
33748062337
-
Prima: Policy-reduced integrity measurement architecture
-
New York, NY, USA, ACM
-
T. Jaeger, R. Sailer, and U. Shankar. Prima: policy-reduced integrity measurement architecture. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 19-28, New York, NY, USA, 2006. ACM.
-
(2006)
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
16
-
-
70450080729
-
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
-
to appear
-
C. Kil, E. C. Sezer, A. M. Azab, P. Ning, and X. Zhang. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), 2009. to appear.
-
(2009)
Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009)
-
-
Kil, C.1
Sezer, E.C.2
Azab, A.M.3
Ning, P.4
Zhang, X.5
-
19
-
-
79959553321
-
Linux kernel integrity measurement using contextual inspection
-
ACM
-
P. A. Loscocco, P. W. Wilson, J. A. Pendergrass, and C. D. McDonell. Linux kernel integrity measurement using contextual inspection. In Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (STC'07), pages 21-29. ACM, 2007.
-
(2007)
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing (STC'07)
, pp. 21-29
-
-
Loscocco, P.A.1
Wilson, P.W.2
Pendergrass, J.A.3
McDonell, C.D.4
-
20
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
New York, NY, USA, June, ACM Press
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, volume 40, pages 190-200, New York, NY, USA, June 2005. ACM Press.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
, vol.40
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
21
-
-
21644481379
-
Bear: An open-source virtual secure coprocessor based on TCPA
-
Technical Report TR2003-471, Department of Computer Science, Dartmouth College
-
R. Macdonald, S. Smith, J. Marchesini, and O. Wild. Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College, 2003.
-
(2003)
-
-
Macdonald, R.1
Smith, S.2
Marchesini, J.3
Wild, O.4
-
22
-
-
80053150585
-
-
July 2007
-
Microsoft Corporation. Bitlocker drive encryption, July 2007. http://www.microsoft.com/technet/ windowsvista/security/bitlockr.mspx.
-
Bitlocker drive encryption
-
-
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed Security Symposium, 2005.
-
(2005)
Proceedings of the Network and Distributed Security Symposium
-
-
Newsome, J.1
Song, D.2
-
24
-
-
74049151718
-
-
PaX Team
-
PaX Team. http://pax.grsecurity.net/.
-
-
-
-
26
-
-
24644439462
-
Property attestation - scalable and privacy-friendly security assessment of peer computers
-
3548, IBM Research, May
-
J. Poritz, M. Schunter, E. Van Herreweghen, and M. Waidner. Property attestation - scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research, May 2004.
-
(2004)
Technical Report RZ
-
-
Poritz, J.1
Schunter, M.2
Van Herreweghen, E.3
Waidner, M.4
-
27
-
-
40349087553
-
LIFT: A low-overhead information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead information flow tracking system for detecting security attacks. In Proceedings of the 39th Annual IEEE/ACM Symposium on Microarchitecture, pages 135-148, 2006.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM Symposium on Microarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
seop Kim, H.4
Zhou, Y.5
Wu, Y.6
-
28
-
-
29244450159
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
ACM
-
A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In The 2004 New Security Paradigms Workshop, pages 67-77. ACM, 2004.
-
(2004)
The 2004 New Security Paradigms Workshop
, pp. 67-77
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
29
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223-238, 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
-
30
-
-
84870259303
-
-
SANS Institute, Nov. 2007
-
SANS Institute. SANS Top-20 2007 Security Risks. http://www.sans.org/ top20/2007/top20.pdf, Nov. 2007.
-
SANS Top-20 2007 Security Risks
-
-
-
32
-
-
74049108808
-
-
Solar Designer. return-to-libc attack. Bugtraq, 1997.
-
Solar Designer. "return-to-libc" attack. Bugtraq, 1997.
-
-
-
-
33
-
-
12844267418
-
Secure program execution via dynamic information ow tracking
-
ACM
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information ow tracking. In ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96. ACM, 2004.
-
(2004)
ASPLOS-XI: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
35
-
-
74049118183
-
TPM main specification
-
Trusted Computing Group, Version 1.2 rev, July 2007
-
Trusted Computing Group. TPM main specification. Specification Version 1.2 rev. 103, July 2007. https: //www.trustedcomputinggroup.org/specs/TPM/.
-
Specification
, pp. 103
-
-
-
36
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium, pages 121-136, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|