-
1
-
-
33646767376
-
Control-flow integrity
-
Alexandria, Virginia, U.S.A, November, ACM, New York
-
Abadi, M., Budiu, M., Erlingsson, Ú., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, Virginia, U.S.A., November 2005, pp. 340-353. ACM, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, D.C, U.S.A, October, ACM, New York
-
Barrantes, E.G., Ackley, D.H., Forrest, S., Palmer, T.S., Stefanović, D., Zovi, D.D.: Randomized instruction set emulation to disrupt binary code injection attacks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003), Washington, D.C., U.S.A., October 2003, pp. 281-289. ACM, New York (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanović, D.5
Zovi, D.D.6
-
5
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington, D.C, U.S.A, August, USENIX Association
-
Bhatkar, S., Duvarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., U.S.A., August 2003, pp. 105-120. USENIX Association (2003)
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
6
-
-
49949115783
-
Data space randomization
-
Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
-
Bhatkar, S., Sekar, R.: Data space randomization. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 1-22. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 1-22
-
-
Bhatkar, S.1
Sekar, R.2
-
7
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Baltimore, MD, August, USENIX Association
-
Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection from memory error exploits. In: 14th USENIX Security Symposium, Baltimore, MD, August 2005, USENIX Association (2005)
-
(2005)
14th USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
9
-
-
77949446188
-
-
Futuremark Corporation
-
Futuremark Corporation. Peacekeeper The Browser Benchmark, http://service.futuremark.com/peacekeeper/
-
Peacekeeper The Browser Benchmark
-
-
-
10
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, D.C, U.S.A, August, USENIX Association
-
Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: protecting pointers from buffer overflow vulnerabilities. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., U.S.A., August 2003, pp. 91-104. USENIX Association (2003)
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
11
-
-
85084162419
-
Engineering heap overflow exploits with javascript
-
Berkeley, CA, USA, pp, USENIX Association
-
Daniel, M., Honoroff, J., Miller, C.: Engineering heap overflow exploits with javascript. In: WOOT 2008: Proceedings of the 2nd conference on USENIX Workshop on offensive technologies, Berkeley, CA, USA, pp. 1-6. USENIX Association (2008)
-
(2008)
WOOT 2008: Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
, pp. 1-6
-
-
Daniel, M.1
Honoroff, J.2
Miller, C.3
-
12
-
-
70350626575
-
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
-
Flegel, U, Bruschi, D, eds, DIMVA 2009, Springer, Heidelberg
-
Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending browsers against drive-by downloads: mitigating heap-spraying code injection attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 88-106. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5587
, pp. 88-106
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
13
-
-
70349142878
-
Low-level software security: Attacks and defenses
-
Technical Report MSRTR-2007-153, Microsoft Research November
-
Erlingsson, Ú.: Low-level software security: Attacks and defenses. Technical Report MSRTR-2007-153, Microsoft Research (November 2007)
-
(2007)
-
-
Erlingsson, U.1
-
14
-
-
14944385012
-
Protecting from stack-smashing attacks
-
Technical report, IBM Research Divison, Tokyo Research Laboratory June
-
Etoh, H., Yoda, K.: Protecting from stack-smashing attacks. Technical report, IBM Research Divison, Tokyo Research Laboratory (June 2000)
-
(2000)
-
-
Etoh, H.1
Yoda, K.2
-
15
-
-
77949479988
-
-
Mozilla Foundation
-
Mozilla Foundation. Firefox 3.5b4 (2009), http://developer.mozilla.org
-
(2009)
Firefox 3.5b4
-
-
-
16
-
-
77949450020
-
-
Google. V8 Benchmark Suite - version 5, http://v8.googlecode.com
-
Google. V8 Benchmark Suite - version 5, http://v8.googlecode.com
-
-
-
-
17
-
-
77949446187
-
-
Intel. Intel architecture software developer's manual. 2: Instruction set reference (2002)
-
Intel. Intel architecture software developer's manual. vol. 2: Instruction set reference (2002)
-
-
-
-
18
-
-
77949447364
-
-
E. C. M. A. International. ECMA-262: ECMAScript Language Specification. ECMA (European Association for Standardizing Information and Communication Systems), 3rd edn., Geneva, Switzerland (December 1999)
-
E. C. M. A. International. ECMA-262: ECMAScript Language Specification. ECMA (European Association for Standardizing Information and Communication Systems), 3rd edn., Geneva, Switzerland (December 1999)
-
-
-
-
20
-
-
85084162336
-
Secure execution via program shepherding
-
San Francisco, California, U.S.A, August, USENIX Association
-
Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure execution via program shepherding. In: Proceedings of the 11th USENIX Security Symposium, San Francisco, California, U.S.A., August 2002, USENIX Association (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
23
-
-
74049161045
-
Nozzle: A defense against heap-spraying code injection attacks
-
Technical report, Microsoft Research November
-
Ratanaworabhan, P., Livshits, B., Zorn, B.: Nozzle: A defense against heap-spraying code injection attacks. Technical report, Microsoft Research (November 2008)
-
(2008)
-
-
Ratanaworabhan, P.1
Livshits, B.2
Zorn, B.3
-
24
-
-
85094678188
-
Run-time detection of heap-based overflows
-
San Diego, California, U.S.A, October, USENIX Association
-
Robertson, W., Kruegel, C., Mutz, D., Valeur, F.: Run-time detection of heap-based overflows. In: Proceedings of the 17th Large Installation Systems Administrators Conference, San Diego, California, U.S.A., October 2003, pp. 51-60. USENIX Association (2003)
-
(2003)
Proceedings of the 17th Large Installation Systems Administrators Conference
, pp. 51-60
-
-
Robertson, W.1
Kruegel, C.2
Mutz, D.3
Valeur, F.4
-
25
-
-
77949472797
-
-
securiteam.com. Heap spraying: Exploiting internet explorer vml 0-day xp sp2 (2009), http://blogs.securiteam.com/index.php/archives/641
-
securiteam.com. Heap spraying: Exploiting internet explorer vml 0-day xp sp2 (2009), http://blogs.securiteam.com/index.php/archives/641
-
-
-
-
27
-
-
77949426305
-
-
skypher.com. Heap spraying (2007), http://skypher.com/wiki/index.php
-
skypher.com. Heap spraying (2007), http://skypher.com/wiki/index.php
-
-
-
-
29
-
-
34548146785
-
-
TMS
-
TMS. Data execution prevention, http://technet.microsoft.com/en-us/ library/cc738483.aspx
-
Data execution prevention
-
-
-
30
-
-
32344441314
-
Stackguard: Simple stack smash protection for gcc
-
Ottawa, Ontario, Canada, May
-
Wagle, P., Cowan, C.: Stackguard: Simple stack smash protection for gcc. In: Proceedings of the GCC Developers Summit, Ottawa, Ontario, Canada, May 2003, pp. 243-256 (2003)
-
(2003)
Proceedings of the GCC Developers Summit
, pp. 243-256
-
-
Wagle, P.1
Cowan, C.2
-
31
-
-
77949438656
-
-
www2.webkit.org Sunspider javascript benchmark (2009), http://www2.webkit.org/perf/sunspider-0.9/sunspider.html
-
www2.webkit.org Sunspider javascript benchmark (2009), http://www2.webkit.org/perf/sunspider-0.9/sunspider.html
-
-
-
-
33
-
-
77949469586
-
-
www.packetstormsecurity.org 25bytes-execve (2009), http://www. packetstormsecurity.org/shellcode/25bytes-execve.txt
-
www.packetstormsecurity.org 25bytes-execve (2009), http://www. packetstormsecurity.org/shellcode/25bytes-execve.txt
-
-
-
-
34
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy, October, IEEE Computer Society, IEEE Press, Los Alamitos () 2003
-
Xu, J., Kalbarczyk, Z., Iyer, R.K.: Transparent runtime randomization for security. In: 22nd International Symposium on Reliable Distributed Systems (SRDS 2003), Florence, Italy, October 2003, pp. 260-269. IEEE Computer Society, IEEE Press, Los Alamitos (2003)
-
(2003)
22nd International Symposium on Reliable Distributed Systems (SRDS
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
35
-
-
38849147719
-
Code injection in C and C++: A survey of vulnerabilities and countermeasures
-
Technical report, Departement Computerwetenschappen, Katholieke Universiteit Leuven
-
Younan, Y., Joosen, W., Piessens, F.: Code injection in C and C++: A survey of vulnerabilities and countermeasures. Technical report, Departement Computerwetenschappen, Katholieke Universiteit Leuven (2004)
-
(2004)
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
36
-
-
84989825191
-
Efficient protection against heap-based buffer overflows without resorting to magic
-
Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
-
Younan, Y., Joosen, W., Piessens, F.: Efficient protection against heap-based buffer overflows without resorting to magic. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 379-398. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 379-398
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
37
-
-
39049133983
-
Extended protection against stack smashing attacks without performance loss
-
IEEE Press, Los Alamitos
-
Younan, Y., Pozza, D., Piessens, F., Joosen, W.: Extended protection against stack smashing attacks without performance loss. In: Proceedings of the Twenty-Second Annual Computer Security Applications Conference (ACSAC 2006), pp. 429-438. IEEE Press, Los Alamitos (2006)
-
(2006)
Proceedings of the Twenty-Second Annual Computer Security Applications Conference (ACSAC
, pp. 429-438
-
-
Younan, Y.1
Pozza, D.2
Piessens, F.3
Joosen, W.4
|