-
1
-
-
33646767376
-
Control-flow integrity
-
Alexandria, VA, November
-
Martin Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security, pages 340-353, Alexandria, VA, November 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
2
-
-
50249149602
-
Preventing memory error exploits with WIT
-
Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, and Miguel Castro. Preventing memory error exploits with WIT. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, Oakland, CA, May 2008.
-
Proceedings of the 2008 IEEE Symposium on Security and Privacy, Oakland, CA, May 2008
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
3
-
-
85049220056
-
Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
-
Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors. In Proceedings of the 18th USENIX Security Symposium, Montreal, QC, August 2009.
-
Proceedings of the 18th USENIX Security Symposium, Montreal, QC, August 2009
-
-
Akritidis, P.1
Costa, M.2
Castro, M.3
Hand, S.4
-
4
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph1
-
Aleph1. Smashing the stack for fun and profit. Phrack, 49, 1996.
-
(1996)
Phrack
, vol.49
-
-
-
5
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
Orlando, FL, June
-
Todd M. Austin, Scott E. Breach, and Gurindar S. Sohi. Efficient detection of all pointer and array access errors. In Proceedings of the Conference on Programming Language Design and Implementation, pages 290-301, Orlando, FL, June 1994.
-
(1994)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
6
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, D.C., October
-
Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, Trek S. Palmer, Darko Stefanović, and Dino Dai Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 281-289, Washington, D.C., October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanović, D.5
Zovi, D.D.6
-
7
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington, D.C., August
-
Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120, Washington, D.C., August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
8
-
-
49949115783
-
Data space randomization
-
Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Paris, France, July
-
Sandeep Bhatkar and R. Sekar. Data space randomization. In Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, Paris, France, July 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5137
-
-
Bhatkar, S.1
Sekar, R.2
-
9
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
14th USENIX Security Symposium, Baltimore, MD, August 2005
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
10
-
-
26844531642
-
Basic integer overflows
-
blexim. December
-
blexim. Basic integer overflows. Phrack, 60, December 2002.
-
(2002)
Phrack
, vol.60
-
-
-
11
-
-
0034448902
-
ABCD: Eliminating array-bounds checks on demand
-
Vancouver, BC, June
-
Ratislav Bodik, Rajiv Gupta, and Vivek Sarkar. ABCD: Eliminating array-bounds checks on demand. In Proceedings of the Conference on Programming Language Design and Implementation, pages 321-333, Vancouver, BC, June 2000.
-
(2000)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 321-333
-
-
Bodik, R.1
Gupta, R.2
Sarkar, V.3
-
12
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. Non-control-data attacks are realistic threats. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
14
-
-
77954021248
-
Effective memory protection using dynamic tainting
-
Atlanta, GA, November
-
James Clause, Ioannis Doudalis, Alessandro Orso, and Milos Prvulovic. Effective memory protection using dynamic tainting. In Proceedings of the 22nd IEEE and ACM International Conference on Automated Software Engineering (ASE 2007), pages 284-292, Atlanta, GA, November 2007.
-
(2007)
Proceedings of the 22nd IEEE and ACM International Conference on Automated Software Engineering (ASE 2007)
, pp. 284-292
-
-
Clause, J.1
Doudalis, I.2
Orso, A.3
Prvulovic, M.4
-
15
-
-
0038716438
-
CCured in the real world
-
San Diego, CA
-
Jeremy Condit, Matthew Harren, Scott McPeak, George C. Necula, and Westley Weimer. CCured in the real world. In Proceedings of the Conference on Programming Language Design and Implementation, pages 232-244, San Diego, CA, 2003.
-
(2003)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 232-244
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
16
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overow vulnerabilities
-
Washington, D.C., August
-
Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. PointGuard: protecting pointers from buffer overow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, pages 91-104, Washington, D.C., August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
17
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX, January
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, pages 63-78, San Antonio, TX, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
19
-
-
0242612097
-
Memory safety without runtime checks or garbage collection
-
San Diego, CA, June
-
Dinakar Dhurjati, Sumant Kowshik, Vikram Adve, and Chris Lattner. Memory safety without runtime checks or garbage collection. In Proceedings of the 2003 Conference on Language, Compiler, and Tool Support for Embedded Systems, pages 69-80, San Diego, CA, June 2003.
-
(2003)
Proceedings of the 2003 Conference on Language, Compiler, and Tool Support for Embedded Systems
, pp. 69-80
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
Lattner, C.4
-
22
-
-
0036040515
-
Region-based memory management in Cyclone
-
Berlin, Germany, June
-
Dan Grossman, Greg Morrisett, Trevor Jim, Michael Hicks, Yanling Wang, and James Cheney. Region-based memory management in Cyclone. In Proceedings of the Conference on Programming Language Design and Implementation, pages 282-293, Berlin, Germany, June 2002.
-
(2002)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 282-293
-
-
Grossman, D.1
Morrisett, G.2
Jim, T.3
Hicks, M.4
Wang, Y.5
Cheney, J.6
-
23
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Monterey, CA, June
-
Trevor Jim, Greg Morrisett, Dan Grossman, Michael Hicks, James Cheney, and Yanling Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference, pages 275-288, Monterey, CA, June 2002.
-
(2002)
USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
25
-
-
11844297937
-
-
JTC 1/SC 22/WG 14. Technical report, International Organization for Standards
-
JTC 1/SC 22/WG 14. ISO/IEC 9899:1999: Programming languages - C. Technical report, International Organization for Standards, 1999.
-
(1999)
ISO/IEC 9899:1999: Programming Languages - C
-
-
-
26
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Washington, D.C., October
-
Gaurav S. Kc, Angelos D. Keromytis, and Vassilis Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 272-280, Washington, D.C., October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
27
-
-
29144517425
-
Ensuring code safety without runtime checks for real-time control systems
-
Grenoble, France, October
-
Sumant Kowshik, Dinakar Dhurjati, and Vikram Adve. Ensuring code safety without runtime checks for real-time control systems. In Proceedings of the International Conference on Compilers Architecture and Synthesis for Embedded Systems, pages 288-297, Grenoble, France, October 2002.
-
(2002)
Proceedings of the International Conference on Compilers Architecture and Synthesis for Embedded Systems
, pp. 288-297
-
-
Kowshik, S.1
Dhurjati, D.2
Adve, V.3
-
29
-
-
3042669120
-
Righting software
-
May
-
James R. Larus, Thomas Ball, Manuvir Das, Robert DeLine, Manuel Fähndrich, Jon Pincus, Sriram K. Rajamani, and Ramanathan Venkatapathy. Righting software. IEEE Software, 21(3):92-100, May 2004.
-
(2004)
IEEE Software
, vol.21
, Issue.3
, pp. 92-100
-
-
Larus, J.R.1
Ball, T.2
Das, M.3
DeLine, R.4
Fähndrich, M.5
Pincus, J.6
Rajamani, S.K.7
Venkatapathy, R.8
-
30
-
-
70450237674
-
Softbound: Highly compatible and complete spatial memory safety for c
-
Dublin, Ireland, June
-
Santosh Nagarakatte, Jianzhou Zhao, Milo M. K. Martin, and Steve Zdancewic. Softbound: Highly compatible and complete spatial memory safety for c. In Proceedings of the Conference on Programming Language Design and Implementation, pages 245-258, Dublin, Ireland, June 2009.
-
(2009)
Proceedings of the Conference on Programming Language Design and Implementation
, pp. 245-258
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.K.3
Zdancewic, S.4
-
32
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
Portland, OR, January
-
George Necula, Scott McPeak, and Westley Weimer. CCured: Type-safe retrofitting of legacy code. In Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 128-139, Portland, OR, January 2002.
-
(2002)
Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.1
McPeak, S.2
Weimer, W.3
-
33
-
-
84959039613
-
Cil: Intermediate language and tools for analysis and transformation of c programs
-
Proceedings of the Conference on Compiler Construction (CC'02), Grenoble, France, March
-
George C. Necula, Scott McPeak, S. P. Rahul, and Westley Weimer. Cil: Intermediate language and tools for analysis and transformation of c programs. In Proceedings of the Conference on Compiler Construction (CC'02), volume 2304 of Lecture Notes in Computer Science, pages 213-228, Grenoble, France, March 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2304
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.P.3
Weimer, W.4
-
35
-
-
85094678188
-
Run-time detection of heap-based overflows
-
San Diego, CA, October
-
William Robertson, Christopher Kruegel, Darren Mutz, and Frederik Valeur. Run-time detection of heap-based overflows. In Proceedings of the 17th Large Installation Systems Administrators Conference, pages 51-60, San Diego, CA, October 2003.
-
(2003)
Proceedings of the 17th Large Installation Systems Administrators Conference
, pp. 51-60
-
-
Robertson, W.1
Kruegel, C.2
Mutz, D.3
Valeur, F.4
-
37
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Washington, D.C.,, October
-
Hovav Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security, pages 552-561, Washington, D.C.,, October 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
38
-
-
0026845567
-
Adding run-time checking to the portable C compiler
-
April
-
Joseph L. Steffen. Adding run-time checking to the portable C compiler. Software: Practice and Experience, 22(4):305-316, April 1992.
-
(1992)
Software: Practice and Experience
, vol.22
, Issue.4
, pp. 305-316
-
-
Steffen, J.L.1
-
39
-
-
70349100695
-
Breaking the memory secrecy assumption
-
Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, and Thomas Walter. Breaking the memory secrecy assumption. In Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, 2009.
-
Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, 2009
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
42
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy, October IEEE Press
-
Jun Xu, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. Transparent runtime randomization for security. In 22nd International Symposium on Reliable Distributed Systems (SRDS'03), pages 260-269, Florence, Italy, October 2003. IEEE Press.
-
(2003)
22nd International Symposium on Reliable Distributed Systems (SRDS'03)
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
43
-
-
20344383014
-
An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs
-
Newport Beach, CA, October
-
Wei Xu, Daniel C. DuVarney, and R. Sekar. An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs. In Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 117-126, Newport Beach, CA, October 2004.
-
(2004)
Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 117-126
-
-
Xu, W.1
DuVarney, D.C.2
Sekar, R.3
-
44
-
-
38849147719
-
-
Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July
-
Yves Younan, Wouter Joosen, and Frank Piessens. Code injection in C and C++ : A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July 2004.
-
(2004)
Code Injection in C and C++: A Survey of Vulnerabilities and Countermeasures
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
45
-
-
84989825191
-
Efficient protection against heap-based buffer overflows without resorting to magic
-
Yves Younan, Wouter Joosen, and Frank Piessens. Efficient protection against heap-based buffer overflows without resorting to magic. In Proceedings of the International Conference on Information and Communication Security, Raleigh, NC, December 2006.
-
Proceedings of the International Conference on Information and Communication Security, Raleigh, NC, December 2006
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
46
-
-
39049133983
-
Extended protection against stack smashing attacks without performance loss
-
Yves Younan, Davide Pozza, Frank Piessens, and Wouter Joosen. Extended protection against stack smashing attacks without performance loss. In Proceedings of the Twenty-Second Annual Computer Security Applications Conference, Miami, FL, December 2006.
-
Proceedings of the Twenty-Second Annual Computer Security Applications Conference, Miami, FL, December 2006
-
-
Younan, Y.1
Pozza, D.2
Piessens, F.3
Joosen, W.4
|