-
1
-
-
77954692562
-
TOCTOU, Traps, and Trusted Computing
-
Bratus, S., D'Cunha, N., Sparks, E., Smith, S.: TOCTOU, Traps, and Trusted Computing. In: Proceedings of the TRUST 2008 Conference, Villach, Austria (March 2008)
-
Proceedings of the TRUST 2008 Conference, Villach, Austria (March 2008)
-
-
Bratus, S.1
D'Cunha, N.2
Sparks, E.3
Smith, S.4
-
2
-
-
77954696631
-
New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)
-
Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Vieweg+Teubner Verlag, GWV Fachverlage GmbH, Wiesbaden ISBN 978-3-8348-0794-6
-
Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: New Directions for Hardware-assisted Trusted Computing Policies (Position Paper). In: Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Future of Trust in Computing, p. 30. Vieweg+Teubner Verlag, GWV Fachverlage GmbH, Wiesbaden (2009), ISBN 978-3-8348-0794-6
-
(2009)
Future of Trust in Computing
, pp. 30
-
-
Bratus, S.1
Locasto, M.E.2
Ramaswamy, A.3
Smith, S.W.4
-
3
-
-
70349250387
-
Traps, events, emulation, and enforcement: Managing the yin and yang of virtualization-based security
-
ACM, New York
-
Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. In: VMSec 2008: Proceedings of the 1st ACM workshop on Virtual machine security, pp. 49-58. ACM, New York (2008)
-
(2008)
VMSec 2008: Proceedings of the 1st ACM Workshop on Virtual Machine Security
, pp. 49-58
-
-
Bratus, S.1
Locasto, M.E.2
Ramaswamy, A.3
Smith, S.W.4
-
7
-
-
77954754057
-
-
Private Communication
-
Kauer, B.: Private Communication
-
-
-
Kauer, B.1
-
8
-
-
85084164191
-
Protected shared libraries: A new approach to modularity and sharing
-
USENIX Association
-
Banerji, A., Tracey, J.M., Cohn, D.L.: Protected shared libraries: a new approach to modularity and sharing. In: ATEC 1997: Proceedings of the Annual Conference on USENIX Annual Technical Conference, Berkeley, CA, USA, p. 5. USENIX Association (1997)
-
(1997)
ATEC 1997: Proceedings of the Annual Conference on USENIX Annual Technical Conference, Berkeley, CA, USA
, pp. 5
-
-
Banerji, A.1
Tracey, J.M.2
Cohn, D.L.3
-
9
-
-
0042853268
-
Integrating segmentation and paging protection for safe, efficient and transparent software extensions
-
Chiueh, T.C., Venkitachalam, G., Pradhan, P.: Integrating segmentation and paging protection for safe, efficient and transparent software extensions. SIGOPS Oper. Syst. Rev. 33(5), 140-153 (1999)
-
(1999)
SIGOPS Oper. Syst. Rev.
, vol.33
, Issue.5
, pp. 140-153
-
-
Chiueh, T.C.1
Venkitachalam, G.2
Pradhan, P.3
-
10
-
-
84858758065
-
Vx32: Lightweight user-level sandboxing on the x86
-
USENIX Association
-
Ford, B., Cox, R.: Vx32: lightweight user-level sandboxing on the x86. In: ATC 2008: USENIX 2008 Annual Technical Conference on Annual Technical Conference, Berkeley, CA, USA, pp. 293-306. USENIX Association (2008)
-
(2008)
ATC 2008: USENIX 2008 Annual Technical Conference on Annual Technical Conference, Berkeley, CA, USA
, pp. 293-306
-
-
Ford, B.1
Cox, R.2
-
11
-
-
65249109760
-
Nooks: An architecture for reliable device drivers
-
ACM, New York
-
Swift, M.M., Martin, S., Levy, H.M., Eggers, S.J.: Nooks: an architecture for reliable device drivers. In: EW10: Proceedings of the 10thWorkshop on ACM SIGOPS European Workshop, pp. 102-107. ACM, New York (2002)
-
(2002)
EW10: Proceedings of the 10thWorkshop on ACM SIGOPS European Workshop
, pp. 102-107
-
-
Swift, M.M.1
Martin, S.2
Levy, H.M.3
Eggers, S.J.4
-
13
-
-
31944440969
-
Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation
-
Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood., K.: Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In: Proceedings of Programming Language Design and Implementation (PLDI) (June 2005)
-
Proceedings of Programming Language Design and Implementation (PLDI) (June 2005)
-
-
Luk, C.K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
14
-
-
84943422723
-
An infrastructure for adaptive dynamic optimization
-
Bruening, D., Garnett, T., Amarasinghe, S.: An infrastructure for adaptive dynamic optimization. In: Proceedings of the International Symposium on Code Generation and Optimization, pp. 265-275 (2003)
-
(2003)
Proceedings of the International Symposium on Code Generation and Optimization
, pp. 265-275
-
-
Bruening, D.1
Garnett, T.2
Amarasinghe, S.3
-
17
-
-
72449145808
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-Flow Integrity: Principles, Implementations, and Applications. In: Proceedings of the ACM Conference on Computer and Communications Security, CCS (2005)
-
Proceedings of the ACM Conference on Computer and Communications Security, CCS (2005)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
20
-
-
0003518498
-
-
3rd edn. Addison Wesley, Reading
-
Gosling, J., Joy, B., Steele Jr., G.L., Bracha, G.: The Java Language Specification, 3rd edn. Addison Wesley, Reading (2005)
-
(2005)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele Jr., G.L.3
Bracha, G.4
-
22
-
-
85084162287
-
Setuid demystified
-
USENIX Association
-
Chen, H., Wagner, D., Dean, D.: Setuid demystified. In: Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, pp. 171-190. USENIX Association (2002)
-
(2002)
Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA
, pp. 171-190
-
-
Chen, H.1
Wagner, D.2
Dean, D.3
-
23
-
-
70449688944
-
The murky issue of changing process identity: Revising "setuid demystified"
-
login: June
-
Tsafrir, D., Silva, D.D., Wagner, D.: The murky issue of changing process identity: revising "setuid demystified". In: USENIX; login: (June 2008)
-
(2008)
USENIX
-
-
Tsafrir, D.1
Silva, D.D.2
Wagner, D.3
-
24
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
Syverson, P., Jha, S. (eds.) ACM Press, New York
-
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, October 2008, pp. 27-38. ACM Press, New York (2008)
-
(2008)
Proceedings of CCS 2008, October 2008
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
27
-
-
77954742312
-
Exploiting Format String Vulnerabilities
-
gera, riq: July
-
gera, riq: Exploiting Format String Vulnerabilities. Phrack 59(7) (July 2002)
-
(2002)
Phrack
, vol.59
, Issue.7
-
-
-
28
-
-
84860095094
-
Once upon a free
-
anonymous author: August
-
anonymous author: Once upon a free. Phrack 57(9) (August 2001)
-
(2001)
Phrack
, vol.57
, Issue.9
-
-
-
29
-
-
14844307465
-
Vudo malloc tricks
-
MaXX: August
-
MaXX: Vudo malloc tricks. Phrack 57(8) (August 2001)
-
(2001)
Phrack
, vol.57
, Issue.8
-
-
-
30
-
-
14844288825
-
Bypassing PaX ASLR protection
-
July
-
Durden, T.: Bypassing PaX ASLR protection. Phrack 59(5) (July 2002)
-
(2002)
Phrack
, vol.59
, Issue.5
-
-
Durden, T.1
-
31
-
-
76949101487
-
Getting around non-executable stack (and fix)
-
August
-
Designer, S.: Getting around non-executable stack (and fix). Bugtraq mailing list (August 1997)
-
(1997)
Bugtraq Mailing List
-
-
Designer, S.1
-
32
-
-
21844444349
-
Defeating solar designer non-executable stack patch
-
Wojtczuk, R.: Defeating solar designer non-executable stack patch. Bugtraq mailing list (1998)
-
(1998)
Bugtraq Mailing List
-
-
Wojtczuk, R.1
-
33
-
-
3042642332
-
Advanced return-into-lib(c) exploits (PaX case study)
-
nergal: December
-
nergal: Advanced return-into-lib(c) exploits (PaX case study). Phrack 58(4) (December 2001)
-
(2001)
Phrack
, vol.58
, Issue.4
-
-
-
34
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
De Capitani di Vimercati, S., Syverson, P. (eds.) ACM Press, New York
-
Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of CCS 2007, October 2007, pp. 552-561. ACM Press, New York (2007)
-
(2007)
Proceedings of CCS 2007, October 2007
, pp. 552-561
-
-
Shacham, H.1
|