-
2
-
-
16644362894
-
Randomized Instruction Set Emulation
-
G. Barrantes, D. Ackley, S. Forrest, and D. Stefanovic, "Randomized Instruction Set Emulation," ACM Transactions on Information Systems Security (TISSEC), Vol 8, No 1 pp. 3-40 (2005).
-
(2005)
ACM Transactions on Information Systems Security (TISSEC)
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, G.1
Ackley, D.2
Forrest, S.3
Stefanovic, D.4
-
4
-
-
84954188728
-
Efficient Techniques for Comprehensive Protection from Memory Error Exploits
-
S. Bhatkar, R. Sekar and Daniel DuVarney, "Efficient Techniques for Comprehensive Protection from Memory Error Exploits," USENIX Security Symposium, Aug., 2005.
-
USENIX Security Symposium, Aug., 2005
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.3
-
5
-
-
78751563420
-
On the General Applicability of Instruction Set Randomization
-
07 Oct. IEEE computer Society Digital Library
-
S. W. Boyd, G. S. Kc, M. E. Locasto, A. D. Keromytis and V. Prevelakis, "On the General Applicability of Instruction Set Randomization," IEEE Trans. On Dependable and Secure Computing, 07 Oct. 2008. IEEE computer Society Digital Library.
-
(2008)
IEEE Trans. On Dependable and Secure Computing
-
-
Boyd, S.W.1
Kc, G.S.2
Locasto, M.E.3
Keromytis, A.D.4
Prevelakis, V.5
-
6
-
-
84928407537
-
Noncespaces: Using randomization to enforce information flowtracking and thwart cross-site scripting attacks
-
M. Van Gundy and H. Chen, "Noncespaces: Using randomization to enforce information flowtracking and thwart cross-site scripting attacks," Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2009
-
Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 8-11, 2009
-
-
Van Gundy, M.1
Chen, H.2
-
7
-
-
33745944184
-
Secure and Practical Defense Against Code-injection Attacks Using Software Dynamic Translation
-
W. Hu, J. D. Hiser, D. Williams, A. Filipi, J. W. Davidson, D. Evans, J. C. Knight, A. Nguyen-Tuong and J. Rowanhill, "Secure and Practical Defense Against Code-injection Attacks Using Software Dynamic Translation," Second International Conference on Virtual Execution Environments. Ottawa, Canada, June 14-16, 2006.
-
Second International Conference on Virtual Execution Environments. Ottawa, Canada, June 14-16, 2006
-
-
Hu, W.1
Hiser, J.D.2
Williams, D.3
Filipi, A.4
Davidson, J.W.5
Evans, D.6
Knight, J.C.7
Nguyen-Tuong, A.8
Rowanhill, J.9
-
9
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization
-
ACM Press
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu and Dan Boneh, "On the Effectiveness of Address-Space Randomization," Proc. CCS 2004, pp. 298-307, ACM Press.
-
Proc. CCS 2004
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
10
-
-
84906818067
-
Where's the FEEB?: The Effectiveness of Instruction Set Randomization
-
August
-
N. Sovarel, N. Paul and D. Evans, "Where's the FEEB?: The Effectiveness of Instruction Set Randomization," USENIX Security 2005, August 2005.
-
(2005)
USENIX Security 2005
-
-
Sovarel, N.1
Paul, N.2
Evans, D.3
-
11
-
-
70349100695
-
Breaking the memory secrecy assumption
-
R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and Thomas Walter, "Breaking the memory secrecy assumption," Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, 2009.
-
Proceedings of the Second European Workshop on System Security, Nuremburg, Germany, 2009
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
12
-
-
60049100434
-
Security through Diversity: Leveraging Virtual Machine Technology
-
Jan./Feb.
-
D. Williams, W. Hu, J. W. Davidson, J. D. Hiser, J. C. Knight, A. Nguyen-Tuong, "Security through Diversity: Leveraging Virtual Machine Technology," IEEE Security and Privacy, vol. 7, no. 1, pp. 26-33, Jan./Feb. 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 26-33
-
-
Williams, D.1
Hu, W.2
Davidson, J.W.3
Hiser, J.D.4
Knight, J.C.5
Nguyen-Tuong, A.6
|