-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack, 49, 1996.
-
(1996)
Phrack
, vol.49
-
-
One, A.1
-
3
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
ACM Press
-
E. Barrantes, D. Ackley, T. Palmer, D. Stefanovic, and D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the ACM Conference on Computer and Communications Security, pages 281-289. ACM Press, 2003.
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.1
Ackley, D.2
Palmer, T.3
Stefanovic, D.4
Zovi, D.5
-
5
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
USENIX Association
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the USENIX Security Symposium, pages 105-120. USENIX Association, 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
7
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
USENIX Association
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In Proceedings of the USENIX Security Symposium, pages 271-286. USENIX Association, 2005.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 271-286
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
9
-
-
17644393012
-
Bypassing StackGuard and StackShield
-
Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 56, 2000.
-
(2000)
Phrack
, vol.56
-
-
Bulba1
Kilr2
-
11
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
USENIX Association
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the USENIX Security Symposium, pages 91-104. USENIX Association, 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
12
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overow attacks
-
USENIX Association
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overow attacks. In Proceedings of the USENIX Security Symposium, pages 63-78. USENIX Association, 1998.
-
(1998)
Proceedings of the USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
13
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
USENIX Association
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: A secretless framework for security through diversity. In Proceedings of the USENIX Security Symposium, pages 105-120. USENIX Association, 2006.
-
(2006)
Proceedings of the USENIX Security Symposium
, pp. 105-120
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
18
-
-
59449108823
-
-
National Institute of Standards and Technologies. National Vulnerability Database, 2009. http://nvd.nist.gov.
-
(2009)
National Vulnerability Database
-
-
-
19
-
-
53349142151
-
Security through redundant data diversity
-
IEEE Computer Society
-
A. Nguyen-Tuong, D. Evans, J. Knight, B. Cox, and J. Davidson. Security through redundant data diversity. In Proceedings of the IEEE International Conference on Dependable Systems and Networks, pages 187-196. IEEE Computer Society, 2008.
-
(2008)
Proceedings of the IEEE International Conference on Dependable Systems and Networks
, pp. 187-196
-
-
Nguyen-Tuong, A.1
Evans, D.2
Knight, J.3
Cox, B.4
Davidson, J.5
-
24
-
-
78650018752
-
Bypassing browser memory protections
-
A. Sotirov and M. Dowd. Bypassing browser memory protections. In Black Hat, 2008.
-
(2008)
Black Hat
-
-
Sotirov, A.1
Dowd, M.2
-
25
-
-
84906818067
-
Where's the FEEB? The e ectiveness of instruction set randomization
-
USENIX Association
-
A. Sovarel, D. Evans, and N. Paul. Where's the FEEB? The e ectiveness of instruction set randomization. In Proceedings of the USENIX Security Symposium, pages 145-160. USENIX Association, 2005.
-
(2005)
Proceedings of the USENIX Security Symposium
, pp. 145-160
-
-
Sovarel, A.1
Evans, D.2
Paul, N.3
-
26
-
-
78649418339
-
-
United States Computer Emergency Readiness Team.
-
United States Computer Emergency Readiness Team. US-CERT Vulnerability Notes, 2009. http://www.kb.cert.org/vuls/.
-
(2009)
US-CERT Vulnerability Notes
-
-
|