-
1
-
-
78650887149
-
Felix "fx" lidner. Developments in cisco ios forensics
-
Felix "fx" lidner. Developments in cisco ios forensics. CONFidence 2.0, http://www.recurity-labs.com/content/pub/FX-Router-Exploitation. pdf
-
CONFidence 2.0
-
-
-
3
-
-
33646767376
-
Control-flow integrity
-
ACM, New York
-
Abadi, M., Budiu, M., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pp. 340-353. ACM, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Ligatti, J.3
-
4
-
-
0006777418
-
-
3rd edn., O'Reilly Media, Inc., Sebastopol
-
Bovet, D.P., Cesati, M.: Understanding the linux kernel, 3rd edn., p. 85. O'Reilly Media, Inc., Sebastopol (2006)
-
(2006)
Understanding the Linux Kernel
, pp. 85
-
-
Bovet, D.P.1
Cesati, M.2
-
5
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to risc
-
ACM, New York
-
Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to risc. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 27-38. ACM, New York (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
6
-
-
78650032454
-
Return-oriented programming without returns
-
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: 17th ACM Conference on Computer and Communications Security (2010)
-
17th ACM Conference on Computer and Communications Security (2010)
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.R.4
Shacham, H.5
Winandy, M.6
-
7
-
-
84861443711
-
Can dres provide long-lasting security? The case of return-oriented programming and the avc advantage
-
USENIX/ACCURATE/IAVoSS
-
Checkoway, S., Feldman, A.J., Kantor, B., Halderman, J.A., Felten, E.W., Shacham, H.: Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage. In: Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS (2009)
-
(2009)
Proceedings of EVT/WOTE 2009
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
8
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. Springer, Heidelberg
-
Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: Drop: Detecting return-oriented programming malicious code. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 163-177. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5905
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
10
-
-
84863138534
-
Real-world buffer overflow protection for userspace & kernelspace
-
USENIX Association, Berkeley
-
Dalton, M., Kannan, H., Kozyrakis, C.: Real-world buffer overflow protection for userspace & kernelspace. In: Proceedings of the 17th Conference on Security Symposium, SS 2008, pp. 395-410. USENIX Association, Berkeley (2008)
-
(2008)
Proceedings of the 17th Conference on Security Symposium, SS 2008
, pp. 395-410
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
11
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
Davi, L., Sadeghi, A.R., Winandy, M.: Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 49-54 (2009)
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing
, pp. 49-54
-
-
Davi, L.1
Sadeghi, A.R.2
Winandy, M.3
-
13
-
-
74049104722
-
Defending embedded systems against control flow attacks
-
ACM, New York
-
Francillon, A., Perito, D., Castelluccia, C.: Defending embedded systems against control flow attacks. In: Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, SecuCode 2009, pp. 19-26. ACM, New York (2009)
-
(2009)
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, SecuCode 2009
, pp. 19-26
-
-
Francillon, A.1
Perito, D.2
Castelluccia, C.3
-
14
-
-
70349278622
-
Code injection attacks on harvard-architecture devices
-
Syverson, P., Jha, S. (eds.)
-
Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, pp. 15-26 (2008)
-
(2008)
Proceedings of CCS 2008
, pp. 15-26
-
-
Francillon, A.1
Castelluccia, C.2
-
18
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Hund, R., Holz, T., Freiling, F.C.: Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In: Proceedings of 18th USENIX Security Symposium, San Jose, CA, USA (2009)
-
Proceedings of 18th USENIX Security Symposium, San Jose, CA, USA (2009)
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
20
-
-
71549157865
-
X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique
-
Krahmer, S.: X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Phrack Magazine (2005), http://www.suse.de/krahmer/no- nx.pdf
-
(2005)
Phrack Magazine
-
-
Krahmer, S.1
-
21
-
-
77954614533
-
Defeating return-oriented rootkits with 'return-less' kernels
-
Li, J., Wang, Z., Jiang, X., Grace, M., Bahram, S.: Defeating return-oriented rootkits with 'return-less' kernels. In: Proceedings of the 5th ACMSIGOPS EuroSys Conference, EuroSys 2010 (2010)
-
Proceedings of the 5th ACMSIGOPS EuroSys Conference, EuroSys 2010 (2010)
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
26
-
-
3042642332
-
The advanced return-into-lib(c) exploits (pax case study)
-
Nergal
-
Nergal: The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine (2001), http://www.phrack.org/archives/58/p58-0x04
-
(2001)
Phrack Magazine
-
-
-
27
-
-
85036476282
-
Smashing the kernel stack for fun and profit
-
noir
-
noir: Smashing the kernel stack for fun and profit. Phrack Magazine (2006), http://www.phrack.com/issues.html?issue=60&id=6
-
(2006)
Phrack Magazine
-
-
-
29
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
30
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
ACM, New York
-
Seshadri, A., Luk, M., Qu, N., Perrig, A.: Secvisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity oses. In: Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles, pp. 335-350. ACM, New York (2007)
-
(2007)
Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
33
-
-
84960561455
-
On computable numbers, with an application to the entscheidungsproblem
-
Turing, A.M.: On computable numbers, with an application to the entscheidungsproblem. Proc. London Math. Soc., 230-265 (1936)
-
(1936)
Proc. London Math. Soc.
, pp. 230-265
-
-
Turing, A.M.1
-
36
-
-
84875683459
-
-
Wikipedia: Exec shield, http://en.wikipedia.org/wiki/Exec-Shield
-
Exec Shield
-
-
|