-
5
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. In Phrack Magazine n.49, 1996.
-
(1996)
Phrack Magazine
, Issue.49
-
-
One, A.1
-
7
-
-
84861443711
-
Can DREs Provide Long-Lasting Security? the Case of Return-Oriented Programming and the AVC Advantage
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. In Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS, 2009.
-
(2009)
Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
9
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie. Drop: Detecting return-oriented programming malicious code. In Lecture Notes in Computer Science, 2009.
-
(2009)
Lecture Notes in Computer Science
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
10
-
-
85009448253
-
PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities. In Proceedings of the 12th Usenix Security Symposium,, 2003.
-
Proceedings of the 12th Usenix Security Symposium,, 2003
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
th USENIX Security Symposium, USA, 1998.
-
th USENIX Security Symposium, USA, 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
0002582136
-
Buffer overflows: Attacks and Defenses for the Vulnerability of the Decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and Defenses for the Vulnerability of the Decade. In Proceedings of the DARPA Information Survivability Conference and Exposition,, 2000.
-
Proceedings of the DARPA Information Survivability Conference and Exposition,, 2000
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
20
-
-
85084162336
-
Secure execution via program shepherding
-
Berkeley, CA, USA, USENIX Association
-
V. Kiriansky, D. Bruening, and S. P. Amarasinghe. Secure execution via program shepherding. In Proceedings of the 11th USENIX Security Symposium, pages 191-206, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
21
-
-
77954614533
-
Defeating Return-Oriented Rootkits with Return-less Kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating Return-Oriented Rootkits with Return-less Kernels. In Proceedings of the 5th ACM SIGOPS EuroSys Conference, 2010.
-
Proceedings of the 5th ACM SIGOPS EuroSys Conference, 2010
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
23
-
-
3042642332
-
The advanced return-into-lib(c) exploits
-
Nergal. The advanced return-into-lib(c) exploits. In Phrack Magazine n.58, 2001.
-
(2001)
Phrack Magazine
, Issue.58
-
-
Nergal1
-
24
-
-
56549083677
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
Berlin, Heidelberg, Springer-Verlag
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In RAID '08: Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection, pages 1-20, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
RAID '08: Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection
, pp. 1-20
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
25
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
IEEE Computer Society, Dec.
-
th Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA., pages 60-69. IEEE Computer Society, Dec. 2009.
-
(2009)
th Annual Computer Security Applications Conference (ACSAC), Honolulu, Hawaii, USA
, pp. 60-69
-
-
Roglia, G.F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
30
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CSS), 2004.
-
Proceedings of the 11th ACM Conference on Computer and Communications Security (CSS), 2004
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
33
-
-
78751556291
-
-
Technical report
-
The PaX Team. Pax non-executable pages. Technical report, http://pax.grsecurity.net/docs/noexec.txt.
-
Pax Non-executable Pages
-
-
-
36
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Z. Wang, X. Jiang, W. Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS, 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS, 2009
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|