-
1
-
-
34548146785
-
-
Microsoft Corporation. Data execution prevention. http://technet. microsoft.com/enus/library/cc738483.aspx.
-
Data Execution Prevention
-
-
-
2
-
-
84882762802
-
-
The PaX team. http://pax.grsecurity.net.
-
The PaX Team
-
-
-
4
-
-
85170013541
-
-
Microsoft Internet Explorer .
-
Microsoft Internet Explorer .ANI file "anjh" header BoF exploit, 2004. http://skypher.com/wiki/index.php?title=www.edup.tudelft.nl/ ~bjwever/details-msie-ani.html.php.
-
(2004)
ANI File "Anjh" Header BoF Exploit
-
-
-
10
-
-
80051984773
-
-
Pwn2own 2010, 2010. http://dvlabs.tippingpoint.com/blog/2010/02/15/ pwn2own-2010.
-
(2010)
Pwn2own 2010
-
-
-
15
-
-
80053518299
-
Interpreter exploitation: Pointer inference and jit spraying
-
D. Blazakis. Interpreter exploitation: Pointer inference and jit spraying. In Blackhat, USA, 2010.
-
Blackhat, USA, 2010
-
-
Blazakis, D.1
-
16
-
-
79952020076
-
RICH: Automatically protecting against integer-based vulnerabilities
-
D. Brumley, T. Chiueh, R. Johnson, H. Lin, and D. Song. RICH: Automatically protecting against integer-based vulnerabilities. In Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS), 2007.
-
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS), 2007
-
-
Brumley, D.1
Chiueh, T.2
Johnson, R.3
Lin, H.4
Song, D.5
-
17
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 1998.
-
POPL '98: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1998
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
18
-
-
85170001623
-
-
CVE, 2007. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007- 0038.
-
(2007)
CVE
-
-
-
20
-
-
33644565261
-
Polymorphic shellcode engine using spectrum analysis
-
T. Detristan, T. Ulenspiegel, and Yann malcom. Polymorphic shellcode engine using spectrum analysis. Phrack 11,57-15 (2001).
-
(2001)
Phrack
, vol.11
, pp. 57-115
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
-
23
-
-
78650613386
-
A scalable concurrent malloc(3) implementation for freebsd
-
J. Evans. A scalable concurrent malloc(3) implementation for freebsd. In BSDCan conference, 2006.
-
BSDCan Conference, 2006
-
-
Evans, J.1
-
25
-
-
0025237929
-
Fast allocation and deallocation of memory based on object lifetimes
-
D. R. Hanson. Fast allocation and deallocation of memory based on object lifetimes. Softw. Pract. Exper., 20(1):5-12, 1990.
-
(1990)
Softw. Pract. Exper.
, vol.20
, Issue.1
, pp. 5-12
-
-
Hanson, D.R.1
-
26
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In ACSAC'06: Proceedings of the 22th Annual Computer Security Applications Conference, 2006.
-
ACSAC'06: Proceedings of the 22th Annual Computer Security Applications Conference, 2006
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
31
-
-
85045981068
-
Binary obfuscation using signals
-
I. V. Popov, S. K. Debray, and G. R. Andrews. Binary obfuscation using signals. In SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Berkeley, CA, USA, 2007.
-
SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, Berkeley, CA, USA, 2007
-
-
Popov, I.V.1
Debray, S.K.2
Andrews, G.R.3
-
34
-
-
77952348035
-
Writing ia32 alphanumeric shellcodes
-
RIX.
-
RIX. Writing ia32 alphanumeric shellcodes. Phrack 11,57-15 (2001).
-
(2001)
Phrack
, vol.11
, pp. 57-115
-
-
-
35
-
-
85170006024
-
-
P. M. Sanjay Ghemawat, 2005. http://goog-perftools.sourceforge.net/doc/ tcmalloc.html.
-
(2005)
-
-
Sanjay Ghemawat, P.M.1
-
37
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
ACM
-
Y. Song, M. E. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the infeasibility of modeling polymorphic shellcode. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
39
-
-
78650018752
-
Bypassing browser memory protections in windows vista
-
A. Sotirov. Bypassing browser memory protections in windows vista. In Blackhat, USA, 2008.
-
Blackhat, USA, 2008
-
-
Sotirov, A.1
-
41
-
-
34548162913
-
Bypassing data execution prevention on microsoftwindows xp sp2
-
N. Stojanovski, M. Gusev, D. Gligoroski, and Svein.J.Knapskog. Bypassing data execution prevention on microsoftwindows xp sp2. In The Second International Conference on Availability, Reliability and Security (ARES), 2007.
-
The Second International Conference on Availability, Reliability and Security (ARES), 2007
-
-
Stojanovski, N.1
Gusev, M.2
Gligoroski, D.3
Knapskog, S.J.4
-
44
-
-
78649988672
-
An analysis of address space layout randomization on windows vista™
-
O. Whitehouse. An analysis of address space layout randomization on windows vista™. In Symantec Advanced Threat Research, 2007.
-
(2007)
Symantec Advanced Threat Research
-
-
Whitehouse, O.1
-
45
-
-
38849147719
-
-
Technical Report CW386, Department of Computer Science, Katholieke Universiteit Leuven
-
Y. Younan, W. Joosen, and F. Piessens. Code injection in C and C++ : A survey of vulnerabilities and countermeasures. Technical Report CW386, Department of Computer Science, Katholieke Universiteit Leuven, 2004.
-
(2004)
Code Injection in C and C++: A Survey of Vulnerabilities and Countermeasures
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
46
-
-
0029705858
-
Cryptovirology: Extortion-based security threats and countermeasures
-
Washington, DC, USA, IEEE Computer Society
-
A. Young and M. Yung. Cryptovirology: Extortion-based security threats and countermeasures. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 129, Washington, DC, USA, 1996. IEEE Computer Society.
-
(1996)
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 129
-
-
Young, A.1
Yung, M.2
-
47
-
-
77950621688
-
Studying malicious websites and the underground economy on the chinese web
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying malicious websites and the underground economy on the chinese web. In Proceedings of the 7th Workshop on the Economics of Information Security (WEIS'08), 2008.
-
Proceedings of the 7th Workshop on the Economics of Information Security (WEIS'08), 2008
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
|