-
1
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
DOI 10.1109/SP.2006.41, 1623997, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha, "Towards automatic generation of vulnerability-based signatures, " in Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006, pp. 2-16. (Pubitemid 44753708)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
2
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Berkeley, CA, USA: USENIX Association
-
M. Roesch, "Snort - lightweight intrusion detection for networks, " in Proceedings of the 13th USENIX Conference on System Administration. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238.
-
(1999)
Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
3
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Berkeley, CA, USA: USENIX Association
-
H.-A. Kim and B. Karp, "Autograph: toward automated, distributed worm signature detection, " in Proceedings of the 13th Conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 271-286.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 271-286
-
-
Kim, H.-A.1
Karp, B.2
-
4
-
-
33745798878
-
-
[Online], Available
-
"The pax project, " 2004. [Online]. Available: http://pax.grsecurity.net/.
-
(2004)
The Pax Project
-
-
-
6
-
-
3042642332
-
The advanced return-into-lib(c) exploits (pax case study)
-
[Online], Available
-
Nergal, "The advanced return-into-lib(c) exploits (pax case study), " Phrack Magazine, 2001. [Online]. Available: http://www.phrack.com/issues. html?issue=58&id=4.
-
(2001)
Phrack Magazine
-
-
Nergal1
-
7
-
-
71549157865
-
X86-64 buffer overow exploits and the borrowed code chunks exploitation technique
-
[Online], Available
-
S. Krahmer, "X86-64 buffer overow exploits and the borrowed code chunks exploitation technique, " Phrack Magazine, 2005. [Online]. Available: http://www.suse.de/krahmer/no-nx.pdf.
-
(2005)
Phrack Magazine
-
-
Krahmer, S.1
-
8
-
-
77952351839
-
The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86)
-
New York, NY, USA: ACM
-
H. Shacham, "The geometry of innocent esh on the bone: return-into-libc without function calls (on the x86), " in Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS). New York, NY, USA: ACM, 2007, pp. 552-561.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS)
, pp. 552-561
-
-
Shacham, H.1
-
9
-
-
70349278622
-
Code injection attacks on harvard-architecture devices
-
New York, NY, USA: ACM
-
A. Francillon and C. Castelluccia, "Code injection attacks on harvard-architecture devices, " in Proceedings of the 15th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2008, pp. 15-26.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 15-26
-
-
Francillon, A.1
Castelluccia, C.2
-
10
-
-
84861443711
-
Can dres provide long-lasting security?the case of return-oriented programming and the avc advantage
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham, "Can dres provide long-lasting security?the case of return-oriented programming and the avc advantage, " in Proceedings of EVT/WOTE 2009.USENIX/ACCURATE/IAVoSS, 2009.
-
(2009)
Proceedings of EVT/WOTE 2009.USENIX/ACCURATE/IAVoSS
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
11
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
San Jose, CA, USA
-
R. Hund, T. Holz, and F. C. Freiling, "Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms, " in Proceedings of 18th USENIX Security Symposium, San Jose, CA, USA, 2009, pp. 383-398.
-
(2009)
Proceedings of 18th USENIX Security Symposium
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
12
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to risc
-
New York, NY, USA: ACM
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage, "When good instructions go bad: generalizing return-oriented programming to risc, " in Proceedings of the 15th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM, 2008, pp. 27-38.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
13
-
-
78650887149
-
Felix "fx" lidner.developments in cisco ios forensics
-
"Felix "fx" lidner.developments in cisco ios forensics, " CONFidence 2.0., http://www.recurity-labs.com/content/pub/ FXRouterExploitation.pdf.
-
CONFidence 2.0
-
-
-
15
-
-
74049104722
-
Defending embedded systems against control flow attacks
-
New York, NY, USA: ACM
-
A. Francillon, D. Perito, and C. Castelluccia, "Defending embedded systems against control flow attacks, " in SecuCode '09: Proceedings of the first ACM workshop on Secure execution of untrusted code. New York, NY, USA: ACM, 2009, pp. 19-26.
-
(2009)
SecuCode '09: Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code
, pp. 19-26
-
-
Francillon, A.1
Perito, D.2
Castelluccia, C.3
-
17
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy, "Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks, " in Proceedings of the 2009 ACM workshop on Scalable trusted computing, 2009, pp. 49-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing
, pp. 49-54
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
18
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
ser. Lecture Notes in Computer Science, A. Prakash and I. Gupta, Eds., Springer
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie, "Drop: Detecting return-oriented programming malicious code." in ICISS, ser. Lecture Notes in Computer Science, A. Prakash and I. Gupta, Eds., vol. 5905. Springer, 2009, pp. 163-177.
-
(2009)
ICISS
, vol.5905
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
19
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
New York, NY, USA: ACM
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, "Defeating return-oriented rootkits with "return-less" kernels, " in EuroSys '10: Proceedings of the 5th European conference on Computer systems. New York, NY, USA: ACM, 2010, pp. 195-208.
-
(2010)
EuroSys '10: Proceedings of the 5th European Conference on Computer Systems
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
20
-
-
78650032454
-
Return-oriented programming without returns
-
A. Keromytis and V. Shmatikov, Eds. ACM Press, Oct.
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns, " in Proceedings of CCS 2010, A. Keromytis and V. Shmatikov, Eds. ACM Press, Oct. 2010, pp. 559-72.
-
(2010)
Proceedings of CCS 2010
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
22
-
-
78650024047
-
Return-oriented programming without returns on arm
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, "Return-oriented programming without returns on arm, " Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010.
-
(2010)
Technical Report HGI-TR-2010-002, Ruhr-University Bochum
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
23
-
-
84960561455
-
On computable numbers, with an application to the entscheidungs problem
-
A. M. Turing, "On computable numbers, with an application to the entscheidungs problem, " Proc. London Math. Soc., pp. 230-265, 1936.
-
(1936)
Proc. London Math. Soc.
, pp. 230-265
-
-
Turing, A.M.1
-
24
-
-
85175129712
-
-
[Online], Available
-
milw0rm. [Online]. Available: http://www.milw0rm.com/shellcode/linux/x86.
-
Milw0rm
-
-
-
25
-
-
85175133427
-
-
[Online], Available
-
"Implementing linux system calls, " Linux Journal, 1999. [Online]. Available: http://www.linuxjournal.com/article/3326.
-
(1999)
Implementing Linux System Calls
-
-
-
27
-
-
85175132289
-
-
""linux/x86 setreuid(geteuid(), geteuid()), execve("/bin/sh", 0, 0)", " milw0rm, 2009, http://www.milw0rm.com/shellcode/8972.
-
(2009)
Linux/x86 Setreuid(geteuid(), geteuid()), execve("/bin/sh", 0, 0)
-
-
-
28
-
-
85175133230
-
-
[Online], Available
-
""linux/x86/ho detector", " milw0rm, 2008. [Online]. Available: http://www.milw0rm.com/shellcode/7154.
-
(2008)
Linux/x86/Ho Detector
-
-
-
30
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song, "Binary code extraction and interface identification for security applications, " Proceedings of the 17th Annual Network and Distributed System Security Symposium, 2010.
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
32
-
-
77956569612
-
Reuse-oriented camouaging trojan: Vulnerability detection and attack construction
-
Chicago, IL, USA, June
-
Z. Lin, X. Zhang, and D. Xu, "Reuse-oriented camouaging trojan: Vulnerability detection and attack construction, " in Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS 2010), Chicago, IL, USA, June 2010.
-
(2010)
Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN-DCCS 2010)
-
-
Lin, Z.1
Zhang, X.2
Xu, D.3
-
33
-
-
78650001763
-
Interpreter exploitation: Pointer inference and jit spraying
-
D. Blazakis, "interpreter exploitation: pointer inference and jit spraying, " BHDC, 2010, http://www.semantiscope.com/research/BHDC2010/BHDC- 2010-Paper.pdf.
-
(2010)
BHDC
-
-
Blazakis, D.1
|