-
1
-
-
0041774258
-
-
Technical Report CSE-91-11-04, [Online]. Available
-
Keppel, D., Eggers, S.J., and Henry, R.R. 1991. A case for runtime code generation. Technical Report CSE-91-11-04, University of Washington. [Online]. Available: http://www.cs.washington.edu/research/compiler/papers.d/rtcg-case. html
-
(1991)
A Case for Runtime Code Generation
-
-
Keppel, D.1
Eggers, S.J.2
Henry, R.R.3
-
2
-
-
0345565890
-
A Brief History of Just-in-time
-
Aycock, J., "A Brief History of Just-in-time", ACM Computing Surveys, 35, 2, pp.97-113. 2003
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.2
, pp. 97-113
-
-
Aycock, J.1
-
3
-
-
78649997483
-
-
[Online]. Available
-
Google Inc. 2010. V8 JavaScript Engine. [Online]. Available: http://code.google.com/apis/v8/design.html.
-
(2010)
V8 JavaScript Engine
-
-
-
4
-
-
78650001763
-
Interpreter exploitation: Pointer inference and jit spraying
-
Blazakis, D, "Interpreter exploitation: Pointer inference and jit spraying". In Black Hat DC, USA, 2010.
-
Black Hat DC, USA, 2010
-
-
Blazakis, D.1
-
6
-
-
78650000357
-
-
[Online]. Available
-
Microsoft Inc. 2010. Data Execution Prevention: frequently asked questions. [Online]. Available: http://windows.microsoft.com/en-US/windows- vista/Data-Execution-Prevention-frequently-asked-questions.
-
(2010)
Data Execution Prevention: Frequently Asked Questions
-
-
-
8
-
-
78649982227
-
-
[Online]. Available
-
Sintsov, A. 2010. Writing JIT-Spray Shellcode for fun and profit. Digital Security Research Group. [Online]. Available: http://www.dsecrg.com/files/pub/ pdf/Writing%20JIT-Spray%20Shellcode%20for%20fun%20and%20profit.pdf.
-
(2010)
Writing JIT-Spray Shellcode for Fun and Profit
-
-
Sintsov, A.1
-
9
-
-
78650010195
-
-
[Online]. Available
-
Wikipedia. 2010. V8 (JavaScript engine). [Online]. Available: http://en.wikipedia.org/wiki/V8-(JavaScript-engine)
-
(2010)
V8 (JavaScript Engine)
-
-
-
10
-
-
79957789966
-
-
[Online]. Available
-
Sinan Eran (noir). GetPC code. [Online]. Available: http://www. securityfocus.com/archive/82/327100/2009-02-24/1.
-
GetPC Code
-
-
Eran, S.1
-
11
-
-
38149090090
-
Instruction Set Reference
-
[Online]. Available
-
Intel Corp, IA-32 Intel® Architecture Software Developer's Manual Volume 2: Instruction Set Reference, [Online]. Available: http://developer. intel.com/design/pentiumii/manuals/243191.htm, 2001.
-
(2001)
IA-32 Intel® Architecture Software Developer's Manual
, vol.2
-
-
-
12
-
-
84924734121
-
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
-
Ratanaworabhan, P., Livshits, B., Zorn, B., "NOZZLE: A Defense Against Heap-spraying Code Injection Attacks", In Proceedings of the 18th USENIX Security Symposium, 2009
-
Proceedings of the 18th USENIX Security Symposium, 2009
-
-
Ratanaworabhan, P.1
Livshits, B.2
Zorn, B.3
-
13
-
-
79957860031
-
-
The HotSpot Group, [Online]. Available
-
The HotSpot Group, HotSpot, [Online]. Available: http://openjdk.java.net/ groups/hotspot/.
-
HotSpot
-
-
-
15
-
-
32444440610
-
-
[Online]. Available
-
Microsoft Corp., The .NET Framework. [Online]. Available: http://www.microsoft.com/net/.
-
The.NET Framework
-
-
-
17
-
-
79957871838
-
-
skypher.com, [Online]. Available
-
skypher.com, Hacking/Shellcode/GetPC. [Online]. Available: http://skypher.com/wiki/index.php/Hacking/Shellcode/GetPC.
-
Hacking/Shellcode/GetPC
-
-
-
18
-
-
77954641782
-
-
[Online]. Available
-
Mozilla project, JavaScript:TraceMonkey. [Online]. Available: https://wiki.mozilla.org/JavaScript:TraceMonkey.
-
JavaScript:TraceMonkey
-
-
-
19
-
-
70349120464
-
-
The Google Chrome Team, Technical Report [Online]. Available
-
Barth, A., Jackson, C., Reis, C., and The Google Chrome Team, The Security Architecture of the Chromium Browser, Technical Report 2008. [Online]. Available: http://www.adambarth.com/papers/2008/barth-jackson-reis.pdf.
-
(2008)
The Security Architecture of the Chromium Browser
-
-
Barth, A.1
Jackson, C.2
Reis, C.3
-
20
-
-
33751067472
-
A safety-oriented platform for web applications
-
Cox, R.S., Hansen, J.G., Gribble, S.D., and Levy, H.M.. "A safety-oriented platform for web applications", In IEEE Symposium on Security and Privacy, 2006.
-
IEEE Symposium on Security and Privacy, 2006
-
-
Cox, R.S.1
Hansen, J.G.2
Gribble, S.D.3
Levy, H.M.4
-
21
-
-
50249182906
-
Secure web browsing with the op web browser
-
Grier, C., Tang, S., and King, S.T.. "Secure web browsing with the op web browser". In IEEE Symposium on Security and Privacy, 2008.
-
IEEE Symposium on Security and Privacy, 2008
-
-
Grier, C.1
Tang, S.2
King, S.T.3
-
23
-
-
72849140093
-
-
March [Online]. Available
-
Zeigler, A.. IE8 and Loosely-Coupled IE, March 2008. [Online]. Available: http://blogs.msdn.com/ie/archive/2008/03/11/ie8-and-loosely-coupledie-lcie. aspx.
-
(2008)
IE8 and Loosely-Coupled IE
-
-
Zeigler, A.1
-
24
-
-
84875838249
-
-
[Online]. Available
-
WebKit Open Source Project, SunSpider 0.9.1 JavaScript Benchmark, [Online]. Available: http://www2.webkit.org/perf/sunspider-0.9.1/sunspider.html.
-
SunSpider 0.9.1 JavaScript Benchmark
-
-
-
25
-
-
4344593013
-
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns
-
Pincus, J., Baker, B., "Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns", in IEEE Security & Privacy, 2004.
-
(2004)
IEEE Security & Privacy
-
-
Pincus, J.1
Baker, B.2
-
26
-
-
34548146785
-
-
[Online]. Available
-
Wikipedia, Data Execution Prevention, [Online]. Available: http://en.wikipedia.org/wiki/Data-Execution-Prevention.
-
Data Execution Prevention
-
-
-
27
-
-
77952351839
-
The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)
-
Shacham, H.. "The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)". In Proc. 14th ACM Conf. Comp. and Comm. Sec. (CCS 2007), 2007
-
Proc. 14th ACM Conf. Comp. and Comm. Sec. (CCS 2007), 2007
-
-
Shacham, H.1
-
28
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., and Boneh, D.. "On the effectiveness of address-space randomization". In Proc. 11th ACM Conf. Comp. and Comm. Sec.(CCS 2004), 2004.
-
Proc. 11th ACM Conf. Comp. and Comm. Sec.(CCS 2004), 2004
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.J.4
Modadugu, N.5
Boneh, D.6
-
30
-
-
79957846665
-
-
[Online]. Available 2010
-
Pwn2Own 2010, [Online]. Available: http://dvlabs.tippingpoint.com/blog/ 2010/02/15/pwn2own-2010, 2010.
-
(2010)
Pwn2Own
-
-
-
31
-
-
69149106605
-
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
-
Yee, B., Sehr, D., Dardyk, G., Chen, J. B., Muth, R., Orm, T., et al., "Native Client: A Sandbox for Portable, Untrusted x86 Native Code", In Proceedings of the 2009 IEEE Symposium on Security and Privacy (Oakland 2009), 2009
-
Proceedings of the 2009 IEEE Symposium on Security and Privacy (Oakland 2009), 2009
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Orm, T.6
-
32
-
-
84855195743
-
-
[Online]. Available
-
Microsoft Corp., Silverlight, [Online]. Available: http://www.microsoft. com/silverlight/
-
Silverlight
-
-
-
33
-
-
84870704453
-
-
[Online]. Available
-
Adobe Corp., Adobe Flash Player, [Online]. Available: http://get.adobe.com/cn/flashplayer/.
-
Adobe Flash Player
-
-
-
34
-
-
78650448230
-
-
[Online]. Available
-
Wikipedia, Microsoft Silverlight, [Online]. Available: http://en.wikipedia.org/wiki/Microsoft-Silverlight.
-
Microsoft Silverlight
-
-
|