-
2
-
-
84864161856
-
-
KVM, www.linux-kvm.org/
-
-
-
-
3
-
-
84864161855
-
-
QEMU, http://wiki.qemu.org/Main-Page
-
-
-
-
6
-
-
33745798878
-
-
The Pax project (2004), http://pax.grsecurity.net/
-
(2004)
The Pax Project
-
-
-
7
-
-
33646767376
-
Control-flow integrity
-
ACM, New York
-
Abadi, M., Budiu, M., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pp. 340-353. ACM, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Ligatti, J.3
-
9
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Bhatkar, E., Duvarney, D.C., Sekar, R.: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, pp. 105-120 (2003)
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, E.1
Duvarney, D.C.2
Sekar, R.3
-
11
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
Kolbitsch, C., Holz, T., Kruegel, C., Kirda, E.: Inspector gadget: Automated extraction of proprietary gadgets from malware binaries. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, pp 29-44 (2010)
-
(2010)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 29-44
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
12
-
-
85025141365
-
Binary code extraction and interface identification for security applications
-
Caballero, J., Johnson, N.M., McCamant, S., Song, D.: Binary code extraction and interface identification for security applications. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium (2010)
-
Proceedings of the 17th Annual Network and Distributed System Security Symposium (2010)
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
13
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
USENIX Association, Berkeley
-
Castro, M., Costa, M., Harris, T.: Securing software by enforcing data-flow integrity. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, vol. 7, p. 11. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
, vol.7
, pp. 11
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
14
-
-
70350626575
-
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
-
Flegel, U., Bruschi, D. (eds.) DIMVA 2009. Springer, Heidelberg
-
Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 88-106. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5587
, pp. 88-106
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
15
-
-
78651539599
-
XFI: Software guards for system address spaces
-
USENIX Association, Berkeley
-
Erlingsson, U., Valley, S., Abadi, M., Vrable, M., Budiu, M., Necula, G.C.: XFI: Software guards for system address spaces. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, vol. 7, p. 6. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation
, vol.7
, pp. 6
-
-
Erlingsson, U.1
Valley, S.2
Abadi, M.3
Vrable, M.4
Budiu, M.5
Necula, G.C.6
-
16
-
-
77949446893
-
BuBBle: A javascript engine level countermeasure against heap-spraying attacks
-
Massacci, F.,Wallach, D., Zannone, N. (eds.) ESSoS 2010. Springer, Heidelberg
-
Gadaleta, F., Younan, Y., Joosen, W.: BuBBle: A javascript engine level countermeasure against heap-spraying attacks. In:Massacci, F.,Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol. 5965, pp. 1-17. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5965
, pp. 1-17
-
-
Gadaleta, F.1
Younan, Y.2
Joosen, W.3
-
17
-
-
79960875294
-
Jitsec: Just-in-time security for code injection attacks
-
de Groef, W., Nikiforakis, N., Younan, Y., Piessens, F.: Jitsec: Just-in-time security for code injection attacks. In: Benelux Workshop on Information and System Security (WISSEC 2010), pp. 1-15 (2010)
-
(2010)
Benelux Workshop on Information and System Security (WISSEC 2010)
, pp. 1-15
-
-
De Groef, W.1
Nikiforakis, N.2
Younan, Y.3
Piessens, F.4
-
18
-
-
84871161835
-
-
Google Inc.: code.google.com/apis/v8/intro.html
-
Google Inc.: V8 javascript engine, code.google.com/apis/v8/intro.html
-
V8 Javascript Engine
-
-
-
27
-
-
78650010363
-
-
Secure dynamic code generation against spraying. Poster, ACM, New York
-
Tao, W., Tielei, W., Lei, D., Jing, L.: Secure dynamic code generation against spraying. In: CCS 2010 Poster, pp. 738-740. ACM, New York (2010)
-
(2010)
CCS 2010
, pp. 738-740
-
-
Tao, W.1
Tielei, W.2
Lei, D.3
Jing, L.4
-
29
-
-
84864162910
-
-
Wikipedia: Heap spraying (2010), http://en.wikipedia.org/wiki/Heap- spraying
-
(2010)
Heap Spraying
-
-
|