-
2
-
-
80455151003
-
-
ASDR TOC Vulnerabilities, OWASP ASDR Project, Last accessed Feb. 2011
-
Write-what-where condition, ASDR TOC Vulnerabilities, OWASP ASDR Project, http://www.owasp.org/index.php/Write-what-where-condition. Last accessed Feb. 2011.
-
-
-
-
3
-
-
80455151002
-
-
Aleph One, Smashing The Stack For Fun And Profit, Phrack Magazine, Nov. 1996
-
Aleph One, Smashing The Stack For Fun And Profit, Phrack Magazine, Nov. 1996.
-
-
-
-
6
-
-
80455133202
-
-
2010 CWE/SANS Top 25 Most Dangerous Software Errors. Last accessed Feb. 2011
-
2010 CWE/SANS Top 25 Most Dangerous Software Errors, MITRE and the SANS Institute, http://cwe.mitre.org/top25/index.html. Last accessed Feb. 2011.
-
-
-
-
8
-
-
80455169062
-
-
Last accessed Feb. 2011
-
Pax pagexec documentation, http://pax.grsecurity.net/docs/pageexec.txt. Last accessed Feb. 2011.
-
-
-
-
10
-
-
80455156958
-
-
Buffer overflow attacks bypassing dep (nx/xd bits) - part 2 : Code injection, Last accessed Feb. 2011
-
Buffer overflow attacks bypassing dep (nx/xd bits) - part 2 : Code injection, http://www.mastropaolo.com/?p=13. Last accessed Feb. 2011.
-
-
-
-
13
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Aug.
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, Non-Control-Data Attacks Are Realistic Threats, in Proc. of the 14th USENIX Security Symposium, Aug. 2005, pages 177-192.
-
(2005)
Proc. of the 14th USENIX Security Symposium
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
14
-
-
3042541202
-
The frame pointer overwrite
-
klog, Sept.
-
klog, The Frame Pointer Overwrite, in Phrack Magazine, Sept. 1999.
-
(1999)
Phrack Magazine
-
-
-
15
-
-
80455156962
-
-
Last accessed Feb. 2011
-
Pax aslr documentation, http://pax.grsecurity.net/docs/aslr.txt. Last accessed Feb. 2011.
-
-
-
-
16
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan.
-
C. Cowan, C.Pu, D. Maier, J. Walpole, P. Bakke, S. Beatie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks, in Proc. of the 7th USENIX Security Symposium, Jan. 1998, pages 63-78.
-
(1998)
Proc. of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beatie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
17
-
-
85009448253
-
Pointerguard: Protecting pointers from buffer overflow vulnerabilities
-
Aug.
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, Pointerguard: protecting pointers from buffer overflow vulnerabilities, in Proc. of the 12th USENIX Security Symposium, Aug. 2003, pages 91-104.
-
(2003)
Proc. of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
22
-
-
35348976981
-
Defeating compiler-level buffer overflow protection
-
June
-
S. Alexander, defeating compiler-level buffer overflow protection, in ;login: The USENIX Magazine, June 2005.
-
(2005)
Login: The USENIX Magazine
-
-
Alexander, S.1
-
23
-
-
78149470447
-
An architectural approach to preventing code injection attacks
-
Oct.
-
R. Riley, X. Jiang, and D. Xu, An Architectural Approach to Preventing Code Injection Attacks, in IEEE Transactions on Dependable and Secure Computing, Oct. 2010, pages 351-365.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, pp. 351-365
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
24
-
-
80455133197
-
-
Last accessed Feb. 2011
-
Tilo Mller, ASLR Smack & Laugh Reference, http://www.ece.cmu.edu/- dbrumley/courses/18739c-s11/docs/aslr.pdf. Last accessed Feb. 2011.
-
ASLR Smack & Laugh Reference
-
-
Mller, T.1
-
25
-
-
14844288825
-
Bypassing PaX ASLR protection
-
July
-
Tyler Durden, Bypassing PaX ASLR protection, in Phrack Magazine, July 2002.
-
(2002)
Phrack Magazine
-
-
Durden, T.1
-
26
-
-
12344316966
-
-
Last accessed Feb. 2011
-
J. Xu, Z. Kalbarxzyk, S. Patel, and R. K. Iyer, Architecture Support for Defending Against Buffer Overflow Attacks, http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.13.7372&rep=rep1&type=pdf, 2002. Last accessed Feb. 2011.
-
(2002)
Architecture Support for Defending Against Buffer Overflow Attacks
-
-
Xu, J.1
Kalbarxzyk, Z.2
Patel, S.3
Iyer, R.K.4
-
27
-
-
50249180640
-
A processor architecture defense against buffer overflow attacks
-
J. P. McGregor, D. K. Karig, Z. Shi, and R. B. Lee, A Processor Architecture Defense Against Buffer Overflow Attacks, in IEEE International Conference on Information Technology: Research and Education, 2003, pages 243-250.
-
(2003)
IEEE International Conference on Information Technology: Research and Education
, pp. 243-250
-
-
McGregor, J.P.1
Karig, D.K.2
Shi, Z.3
Lee, R.B.4
-
28
-
-
80455156955
-
-
Last accessed Feb. 2011
-
M. R. Krishnan, Heap: Pleasures and Pains, http://msdn.microsoft.com/en- us/library/ms810466.aspx. Last accessed Feb. 2011.
-
Heap: Pleasures and Pains
-
-
Krishnan, M.R.1
-
29
-
-
80455169058
-
-
Last accessed Feb. 2011
-
Malloc Multiheap, http://publib.boulder.ibm.com/infocenter/aix/v6r1/ topic/com.ibm.aix.genprogc/doc/genprogc/malloc multiheap.htm. Last accessed Feb. 2011.
-
-
-
Multiheap, M.1
-
30
-
-
80455150998
-
-
Last accessed Feb. 2011
-
mmalloc.info, http://www.slac.stanford.edu/comp/unix/package/rtems/doc/ html/mmalloc/mmalloc.info.Top.html. Last accessed Feb. 2011.
-
-
-
|