-
1
-
-
84855734503
-
-
Wikipedia. W^X. http://en.wikipedia.org/wiki/W^X.
-
-
-
-
2
-
-
76949101487
-
Getting around non-executable stack (and fix)
-
Solar Designer
-
Solar Designer. Getting around non-executable stack (and fix). Bugtraq, 1997.
-
(1997)
Bugtraq
-
-
-
3
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Hovav Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In 14th ACM CCS, 2007.
-
(2007)
14th ACM CCS
-
-
Shacham, H.1
-
4
-
-
79956023817
-
Drop: Detecting return-oriented programming malicious code
-
Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, and Li Xie. Drop: Detecting return-oriented programming malicious code. In 5th ACM ICISS, 2009.
-
(2009)
5th ACM ICISS
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
5
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. Dynamic Integrity Measurement and Attestation: Towards Defense against Return-oriented Programming Attacks. In 4th ACM STC, 2009.
-
(2009)
4th ACM STC
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
6
-
-
77954614533
-
Defeating return-oriented rootkits with return-less kernels
-
April
-
Jinku Li, Zhi Wang, Xuxian Jiang, Mike Grace, and Sina Bahram. Defeating return-oriented rootkits with return-less kernels. In 5th ACM SIGOPS EuroSys Conference, April 2010.
-
(2010)
5th ACM SIGOPS EuroSys Conference
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
7
-
-
78650021053
-
ROPdefender: A detection tool to defend against return-oriented programming attacks
-
Horst Görtz Institute for IT Security, March
-
Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. ROPdefender: A detection tool to defend against return-oriented programming attacks. Technical Report HGI-TR-2010-001, Horst Görtz Institute for IT Security, March 2010.
-
(2010)
Technical Report HGI-TR-2010-001
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
8
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
April
-
Tzi-cker Chiueh and Fu-Hau Hsu. RAD: A Compile-Time Solution to Buffer Overflow Attacks. In 21st IEEE ICDCS, April 2001.
-
(2001)
21st IEEE ICDCS
-
-
Chiueh, T.-C.1
Hsu, F.-H.2
-
11
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
March
-
Tyler Bletsch, Xuxian Jiang, Vince Freeh, and Zhenkai Liang. Jump-Oriented Programming: A New Class of Code-Reuse Attack. In 6th AsiaCCS, March 2011.
-
(2011)
6th AsiaCCS
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
Liang, Z.4
-
12
-
-
78650032454
-
Return-oriented programming without returns
-
October
-
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. Return-Oriented Programming Without Returns. In 17th ACM CCS, October 2010.
-
(2010)
17th ACM CCS
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
13
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
October
-
Martín Abadi, Mihai Budiu, Úlfar Erilingsson, and Jay Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In 12th ACM CCS, October 2005.
-
(2005)
12th ACM CCS
-
-
Abadi, M.1
Budiu, M.2
Erilingsson, U.3
Ligatti, J.4
-
14
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
File 4 of 14, December
-
Nergal. The Advanced Return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 11, Issue 0x58, File 4 of 14, December 2001.
-
(2001)
Phrack Magazine
, vol.11
, Issue.58
-
-
Nergal1
-
15
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
New York, NY, USA. ACM
-
Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC. In 15th ACM CCS, pages 27-38, New York, NY, USA, 2008. ACM.
-
(2008)
15th ACM CCS
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
16
-
-
84855734502
-
"FX" Lidner. Developments in Cisco IOS forensics
-
Felix, November
-
Felix "FX" Lidner. Developments in Cisco IOS Forensics. In CONference 2.0, November 2009.
-
(2009)
CONference 2.0
-
-
-
18
-
-
84861443711
-
Can DREs provide long-lasting security? the case of return-oriented programming and the AVC Advantage
-
August
-
Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In EVT/WOTE 2009, USENIX, August 2009.
-
(2009)
EVT/WOTE 2009, USENIX
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
19
-
-
84855734501
-
Utilizing code reuse/ROP in PHP application exploits
-
Stefan Esser. Utilizing Code Reuse/ROP in PHP Application Exploits. In BlackHat USA, 2010.
-
(2010)
BlackHat USA
-
-
Esser, S.1
-
20
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
August
-
Ralf Hund, Thorsten Holz, and Felix C. Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In 19th USENIX Security Symposium, August 2009.
-
(2009)
19th USENIX Security Symposium
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
21
-
-
74049112175
-
On the difficulty of software-based attestation of embedded devices
-
New York, NY, USA. ACM
-
Daniele Perito Claude Castelluccia, Aurélien Francillon and Claudio Soriente. On the Difficulty of Software-Based Attestation of Embedded Devices. In 16th ACM CCS, New York, NY, USA, 2009. ACM.
-
(2009)
16th ACM CCS
-
-
Castelluccia, D.P.C.1
Francillon, A.2
Soriente, C.3
-
22
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In 7th USENIX Security, page 5, 1998.
-
(1998)
7th USENIX Security
, pp. 5
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
23
-
-
36049009995
-
-
PaX Team. PaX ASLR Documentation. http://pax.grsecurity.net/docs/aslr. txt.
-
PaX ASLR Documentation
-
-
-
24
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. 12th USENIX Security, 2003.
-
(2003)
12th USENIX Security
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
25
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. 14th USENIX Security, 2005.
-
(2005)
14th USENIX Security
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
26
-
-
27644457078
-
Transparent runtime randomization for security
-
October
-
Jun Xu, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. Transparent Runtime Randomization for Security. 22nd SRDS, October 2003.
-
(2003)
22nd SRDS
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
27
-
-
14844288825
-
Bypassing PaX ASLR protection
-
File 9 of 18, June
-
Tyler Durden. Bypassing PaX ASLR Protection. Phrack Magazine, Volume 11, Issue 0x59, File 9 of 18, June 2002.
-
(2002)
Phrack Magazine
, vol.11
, Issue.59
-
-
Durden, T.1
-
28
-
-
14844328033
-
On the effectiveness of address space randomization
-
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the Effectiveness of Address Space Randomization. 11th ACM CCS, 2004.
-
(2004)
11th ACM CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
30
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
November
-
Miguel Castro, Manuel Costa, and Tim Harris. Securing Software by Enforcing Data-Flow Integrity. In 7th USENIX OSDI, November 2006.
-
(2006)
7th USENIX OSDI
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
31
-
-
78651539599
-
XFI: Software guards for system address spaces
-
Úlfar Erlingsson, Martin Abadi, Michael Vrable, Mihai Budiu, and George C. Necula. XFI: Software Guards for System Address Spaces. In 7th USENIX OSDI, 2006.
-
(2006)
7th USENIX OSDI
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
32
-
-
50249149602
-
Preventing memory error exploits with WIT
-
May
-
Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, and Miguel Castro. Preventing Memory Error Exploits with WIT. In 28th IEEE Symposium on Security and Privacy, May 2008.
-
(2008)
28th IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
33
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
October
-
Miguel Castro, Manuel Costa, Jean-Philippe Martin, Marcus Peinado, Periklis Akritidis, Austin Donnelly, Paul Barham, and Richard Black. Fast Byte-Granularity Software Fault Isolation. In 22nd ACM SOSP, October 2009.
-
(2009)
22nd ACM SOSP
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
34
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-free: Defeating return-oriented programming through gadget-less binaries. In ACSAC, 2010.
-
(2010)
ACSAC
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
36
-
-
73649126934
-
Native Client: A sandbox for portable, untrusted x86 native code
-
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, and Nicholas Fullagar. Native Client: A sandbox for portable, untrusted x86 native code. Communications of the ACM, 53(1):91-99, 2010.
-
(2010)
Communications of the ACM
, vol.53
, Issue.1
, pp. 91-99
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Bradley Chen, J.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
37
-
-
84855751231
-
-
Felix von Leitner et al. dietlibc. http://www.fefe.de/dietlibc/.
-
-
-
Von Leitner, F.1
-
38
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. Non-control-data attacks are realistic threats. In 14th USENIX Security, pages 177-192, 2005.
-
(2005)
14th USENIX Security
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
|