-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. 2009. Control-flow integrity principles, implementations, and applications. ACM Trans. Info. Syst. Secur. 13, 1.
-
(2009)
ACM Trans. Info. Syst. Secur.
, vol.13
, pp. 1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
ALEPH ONE.
-
ALEPH ONE. 1996. Smashing the stack for fun and profit. Phrack Mag. 49, 14. http://www.phrack.org/archives/49/p49-0x0e- Smashing%20The%20Stack%20For%20Fun% 20And%20Profit-by-Aleph1.txt.
-
(1996)
Phrack Mag.
, vol.49
, pp. 14
-
-
-
3
-
-
84859459147
-
-
ANONYMOUS.
-
ANONYMOUS. 2001. Once upon a free(). . . . Phrack Mag. 57, 9. http://www.phrack.org/archives/57/ p57-0x09-Once%20upon%20a%20free()-by- %anonymous%20author.txt.
-
(2001)
Once Upon A Free(). . . . Phrack Mag
, vol.57
, pp. 9
-
-
-
4
-
-
16644362894
-
Randomized instruction set emulation
-
DOI 10.1145/1053283.1053286
-
BARRANTES, E. G., ACKLEY, D. H., FORREST, S., AND STEFANOVIĆ, D. 2005. Randomized instruction set emulation. ACM Trans. Info. Syst. Secur. 8, 1, 3-40. (Pubitemid 40479428)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
6
-
-
26844531642
-
Basic integer overflows
-
BLEXIM.
-
BLEXIM. 2002. Basic integer overflows. Phrack Mag. 60, 10. http://www.phrack.org/archives/60/p60-0x0a-Basic%20Integer%20Overflows-%by- blexim.txt.
-
(2002)
Phrack Mag.
, vol.60
, pp. 10
-
-
-
7
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
P. Syverson and S. Jha Eds., ACM Press, New York, NY
-
BUCHANAN, E., ROEMER, R., SHACHAM, H., AND SAVAGE, S. 2008. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). P. Syverson and S. Jha Eds., ACM Press, New York, NY, 27-38.
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
8
-
-
84859467781
-
Bypassing stackGuard and stackShield
-
BULBA AND KIL3R.
-
BULBA AND KIL3R. 2000. Bypassing StackGuard and StackShield. Phrack Mag. 56, 5. http://www.phrack.org/archives/56/p56-0x05- Bypassing%20StackGuard%20and%20StackShield- by-Kil3r%20&%20Bulba.txt.
-
(2000)
Phrack Mag.
, vol.56
, pp. 5
-
-
-
9
-
-
84861443711
-
Can DREs provide long-lasting security? the case of return-oriented programming and the AVC advantage
-
D. Jefferson, J. L. Hall, and T. Moran Eds., USENIX/ACCURATE/IAVoSS
-
CHECKOWAY, S., FELDMAN, A. J., KANTOR, B., HALDERMAN, J. A., FELTEN, E. W., AND SHACHAM, H. 2009. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage. In Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE'09). D. Jefferson, J. L. Hall, and T. Moran Eds., USENIX/ACCURATE/ IAVoSS.
-
(2009)
Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE'09).
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
10
-
-
78650032454
-
Return-oriented programming without returns
-
A. Keromytis and V. Shmatikov Eds., ACM Press, New York, NY
-
CHECKOWAY, S., DAVI, L., DMITRIENKO, A., SADEGHI, A.-R., SHACHAM, H., AND WINANDY, M. 2010. Return-oriented programming without returns. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). A. Keromytis and V. Shmatikov Eds., ACM Press, New York, NY, 559-572.
-
(2010)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
11
-
-
71549162538
-
DROP: Detecting return-oriented programming malicious code
-
A. Prakash and I. Sengupta Eds., Lecture Notes in Computer Science, Springer-Verlag
-
CHEN, P., XIAO, H., SHEN, X., YIN, X., MAO, B., AND XIE, L. 2009. DROP: Detecting return-oriented programming malicious code. In Proceedings of the International Conference on Information Systems Security (ICISS'09). A. Prakash and I. Sengupta Eds., Lecture Notes in Computer Science, vol. 5905. Springer-Verlag, 163-177.
-
(2009)
Proceedings of the International Conference on Information Systems Security (ICISS'09)
, vol.5905
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
12
-
-
85084160243
-
StackGuard: Automatic detection and prevention of buffer-overflow attacks
-
A. Rubin Ed.
-
COWAN, C., PU, C.,MAIER, D., HINTON, H., BAKKE, P., BEATTIE, S., GRIER, A.,WAGLE, P., AND ZHANG, Q. 1998. StackGuard: Automatic detection and prevention of buffer-overflow attacks. In Proceedings of the USENIX Security Symposium. A. Rubin Ed., 63-78.
-
(1998)
Proceedings of the USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
P, U.C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
13
-
-
84859453847
-
Return-oriented exploitation
-
(Presentation slides)
-
DAI ZOVI, D. 2010. Return-oriented exploitation. Black Hat (Presentation slides). https://media.blackhat.com/bh-us-10/presentations/Zovi/BlackHat-USA- 2010-DaiZovi- Return-Oriented-Exploitation-slides.pdf.
-
(2010)
Black Hat
-
-
Dai Zovi, D.1
-
14
-
-
84859458322
-
Win32 buffer overflows (location, exploitation, and prevention)
-
DARK SPYRIT.
-
DARK SPYRIT. 1999. Win32 buffer overflows (location, exploitation, and prevention). Phrack Mag. 55, 15. http://www.phrack.org/archives/55/p55-0x0f- Win32%20Buffer%20Overflows...-by-dark% 20spyrit.txt.
-
(1999)
Phrack Mag.
, vol.55
, pp. 15
-
-
-
15
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
N. Asokan, C. Nita-Rotaru, and J.-P. Seifert Eds., ACM Press
-
DAVI, L., SADEGHI, A.-R., AND WINANDY, M. 2009. Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks. In Proceedings of the Technical Communication Summit. N. Asokan, C. Nita-Rotaru, and J.-P. Seifert Eds., ACM Press, 49-54.
-
(2009)
Proceedings of the Technical Communication Summit
, pp. 49-54
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
16
-
-
79956032720
-
ROPdefender: A detection tool to defend against returnoriented programming attacks
-
R. Sandhu and D. Wong Eds., ACM Press
-
DAVI, L., SADEGHI, A.-R., AND WINANDY, M. 2011. ROPdefender: A detection tool to defend against returnoriented programming attacks. In Proceedings of the ACM Symposium on Information Computer and Communications Security (ASIACCS). R. Sandhu and D. Wong Eds., ACM Press.
-
(2011)
Proceedings of the ACM Symposium on Information Computer and Communications Security (ASIACCS)
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
17
-
-
85095128397
-
A framework for automated architectureindependent gadget search
-
H. Shacham and C. Miller Eds., USENIX
-
DULLIEN, T., KORNAU, T., AND WEINMANN, R.-P. 2010. A framework for automated architectureindependent gadget search. In Proceedings of the USENIXWorkshop on Offensive Technologies (WOOT). H. Shacham and C. Miller Eds., USENIX.
-
(2010)
Proceedings of the USENIXWorkshop on Offensive Technologies (WOOT)
-
-
Dullien, T.1
Kornau, T.2
Weinmann, R.-P.3
-
18
-
-
14844288825
-
Bypassing PaX ASLR protection
-
DURDEN, T. 2002. Bypassing PaX ASLR protection. Phrack Mag. 59, 9. http://www.phrack.org/archives/59/p59-0x09-Bypassing%20PaX%20ASLR%20protection- by-Tyler% 20Durden.txt.
-
(2002)
Phrack Mag.
, vol.59
, pp. 9
-
-
Durden, T.1
-
19
-
-
38049035512
-
Low-level software security: Attacks and defenses
-
A. Aldini and R. Gorrieri Eds., Lecture Notes in Computer Science, Springer-Verlag
-
ERLINGSSON, U. 2007. Low-level software security: Attacks and defenses. In Foundations of Security Analysis and Design IV, A. Aldini and R. Gorrieri Eds., Lecture Notes in Computer Science, vol. 4677. Springer-Verlag, 92-134.
-
(2007)
Foundations of Security Analysis and Design IV
, vol.4677
, pp. 92-134
-
-
Erlingsson, U.1
-
20
-
-
78651539599
-
XFI: Software guards for system address spaces
-
B. Bershad and J. Mogul Eds., USENIX
-
ERLINGSSON, U., ABADI, M., VRABLE, M., BUDIU, M., AND NECULA, G. 2006. XFI: Software guards for system address spaces. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). B. Bershad and J. Mogul Eds., USENIX, 75-88.
-
(2006)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
21
-
-
14844332687
-
ProPolice: Improved stack-smashing attack detection
-
ETOH, H. AND YODA, K. 2001. ProPolice: Improved stack-smashing attack detection. IPSJ SIGNotes Comp. Sec. 14, 25. http://www.trl.ibm.com/projects/ security/ssp.
-
(2001)
IPSJ SIGNotes Comp. Sec.
, vol.14
, pp. 25
-
-
Etoh, H.1
Yoda, K.2
-
23
-
-
74049104722
-
Defending embedded systems against control flow attacks
-
S. Lachmund and C. Schaefer Eds., ACM Press
-
FRANCILLON, A., PERITO, D., AND CASTELLUCCIA, C. 2009. Defending embedded systems against control flow attacks. In Proceedings of the Workshop on Secure Executions of Untrusted Code (SecuCode). S. Lachmund and C. Schaefer Eds., ACM Press, 19-26.
-
(2009)
Proceedings of the Workshop on Secure Executions of Untrusted Code (SecuCode)
, pp. 19-26
-
-
Francillon, A.1
Perito, D.2
Castelluccia, C.3
-
27
-
-
34748842480
-
Advances in format string exploiting
-
GERA AND RIQ.
-
GERA AND RIQ. 2001. Advances in format string exploiting. Phrack Mag. 59, 7. http://www.phrack.org/archives/59/p59-0x07-Advances%20in%20format%20string% 20exploitation-by-riq%20&%20gera.txt.
-
(2001)
Phrack Mag.
, vol.59
, pp. 7
-
-
-
29
-
-
84859476272
-
Big loop integer protection
-
HOROVITZ, O. 2002. Big loop integer protection. Phrack Mag. 60, 9. http://www.phrack.org/archives/60/ p60-0x09-Big%20Loop%20Integer%20Protection- by-Oded%20Horovitz.txt.
-
(2002)
Phrack Mag.
, vol.60
, pp. 9
-
-
Horovitz, O.1
-
30
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
F. Monrose Ed., USENIX
-
HUND, R., HOLZ, T., AND FREILING, F. 2009. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Proceedings of the USENIX Security Symposium. F. Monrose Ed., USENIX, 383-398.
-
(2009)
Proceedings of the USENIX Security Symposium
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.3
-
31
-
-
67650081299
-
-
INTEL CORPORATION. Intel Corporation.
-
INTEL CORPORATION. 2011. Intel 64 and IA-32 Architectures Software Developer'sManual, Vols. 1-3B. Intel Corporation. http://www.intel.com/products/ processor/manuals/.
-
(2011)
Intel 64 and IA-32 Architectures Software developer'Smanual
, vol.1-3 B
-
-
-
32
-
-
78650002359
-
Fun and games with Mac OS X and iPhone payloads
-
(Presentation slides)
-
IOZZO, V. AND MILLER, C. 2009. Fun and games with Mac OS X and iPhone payloads. Black Hat Europe (Presentation slides). http://www.blackhat.com/ presentations/bh-europe-09/ Miller-Iozzo/BlackHat-Europe-2009-Miller-Iozzo-OSX- IPhone-Payloads-whitepaper.pdf.
-
(2009)
Black Hat Europe
-
-
Iozzo, V.1
Miller, C.2
-
33
-
-
84859453835
-
Everybody be cool this is a roppery!
-
IOZZO, V., KORNAU, T., AND WEINMANN, R.-P. 2010. Everybody be cool this is a roppery! Black Hat. http://www.zynamics.com/downloads/bh10-paper.pdf.
-
(2010)
Black Hat
-
-
Iozzo, V.1
Kornau, T.2
Weinmann, R.-P.3
-
35
-
-
14844307465
-
Vudo malloc tricks
-
KAEMPF, M. 2001. Vudo malloc tricks. Phrack Mag. 57, 8. http://www.phrack.org/archives/57/p57-0x08-Vudo%20malloc%20tricks-by-MaXX.txt.
-
(2001)
Phrack Mag.
, vol.57
, pp. 8
-
-
Kaempf, M.1
-
36
-
-
84859450905
-
The frame pointer overwrite
-
KLOG.
-
KLOG. 1999. The frame pointer overwrite. Phrack Mag. 55, 8. http://www.phrack.org/archives/55/p55-0x08-Frame%20Pointer%20Overwriting-by- klog.txt.
-
(1999)
Phrack Mag.
, vol.55
, pp. 8
-
-
-
39
-
-
84859459121
-
Payload already inside: Data re-use for ROP exploits
-
LE, L. 2010. Payload already inside: Data re-use for ROP exploits. Black Hat. https://media.blackhat.com/bh-us-10/whitepapers/Le/BlackHat-USA-2010-Le- Paper-Payloadalready- inside-data-reuse-for-ROP-exploits-wp.pdf.
-
(2010)
Black Hat
-
-
L, E.L.1
-
40
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
G. Muller Ed., ACM Press
-
LI, J., WANG, Z., JIANG, X., GRACE, M., AND BAHRAM, S. 2010. Defeating return-oriented rootkits with "return-less" kernels. In Proceedings of the EuroSys Conference. G. Muller Ed., ACM Press, 195-208.
-
(2010)
Proceedings of the EuroSys Conference
, pp. 195-208
-
-
L, I.J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
43
-
-
84859460046
-
-
Presented at the BlackHat Europe 2009 Conference
-
MILLER, C. AND IOZZO, V. 2009. Fun and games with Mac OS X and iPhone payloads. Presented at the BlackHat Europe 2009 Conference. https://www. blackhat.com/presentations/bh-europe-09/ Miller-Iozzo/BlackHat-Europe-2009- Miller-Iozzo-OSX-IPhone-Payloads-whitepaper.pdf.
-
(2009)
Fun and Games with Mac OS X and IPhone Payloads.
-
-
Miller, C.1
Iozzo, V.2
-
45
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
NERGAL.
-
NERGAL. 2001. The advanced return-into-lib(c) exploits: PaX case study. Phrack Mag. 58, 4. http://www.phrack.org/archives/58/p58-0x04-Advanced%20return- into-lib(c)%20exploits% 20(PaX%20case%20study)-by-nergal.txt.
-
(2001)
Phrack Mag.
, vol.58
, pp. 4
-
-
-
47
-
-
84859453834
-
-
Bugtraq
-
NEWSHAM, T. 2000. Non-exec stack. Bugtraq. http://seclists.org/bugtraq/ 2000/May/90.
-
(2000)
Non-exec Stack.
-
-
Newsham, T.1
-
48
-
-
78751484536
-
G-Free: Defeating returnoriented programming through gadget-less binaries
-
M. Franz and J. McDermott Eds., ACM Press
-
ONARLIOGLU, K., BILGE, L., LANZI, A., BALZAROTTI, D., AND KIRDA, E. 2010. G-Free: Defeating returnoriented programming through gadget-less binaries. In Proceedings of the Annual Computer Security Applications Conferrence (ACSAC'10). M. Franz and J. McDermott Eds., ACM Press, 49-58.
-
(2010)
Proceedings of the Annual Computer Security Applications Conferrence (ACSAC'10).
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
49
-
-
0013036260
-
-
Prentice Hall PTR, Upper Saddle River, NJ
-
PAUL, R. P. 1999. SPARC Architecture, Assembly Language Programming, and C. Prentice Hall PTR, Upper Saddle River, NJ.
-
(1999)
SPARC Architecture, Assembly Language Programming, and C
-
-
Paul, R.P.1
-
53
-
-
78649987049
-
-
Bugtraq. http://seclists.org/bugtraq/2000/Nov/26
-
RICHARTE, G. 2000. Re: Future of buffer overflows? Bugtraq. http://seclists.org/bugtraq/2000/Nov/32 and http://seclists.org/bugtraq/2000/ Nov/26.
-
(2000)
Re: Future of Buffer Overflows?
-
-
Richarte, G.1
-
57
-
-
84968558644
-
Q: Exploit hardening made easy
-
D. Wagner Ed., USENIX
-
SCHWARTZ, E., AVGERINOS, T., AND BRUMLEY, D. 2011. Q: Exploit hardening made easy. In Proceedings of the USENIX Security Symposium, D. Wagner Ed., USENIX.
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
Schwartz, E.1
Avgerinos, T.2
Brumley, D.3
-
59
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
S. D. Capitani and P. Syverson Eds., ACM Press
-
SHACHAM, H. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the ACM Conference on Computer and Communications Security (CCS'07). S. D. Capitani and P. Syverson Eds., ACM Press, 552-561.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security (CCS'07)
, pp. 552-561
-
-
Shacham, H.1
-
60
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-J.,MODADUGU, N., AND BONEH, D. 2004. On the effectiveness of address-space randomization. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'04). B. Pfitzmann and P. Liu Eds., ACM Press, 298-307. (Pubitemid 40338211)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
62
-
-
84859459124
-
-
SOLAR DESIGNER.
-
SOLAR DESIGNER. 1998. StackPatch. http://www.openwall.com/linux.
-
(1998)
StackPatch
-
-
|