-
1
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. CCS, 2002, pp. 138-147.
-
(2002)
Proc. CCS
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
2
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
3
-
-
24344436426
-
The blaster worm: Then and now
-
M. Bailey, E. Cooke, D. Watson, F. Jahanian, and J. Nazario, "The Blaster Worm: Then and Now," IEEE Security & Privacy, vol. 3, no. 4, pp. 26-31, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Nazario, J.5
-
5
-
-
84969533662
-
The advanced return-into-lib (c) exploits: Pax case study
-
R. Wojtczuk, "The advanced return-into-lib (c) exploits: Pax case study," Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile# 0x04 of 0x0e, 2001.
-
(2001)
Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile# 0x04 of 0x0e
-
-
Wojtczuk, R.1
-
7
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
ACM
-
T. Bletsch, X. Jiang, V. Freeh, and Z. Liang, "Jump-oriented programming: A new class of code-reuse attack," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 30-40.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
Liang, Z.4
-
8
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. Usenix Security, 1998.
-
(1998)
Proc. Usenix Security
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
9
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, and J. Lokier, "FormatGuard: Automatic protection from printf format string vulnerabilities," in Proc. Usenix Security, 2001.
-
(2001)
Proc. Usenix Security
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
10
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy, "Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks," in Proceedings of the 2009 ACM workshop on Scalable trusted computing, 2009, pp. 49-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing
, pp. 49-54
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
11
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns," in Proc. CCS, 2010, pp. 559-572.
-
(2010)
Proc. CCS
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.4
Shacham, H.5
Winandy, M.6
-
12
-
-
77954614533
-
Defeating return-oriented rootkits with return-less kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, "Defeating return-oriented rootkits with Return-Less kernels," in Proc. Eurosys, 2010, pp. 195-208.
-
(2010)
Proc. Eurosys
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
13
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-flow integrity principles, implementations, and applications," ACM Transactions on Information and System Security (TISSEC), vol. 13, no. 1, pp. 1-40, 2009.
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.1
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
14
-
-
84897489745
-
Mitigating code-reuse attacks with control-flow locking
-
T. Bletsch, X. Jiang, and V. Freeh, "Mitigating code-reuse attacks with control-flow locking," in Proc. ACSAC, 2011.
-
(2011)
Proc. ACSAC
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
-
15
-
-
29144462647
-
Anomalous path detection with hardware support
-
ACM
-
T. Zhang, X. Zhuang, S. Pande, and W. Lee, "Anomalous path detection with hardware support," in Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems. ACM, 2005, pp. 43-54.
-
(2005)
Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems
, pp. 43-54
-
-
Zhang, T.1
Zhuang, X.2
Pande, S.3
Lee, W.4
-
16
-
-
34547172136
-
Architectural support for software-based protection
-
M. Budiu, Ú. Erlingsson, and M. Abadi, "Architectural support for software-based protection," in Proc. Workshop on Architectural and system support for improving software dependability, 2006, p. 51.
-
(2006)
Proc. Workshop on Architectural and System Support for Improving Software Dependability
, pp. 51
-
-
Budiu, M.1
Erlingsson, U.2
Abadi, M.3
-
17
-
-
36049008184
-
Augmenting branch predictor to secure program execution
-
DSN'07. 37th Annual IEEE/IFIP International Conference on. IEEE
-
Y. Shi and G. Lee, "Augmenting branch predictor to secure program execution," in Dependable Systems and Networks, 2007. DSN'07. 37th Annual IEEE/IFIP International Conference on. IEEE, 2007, pp. 10-19.
-
(2007)
Dependable Systems and Networks, 2007
, pp. 10-19
-
-
Shi, Y.1
Lee, G.2
-
18
-
-
84866655418
-
Continuous profiling: Where have all the cycles gone?
-
J. Anderson, L. Berc, J. Dean, S. Ghemawat, M. Henzinger, S. Leung, R. Sites, M. Vandevoorde, C. Waldspurger, and W. Weihl, "Continuous profiling: where have all the cycles gone?" ACM SIGOPS Operating Systems Review, vol. 31, no. 5, p. 14, 1997.
-
(1997)
ACM SIGOPS Operating Systems Review
, vol.31
, Issue.5
, pp. 14
-
-
Anderson, J.1
Berc, L.2
Dean, J.3
Ghemawat, S.4
Henzinger, M.5
Leung, S.6
Sites, R.7
Vandevoorde, M.8
Waldspurger, C.9
Weihl, W.10
-
19
-
-
0031340339
-
ProfileMe: Hardware support for instruction-level profiling on out-of-order processors
-
J. Dean, J. Hicks, C. Waldspurger, W. Weihl, and G. Chrysos, "ProfileMe: Hardware support for instruction-level profiling on out-of-order processors," in Proc. MICRO, 1997, pp. 292-302.
-
(1997)
Proc. MICRO
, pp. 292-302
-
-
Dean, J.1
Hicks, J.2
Waldspurger, C.3
Weihl, W.4
Chrysos, G.5
-
20
-
-
0036652569
-
Pentium 4 performance-monitoring features
-
B. Sprunt, "Pentium 4 performance-monitoring features," IEEE Micro, vol. 22, no. 4, pp. 72-82, 2002.
-
(2002)
IEEE Micro
, vol.22
, Issue.4
, pp. 72-82
-
-
Sprunt, B.1
-
23
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. Sezer, P. Gauriar, and R. Iyer, "Non-Control-Data Attacks Are Realistic Threats," in Proc. USENIX Security, 2005.
-
(2005)
Proc. USENIX Security
-
-
Chen, S.1
Xu, J.2
Sezer, E.3
Gauriar, P.4
Iyer, R.5
-
24
-
-
84866653453
-
-
Metasploit Team
-
Metasploit Team, "Metasploit," http://www.metasploit.com/.
-
-
-
-
25
-
-
84866697887
-
-
"Exim," http://www.exim.org/.
-
-
-
-
26
-
-
55549119760
-
Distributed caching with memcached
-
B. Fitzpatrick, "Distributed caching with memcached," Linux journal, 2004.
-
(2004)
Linux Journal
-
-
Fitzpatrick, B.1
-
27
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro, "Preventing memory error exploits with WIT," in IEEE Symposium on Security and Privacy, 2008, pp. 263-277.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
28
-
-
0030645124
-
Exploiting hardware performance counters with flow and context sensitive profiling
-
G. Ammons, T. Ball, and J. Larus, "Exploiting hardware performance counters with flow and context sensitive profiling," in Proc. PLDI, 1997, pp. 85-96.
-
(1997)
Proc. PLDI
, pp. 85-96
-
-
Ammons, G.1
Ball, T.2
Larus, J.3
-
29
-
-
32844456410
-
Online performance analysis by statistical sampling of microprocessor performance counters
-
R. Azimi, M. Stumm, and R. Wisniewski, "Online performance analysis by statistical sampling of microprocessor performance counters," in Proc. Supercomputing, 2005, pp. 101-110.
-
(2005)
Proc. Supercomputing
, pp. 101-110
-
-
Azimi, R.1
Stumm, M.2
Wisniewski, R.3
-
30
-
-
84866697886
-
Security breaches as pmu deviation: Detecting and identifying security attacks using performance counters
-
L. Yuan, W. Xing, H. Chen, and B. Zang, "Security breaches as pmu deviation: Detecting and identifying security attacks using performance counters," in 2011 ACM SIGOPS Asia-pacific Workshop on Systems, 2011.
-
(2011)
2011 ACM SIGOPS Asia-pacific Workshop on Systems
-
-
Yuan, L.1
Xing, W.2
Chen, H.3
Zang, B.4
-
31
-
-
77950509312
-
Monitoring for security intrusion using performance signatures
-
A. Avritzer, R. Tanikella, K. James, R. G. Cole, and E. Weyuker, "Monitoring for security intrusion using performance signatures," in Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering, 2010, pp. 93-104.
-
Proceedings of the First Joint WOSP/SIPEW International Conference on Performance Engineering
, vol.2010
, pp. 93-104
-
-
Avritzer, A.1
Tanikella, R.2
James, K.3
Cole, R.G.4
Weyuker, E.5
-
32
-
-
79956032720
-
Ropdefender: A detection tool to defend against return-oriented programming attacks
-
ACM
-
L. Davi, A. Sadeghi, and M. Winandy, "Ropdefender: A detection tool to defend against return-oriented programming attacks," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 40-51.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 40-51
-
-
Davi, L.1
Sadeghi, A.2
Winandy, M.3
-
33
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser, "N-variant systems: A secretless framework for security through diversity," in Proc. USENIX Security, 2006, pp. 105-120.
-
(2006)
Proc. USENIX Security
, pp. 105-120
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
34
-
-
53349142151
-
Security through redundant data diversity
-
A. Nguyen-Tuong, D. Evans, J. Knight, B. Cox, and J. Davidson, "Security through redundant data diversity," in Proc. DSN, 2008, pp. 187-196.
-
(2008)
Proc. DSN
, pp. 187-196
-
-
Nguyen-Tuong, A.1
Evans, D.2
Knight, J.3
Cox, B.4
Davidson, J.5
-
35
-
-
77952266375
-
Orthrus: Efficient software integrity protection on multi-cores
-
R. Huang, D. Deng, and G. Suh, "Orthrus: efficient software integrity protection on multi-cores," in Proc. ASPLOS, 2010, pp. 371-384.
-
(2010)
Proc. ASPLOS
, pp. 371-384
-
-
Huang, R.1
Deng, D.2
Suh, G.3
-
36
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
G. Kc, A. Keromytis, and V. Prevelakis, "Countering code-injection attacks with instruction-set randomization," in Proc. CCS, 2003.
-
(2003)
Proc. CCS
-
-
Kc, G.1
Keromytis, A.2
Prevelakis, V.3
-
37
-
-
16644362894
-
Randomized instruction set emulation
-
E. Barrantes, D. Ackley, S. Forrest, and D. Stefanović, "Randomized instruction set emulation," ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 1, pp. 3-40, 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.1
Ackley, D.2
Forrest, S.3
Stefanović, D.4
-
38
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh, "On the effectiveness of address-space randomization," in Proc. CCS, 2004, pp. 298-307.
-
(2004)
Proc. CCS
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
39
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
M. Castro, M. Costa, and T. Harris, "Securing software by enforcing data-flow integrity," in Proc. OSDI, 2006.
-
(2006)
Proc. OSDI
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
40
-
-
78651539599
-
XFI: Software guards for system address spaces
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula, "XFI: Software guards for system address spaces," in Proc. OSDI, 2006, p. 88.
-
(2006)
Proc. OSDI
, pp. 88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
41
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
J. Crandall and F. Chong, "Minos: Control Data Attack Prevention Orthogonal to Memory Model," in Proc. MICRO, 2004.
-
(2004)
Proc. MICRO
-
-
Crandall, J.1
Chong, F.2
-
42
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks," in Proc. USENIX Security, 2006, pp. 121-136.
-
(2006)
Proc. USENIX Security
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
43
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in Proc. NDSS, 2005.
-
(2005)
Proc. NDSS
-
-
Newsome, J.1
Song, D.2
-
44
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu, "LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks," in Proc. MICRO, 2006, pp. 135-148.
-
Proc. MICRO
, vol.2006
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
45
-
-
79955570859
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," in Proc. OSDI, 2010.
-
(2010)
Proc. OSDI
-
-
Enck, W.1
Gilbert, P.2
Chun, B.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
46
-
-
52649112833
-
From speculation to security: Practical and efficient information flow tracking using speculative hardware
-
H. Chen, X. Wu, L. Yuan, B. Zang, P. Yew, and F. Chong, "From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware," in Proc. ISCA, 2008, pp. 401-412.
-
(2008)
Proc. ISCA
, pp. 401-412
-
-
Chen, H.1
Wu, X.2
Yuan, L.3
Zang, B.4
Yew, P.5
Chong, F.6
-
47
-
-
76749151451
-
Control flow obfuscation with information flow tracking
-
H. Chen, L. Yuan, X. Wu, B. Zang, B. Huang, and P. Yew, "Control flow obfuscation with information flow tracking," in Proc. MICRO, 2009, pp. 391-400.
-
(2009)
Proc. MICRO
, pp. 391-400
-
-
Chen, H.1
Yuan, L.2
Wu, X.3
Zang, B.4
Huang, B.5
Yew, P.6
|