-
3
-
-
85049220056
-
Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
-
Akritidis, P., Costa, M., Castro, M., Hand, S.: Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. In: Proceedings of the 18th Conference on USENIX Security Symposium (2009)
-
Proceedings of the 18th Conference on USENIX Security Symposium (2009)
-
-
Akritidis, P.1
Costa, M.2
Castro, M.3
Hand, S.4
-
4
-
-
0006100649
-
Smashing the Stack for Fun and Profit
-
November
-
Aleph: Smashing The Stack For Fun And Profit. Phrack Magazine (November 1996)
-
(1996)
Phrack Magazine
-
-
Aleph1
-
7
-
-
84860095094
-
Once Upon a Free
-
Anonymous: August
-
Anonymous: Once Upon a Free. Phrack Magazine (August 2001)
-
(2001)
Phrack Magazine
-
-
-
8
-
-
16644362894
-
Randomized instruction set emulation
-
Barrantes, E.G., Ackley, D.H., Forrest, S., Stefanovi, D.: Randomized instruction set emulation. ACM TISSEC (2005)
-
(2005)
ACM TISSEC
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovi, D.4
-
9
-
-
0021122553
-
Software errors and complexity: An empirical investigation
-
Basili, V.R., Perricone, B.T.: Software errors and complexity: an empirical investigation. CACM (1984)
-
(1984)
CACM
-
-
Basili, V.R.1
Perricone, B.T.2
-
10
-
-
84910624008
-
Mobile security catching up?
-
Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S.,Wolf, C.: Mobile security catching up? In: IEEE S&P (2011)
-
(2011)
IEEE S&P
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
12
-
-
84880094333
-
Malloc Des-Maleficarum
-
blackngel: June
-
blackngel: Malloc Des-Maleficarum. Phrack Magazine (June 2009)
-
(2009)
Phrack Magazine
-
-
-
13
-
-
84867858113
-
The House of Lore: Reloaded
-
blackngel: November
-
blackngel: The House Of Lore: Reloaded. Phrack Magazine (November 2010)
-
(2010)
Phrack Magazine
-
-
-
16
-
-
84857284621
-
Minemu: The World's Fastest Taint Tracker
-
Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. Springer, Heidelberg
-
Bosman, E., Slowinska, A., Bos, H.: Minemu: The World's Fastest Taint Tracker. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 1-20. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6961
, pp. 1-20
-
-
Bosman, E.1
Slowinska, A.2
Bos, H.3
-
18
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
Brumley, D., Poosankam, P., Song, D., Zheng, J.: Automatic patch-based exploit generation is possible: Techniques and implications. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008)
-
Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008)
-
-
Brumley, D.1
Poosankam, P.2
Song, D.3
Zheng, J.4
-
19
-
-
84867876700
-
Diversified Process Replicae for Defeating Memory Error Exploits
-
Bruschi, D., Cavallaro, L., Lanzi, A.: Diversified Process Replicae for Defeating Memory Error Exploits. In: Intern. Workshop on Assurance, WIA (2007)
-
Intern. Workshop on Assurance, WIA (2007)
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
-
21
-
-
17644393012
-
Bypassing StackGuard and StackShield
-
January
-
Bulba, Kil3r: Bypassing StackGuard and StackShield. Phrack Magazine (January 2000)
-
(2000)
Phrack Magazine
-
-
Bulba1
Kilr2
-
23
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.K.: Non-control-data attacks are realistic threats. In: USENIX Sec. Symposium (2005)
-
USENIX Sec. Symposium (2005)
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
25
-
-
0035017559
-
Rad: A compile-time solution to buffer overflow attacks
-
Cker Chiueh, T., Hau Hsu, F.: Rad: A compile-time solution to buffer overflow attacks. In: ICDCS (2001)
-
(2001)
ICDCS
-
-
Cker Chiueh, T.1
Hau Hsu, F.2
-
26
-
-
84867873789
-
Windows Heap Exploitation (Win2KSP0 through WinXPSP2)
-
December
-
Conover, M., Horovitz, O.: Windows Heap Exploitation (Win2KSP0 through WinXPSP2). In: SyScan (December 2004)
-
(2004)
SyScan
-
-
Conover, M.1
Horovitz, O.2
-
28
-
-
85084161775
-
FormatGuard: Automatic Protection from printf Format String Vulnerabilities
-
Cowan, C., Barringer, M., Beattie, S., Kroah-Hartman, G.: FormatGuard: Automatic Protection From printf Format String Vulnerabilities. In: USENIX Security Symposium (August 2001)
-
USENIX Security Symposium (August 2001)
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
29
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Cowan, C., Pu, C., Maier, D., Hintongif, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proceedings of the 7th USENIX Security Symposium (January 1998)
-
Proceedings of the 7th USENIX Security Symposium (January 1998)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintongif, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
30
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: a secretless framework for security through diversity. In: USENIX Security Symposium (2006)
-
USENIX Security Symposium (2006)
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
31
-
-
85037073388
-
Privilege Escalation Attacks on Android
-
Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. Springer, Heidelberg
-
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege Escalation Attacks on Android. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 346-360. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6531
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
38
-
-
14844288825
-
Bypassing PaX ASLR Protection
-
July
-
Durden, T.: Bypassing PaX ASLR Protection. Phrack Magazine (July 2002)
-
(2002)
Phrack Magazine
-
-
Durden, T.1
-
39
-
-
70350626575
-
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
-
Flegel, U., Bruschi, D. (eds.) DIMVA 2009. Springer, Heidelberg
-
Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 88-106. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5587
, pp. 88-106
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
47
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
December
-
Fresi-Roglia, G., Martignoni, L., Paleari, R., Bruschi, D.: Surgically returning to randomized lib(c). In: ACSAC (December 2009)
-
(2009)
ACSAC
-
-
Fresi-Roglia, G.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
52
-
-
84869381037
-
ILR: Where'd My Gadgets Go?
-
Hiser, J., Nguyen-Tuong, A., Co, M., Hall, M., Davidson, J.W.: ILR: Where'd My Gadgets Go? In: Proceedings of the 2012 IEEE Symposium on Security and Privacy (2012)
-
Proceedings of the 2012 IEEE Symposium on Security and Privacy (2012)
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
53
-
-
85084164164
-
Cyclone: A safe dialect of c
-
Jim, T., Morrisett, G., Grossman, D., Hicks, M., Cheney, J., Wang, Y.: Cyclone: A safe dialect of c. In: USENIX ATC (2002)
-
(2002)
USENIX ATC
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
54
-
-
12544250338
-
Backwards-compatible bounds checking for arrays and pointers in c programs
-
Jones, R.W.M., Kelly, P.H.J., Most, C., Errors, U.: Backwards-compatible bounds checking for arrays and pointers in c programs. In: Third International Workshop on Automated Debugging (1997)
-
Third International Workshop on Automated Debugging (1997)
-
-
Jones, R.W.M.1
Kelly, P.H.J.2
Most, C.3
Errors, U.4
-
55
-
-
84867866805
-
Jp: Advanced Doug lea's malloc exploits
-
August
-
jp: Advanced Doug lea's malloc exploits. Phrack Magazine (August 2003)
-
(2003)
Phrack Magazine
-
-
-
65
-
-
84867879243
-
MaXX: VUDO Malloc Tricks
-
August
-
MaXX: VUDO Malloc Tricks. Phrack Magazine (August 2001)
-
(2001)
Phrack Magazine
-
-
-
72
-
-
33646032658
-
Ccured: Type-safe retrofitting of legacy software
-
Necula, G.C., Condit, J., Harren,M., Mcpeak, S., Weimer,W.: Ccured: Type-safe retrofitting of legacy software. ACM Trans. on Progr. Lang. and Syst (2005)
-
(2005)
ACM Trans. on Progr. Lang. and Syst
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
73
-
-
84867870768
-
Nergal: The Advanced Return-Into-Lib(c) exploits (PaX Case study)
-
December
-
Nergal: The Advanced Return-Into-Lib(c) exploits (PaX Case study). Phrack Magazine (December 2001)
-
(2001)
Phrack Magazine
-
-
-
75
-
-
79959555988
-
Effect of static analysis tools on software security: Preliminary investigation
-
Okun, V., Guthrie, W.F., Gaucher, R., Black, P.E.: Effect of static analysis tools on software security: preliminary investigation. In: Proceedings of the 2007 ACM Workshop on Quality of Protection (2007)
-
Proceedings of the 2007 ACM Workshop on Quality of Protection (2007)
-
-
Okun, V.1
Guthrie, W.F.2
Gaucher, R.3
Black, P.E.4
-
76
-
-
0036986569
-
The distribution of faults in a large industrial software system
-
Ostrand, T.J., Weyuker, E.J.: The distribution of faults in a large industrial software system. In: ISSTA (2002)
-
(2002)
ISSTA
-
-
Ostrand, T.J.1
Weyuker, E.J.2
-
83
-
-
84867877205
-
Return-Oriented Programming: Systems, Languages, and Applications
-
April
-
Roemer, R., Erik Buchanan, H.S., Savage, S.: Return-Oriented Programming: Systems, Languages, and Applications. ACM TISSEC (April 2010)
-
(2010)
ACM TISSEC
-
-
Roemer, R.1
Erik Buchanan, H.S.2
Savage, S.3
-
84
-
-
70349127596
-
Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space
-
Salamat, B., Jackson, T., Gal, A., Franz, M.: Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space. In: EuroSys (2009)
-
(2009)
EuroSys
-
-
Salamat, B.1
Jackson, T.2
Gal, A.3
Franz, M.4
-
90
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization
-
October
-
Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the Effectiveness of Address-Space Randomization. In: ACM CCS (October 2004)
-
(2004)
ACM CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.J.4
Modadugu, N.5
Boneh, D.6
-
94
-
-
84951736831
-
Howard: A dynamic excavator for reverse engineering data structures
-
Slowinska, A., Stancescu, T., Bos, H.: Howard: a dynamic excavator for reverse engineering data structures. In: Proceedings of NDSS 2011, San Diego, CA (2011)
-
Proceedings of NDSS 2011, San Diego, CA (2011)
-
-
Slowinska, A.1
Stancescu, T.2
Bos, H.3
-
102
-
-
84867873416
-
-
Technical Report IR-CS-73 November
-
van der Veen, V., dutt Sharma, N., Cavallaro, L., Bos, H.: Memory Errors: The Past, the Present, and the Future. Technical Report IR-CS-73 (November 2011)
-
(2011)
Memory Errors: The Past, the Present, and the Future
-
-
Van Der Veen, V.1
Dutt Sharma, N.2
Cavallaro, L.3
Bos, H.4
-
108
-
-
84867859463
-
Secure dynamic code generation against spraying
-
Wei, T., Wang, T., Duan, L., Luo, J.: Secure dynamic code generation against spraying. In: ACM CCS (2010)
-
(2010)
ACM CCS
-
-
Wei, T.1
Wang, T.2
Duan, L.3
Luo, J.4
-
111
-
-
77954495640
-
PAriCheck: An efficient pointer arithmetic checker for c programs
-
Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F., Joosen, W.: PAriCheck: an efficient pointer arithmetic checker for c programs. In: AsiaCCS (2010)
-
(2010)
AsiaCCS
-
-
Younan, Y.1
Philippaerts, P.2
Cavallaro, L.3
Sekar, R.4
Piessens, F.5
Joosen, W.6
|