-
1
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
Jul/Aug
-
J. Pincus and B. Baker, "Beyond stack smashing: Recent advances in exploiting buffer overruns," IEEE Security & Privacy, vol. 2, no. 4, pp. 20-27, Jul/Aug 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
3
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
ACM
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage, "When good instructions go bad: Generalizing return-oriented programming to RISC," in Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM, 2008, pp. 27-38.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
5
-
-
85175130163
-
-
The PAX Team, http://pax.grsecurity.net.
-
-
-
-
7
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh, "On the effectiveness of address-space randomization," in Proceedings of the 11th ACM Conference on Computer and Communications Security. ACM, 2004, pp. 298-307.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
8
-
-
77950856300
-
Surgically returning to randomized lib (c)
-
IEEE
-
G. Roglia, L. Martignoni, R. Paleari, and D. Bruschi, "Surgically returning to randomized lib (c)," in 2009 Annual Computer Security Applications Conference. IEEE, 2009, pp. 60-69.
-
(2009)
2009 Annual Computer Security Applications Conference
, pp. 60-69
-
-
Roglia, G.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
9
-
-
78650032454
-
Return-oriented programming without returns
-
ACM
-
S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns," in Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM, 2010, pp. 559-572.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.4
Shacham, H.5
Winandy, M.6
-
10
-
-
14844288825
-
Bypassing PaX ASLR protection
-
vol. 0x0b, no. 0x3b, [Online]. Available
-
T. Durden, "Bypassing PaX ASLR protection," Phrack Magazine, vol. 0x0b, no. 0x3b, 2002. [Online]. Available: http://www.phrack.org/issues. html?issue=59&id=9
-
(2002)
Phrack Magazine
-
-
Durden, T.1
-
11
-
-
84943385283
-
Retargetable and reconfigurable software dynamic translation
-
San Francisco, CA: IEEE Computer Society, Mar
-
K. Scott, N. Kumar, S. Velusamy, B. R. Childers, J. W. Davidson, and M. L. Soffa, "Retargetable and reconfigurable software dynamic translation," in International Symposium on Code Generation and Optimization. San Francisco, CA: IEEE Computer Society, Mar. 2003, pp. 36-47.
-
(2003)
International Symposium on Code Generation and Optimization
, pp. 36-47
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.R.4
Davidson, J.W.5
Soffa, M.L.6
-
12
-
-
17144416882
-
Dynamo: A transparent dynamic optimization system
-
V. Bala, E. Duesterwald, and S. Banerjia, "Dynamo: A transparent dynamic optimization system," in SIGPLAN '00 Conference on Programming Language Design and Implementation, 2000, pp. 1-12.
-
SIGPLAN '00 Conference on Programming Language Design and Implementation, 2000
, pp. 1-12
-
-
Bala, V.1
Duesterwald, E.2
Banerjia, S.3
-
14
-
-
71549162538
-
DROP: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie, "DROP: Detecting return-oriented programming malicious code," Information Systems Security, pp. 163-177, 2009.
-
(2009)
Information Systems Security
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
15
-
-
79956032720
-
ROPdefender: A detection tool to defend against return-oriented programming attacks
-
ACM
-
L. Davi, A. Sadeghi, and M. Winandy, "ROPdefender: A detection tool to defend against return-oriented programming attacks," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 40-51.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 40-51
-
-
Davi, L.1
Sadeghi, A.2
Winandy, M.3
-
16
-
-
63549125605
-
-
Standard Performance Evaluation Corporation, "SPEC CPU2006 Benchmarks," http://www.spec.org/osg/cpu2006.
-
SPEC CPU2006 Benchmarks
-
-
-
17
-
-
85175131443
-
-
November Available
-
(2011, November) Hex-rays website. [Online]. Available: http://www.hex-rays.com/products/ida/index.shtml
-
(2011)
Hex-rays Website. [Online]
-
-
-
18
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
New York, NY, USA: ACM Press
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, "Pin: Building customized program analysis tools with dynamic instrumentation," in PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation. New York, NY, USA: ACM Press, 2005, pp. 190-200.
-
(2005)
PLDI '05: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
20
-
-
84878363059
-
-
website
-
"Shell storm website," http://www.shell-sorm.org/project/ ROPgadget/.
-
Shell Storm
-
-
-
23
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
C. Kruegel, W. Robertson, F. Valeur, and G. Vigna, "Static disassembly of obfuscated binaries," in Proceedings of the 13th USENIX Security Symposium, 2004, pp. 255-270.
-
Proceedings of the 13th USENIX Security Symposium, 2004
, pp. 255-270
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
24
-
-
79958700553
-
Disassembly of executable code revisited
-
IEEE
-
B. Schwarz, S. Debray, and G. Andrews, "Disassembly of executable code revisited," in Proceedings of the 9th Working Conference on Reverse Engineering. IEEE, 2002, pp. 45-54.
-
(2002)
Proceedings of the 9th Working Conference on Reverse Engineering
, pp. 45-54
-
-
Schwarz, B.1
Debray, S.2
Andrews, G.3
-
26
-
-
34547700525
-
Evaluating indirect branch handling mechanisms in software dynamic translation systems
-
IEEE Computer Society
-
J. Hiser, D. Williams, W. Hu, J. Davidson, J. Mars, and B. Childers, "Evaluating indirect branch handling mechanisms in software dynamic translation systems," in Proceedings of the International Symposium on Code Generation and Optimization. IEEE Computer Society, 2007, pp. 61-73.
-
(2007)
Proceedings of the International Symposium on Code Generation and Optimization
, pp. 61-73
-
-
Hiser, J.1
Williams, D.2
Hu, W.3
Davidson, J.4
Mars, J.5
Childers, B.6
-
27
-
-
38149061942
-
Reducing exit stub memory consumption in code caches
-
A. Guha, K. Hazelwood, and M. Soffa, "Reducing exit stub memory consumption in code caches," High Performance Embedded Architectures and Compilers, pp. 87-101, 2007.
-
(2007)
High Performance Embedded Architectures and Compilers
, pp. 87-101
-
-
Guha, A.1
Hazelwood, K.2
Soffa, M.3
-
28
-
-
33745944184
-
Secure and practical defense against code-injection attacks using software dynamic translation
-
ACM
-
W. Hu, J. Hiser, D. Williams, A. Filipi, J. Davidson, D. Evans, J. Knight, A. Nguyen-Tuong, and J. Rowanhill, "Secure and practical defense against code-injection attacks using software dynamic translation," in Proceedings of the 2nd International Conference on Virtual Execution Environments. ACM, 2006, pp. 2-12.
-
(2006)
Proceedings of the 2nd International Conference on Virtual Execution Environments
, pp. 2-12
-
-
Hu, W.1
Hiser, J.2
Williams, D.3
Filipi, A.4
Davidson, J.5
Evans, D.6
Knight, J.7
Nguyen-Tuong, A.8
Rowanhill, J.9
-
29
-
-
78149393449
-
On the effectiveness of the metamorphic shield
-
ACM
-
A. Nguyen-Tuong, A.Wang, J. Hiser, J. Knight, and J. Davidson, "On the effectiveness of the metamorphic shield," in Proceedings of the Fourth European Conference on Software Architecture: Companion Volume. ACM, 2010, pp. 170-174.
-
(2010)
Proceedings of the Fourth European Conference on Software Architecture: Companion Volume
, pp. 170-174
-
-
Nguyen-Tuong, A.1
Wang, A.2
Hiser, J.3
Knight, J.4
Davidson, J.5
-
30
-
-
16644362894
-
Randomized instruction set emulation
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovic, "Randomized instruction set emulation," ACM Transactions on Information System Security., vol. 8, no. 1, pp. 3-40, 2005.
-
(2005)
ACM Transactions on Information System Security
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
31
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
New York, NY, USA: ACM Press
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis, "Countering code-injection attacks with instruction-set randomization," in CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM Press, 2003, pp. 272-280.
-
(2003)
CCS '03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
33
-
-
3042642332
-
The advanced return-into-lib(c) exploits (PaX case study)
-
Nergal December
-
Nergal, "The advanced return-into-lib(c) exploits (PaX case study)." Phrack Magazine, 58(4), December 2001.
-
(2001)
Phrack Magazine
, vol.58
, Issue.4
-
-
-
34
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
Proceedings of the 5th European Conference on Computer Systems, ser. New York, NY, USA: ACM
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, "Defeating return-oriented rootkits with "return-less" kernels," in Proceedings of the 5th European Conference on Computer Systems, ser. EuroSys '10. New York, NY, USA: ACM, 2010, pp. 195-208.
-
(2010)
EuroSys '10
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
35
-
-
78751484536
-
G-Free: defeating return-oriented programming through gadget-less binaries
-
ACM
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, "G-Free: defeating return-oriented programming through gadget-less binaries," in Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 2010, pp. 49-58.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
36
-
-
39049113465
-
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning, "Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software," in Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual. Ieee, 2006, pp. 339-348.
-
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual. Ieee, 2006
, pp. 339-348
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
43
-
-
84877282861
-
-
T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Warner, A. Gal, S. Brunthaler, C. Wimmer, and M. Franz, "Compiler-generated software diversity," 2011.
-
(2011)
Compiler-generated Software Diversity
-
-
Jackson, T.1
Salamat, B.2
Homescu, A.3
Manivannan, K.4
Warner, G.5
Gal, A.6
Brunthaler, S.7
Wimmer, C.8
Franz, M.9
-
44
-
-
33646767376
-
Control-flow integrity
-
ACM
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, "Control-flow integrity," in Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM, 2005, pp. 340-353.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
|