-
1
-
-
72449145808
-
Controlflow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Controlflow integrity principles, implementations, and applications. ACM Trans. Information and System Security, 13(1), 2009.
-
(2009)
ACM Trans. Information and System Security
, vol.13
, Issue.1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
38149032860
-
Run-time randomization to mitigate tampering
-
B. Anckaert, M. Jakubowski, R. Venkatesan, and K. D. Bosschere. Run-time randomization to mitigate tampering. In Proc. 2nd Int. Conf. on Advances in Information and Computer Security, pages 153-168, 2007.
-
(2007)
Proc. 2nd Int. Conf. on Advances in Information and Computer Security
, pp. 153-168
-
-
Anckaert, B.1
Jakubowski, M.2
Venkatesan, R.3
Bosschere, K.D.4
-
4
-
-
84864849849
-
Part 3: Memory protection technologies
-
V. Abella, editor. Microsoft TechNet
-
S. Andersen. Part 3: Memory protection technologies. In V. Abella, editor, Changes in Functionality in Windows XP Service Pack 2. Microsoft TechNet, 2004. http://technet.microsoft.com/en-us/library/bb457155.aspx.
-
(2004)
Changes in Functionality in Windows XP Service Pack 2
-
-
Andersen, S.1
-
5
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proc. 10th ACM Conf. on Computer and Communications Security, pages 281-289, 2003.
-
(2003)
Proc. 10th ACM Conf. on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
9
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. 12th USENIX Security Symposium, pages 105-120, 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
10
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In Proc. 14th USENIX Security Symposium, pages 255-270, 2005.
-
(2005)
Proc. 14th USENIX Security Symposium
, pp. 255-270
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
11
-
-
36348949033
-
Diversified process replicæ for defeating memory error exploits
-
D. Bruschi, L. Cavallaro, and A. Lanzi. Diversified process replicæ for defeating memory error exploits. In Proc. IEEE Int. Performance, Computing, and Communications Conf., pages 434-441, 2007.
-
(2007)
Proc. IEEE Int. Performance, Computing, and Communications Conf.
, pp. 434-441
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
-
12
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proc. 15th ACM Conf. on Computer and Communications Security, pages 27-38, 2008.
-
(2008)
Proc. 15th ACM Conf. on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
13
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In Proc. 13th ACM Conf. on Computer and Communications Security, pages 322-335, 2006.
-
(2006)
Proc. 13th ACM Conf. on Computer and Communications Security
, pp. 322-335
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
14
-
-
70350684106
-
Data randomization
-
C. Cadar, P. Akritidis, M. Costa, J.-P. Martin, and M. Castro. Data randomization. Technical Report MSR-TR-2008-120, Microsoft Research, 2008.
-
(2008)
Technical Report MSR-TR-2008-120, Microsoft Research
-
-
Cadar, C.1
Akritidis, P.2
Costa, M.3
Martin, J.-P.4
Castro, M.5
-
15
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In Proc. 17th ACM Conf. on Computer and Communications Security, pages 559-572, 2010.
-
(2010)
Proc. 17th ACM Conf. on Computer and Communications Security
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
17
-
-
71549162538
-
DROP: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie. DROP: Detecting return-oriented programming malicious code. In Proc. 5th Int. Conf. on Information Systems Security, pages 163-177, 2009.
-
(2009)
Proc. 5th Int. Conf. on Information Systems Security
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
18
-
-
34547335786
-
TaintTrace: Efficient flow tracing with dynamic binary rewriting
-
W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. TaintTrace: Efficient flow tracing with dynamic binary rewriting. In Proc. 11th IEEE Symposium on Computers and Communications, pages 749-754, 2006.
-
(2006)
Proc. 11th IEEE Symposium on Computers and Communications
, pp. 749-754
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
20
-
-
84870645610
-
-
Corelan Team. Mona, 2012. http://redmine.corelan.be/projects/mona.
-
(2012)
-
-
-
21
-
-
85009448253
-
PointGuardTM: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuardTM: Protecting pointers from buffer overflow vulnerabilities. In Proc. 12th USENIX Security Symposium, pages 91-104, 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
22
-
-
84886393009
-
N-Variant Systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-Variant Systems: A secretless framework for security through diversity. In Proc. 15th USENIX Security Symposium, 2006.
-
(2006)
Proc. 15th USENIX Security Symposium
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
23
-
-
79956032720
-
ROPdefender: A detection tool to defend against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy. ROPdefender: A detection tool to defend against return-oriented programming attacks. In Proc. 6th ACM Symposium on Information, Computer and Communications Security, pages 40-51, 2011.
-
(2011)
Proc. 6th ACM Symposium on Information, Computer and Communications Security
, pp. 40-51
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
29
-
-
84869381037
-
ILR: Where'd my gadgets go?
-
J. D. Hiser, A. Nguyen-Tuong, M. Co, M. Hall, and J. W. Davidson. ILR: Where'd my gadgets go? In Proc. IEEE Symposium on Security and Privacy, pages 571-585, 2012.
-
(2012)
Proc. IEEE Symposium on Security and Privacy
, pp. 571-585
-
-
Hiser, J.D.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
33
-
-
47349102419
-
RandSys: Thwarting code injection attacks with system service interface randomization
-
X. Jiang, H. J. Wang, D. Xu, and Y.-M. Wang. RandSys: Thwarting code injection attacks with system service interface randomization. In Proc. 26th IEEE Int. Symposium on Reliable Distributed Systems, pages 209-218, 2007.
-
(2007)
Proc. 26th IEEE Int. Symposium on Reliable Distributed Systems
, pp. 209-218
-
-
Jiang, X.1
Wang, H.J.2
Xu, D.3
Wang, Y.-M.4
-
38
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating return-oriented rootkits with "Return-less" kernels. In Proc. 5th European Conf. on Computer Systems, pages 195-208, 2010.
-
(2010)
Proc. 5th European Conf. on Computer Systems
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
41
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-Free: Defeating return-oriented programming through gadget-less binaries. In Proc. 26th Annual Computer Security Applications Conf., pages 49-58, 2010.
-
(2010)
Proc. 26th Annual Computer Security Applications Conf.
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
42
-
-
84870647799
-
Position-independent code
-
Oracle Corporation. Position-independent code. In Linker and Libraries Guide. 2010. http://docs.oracle.com/cd/E19082-01/819-0690/chapter4-29405/index. html.
-
(2010)
Linker and Libraries Guide
-
-
-
43
-
-
79960860887
-
Retrofitting security in COTS software with binary rewriting
-
P. O'Sullivan, K. Anand, A. Kotha, M. Smithson, R. Barua, and A. D. Keromytis. Retrofitting security in COTS software with binary rewriting. In Proc. Int. Information Security Conf., pages 154-172, 2011.
-
(2011)
Proc. Int. Information Security Conf.
, pp. 154-172
-
-
O'sullivan, P.1
Anand, K.2
Kotha, A.3
Smithson, M.4
Barua, R.5
Keromytis, A.D.6
-
46
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
G. F. Roglia, L. Martignoni, R. Paleari, and D. Bruschi. Surgically returning to randomized lib(c). In Proc. 25th Annual Computer Security Applications Conf., pages 60-69, 2009.
-
(2009)
Proc. 25th Annual Computer Security Applications Conf.
, pp. 60-69
-
-
Roglia, G.F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
47
-
-
70349127596
-
Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space
-
B. Salamat, T. Jackson, A. Gal, and M. Franz. Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space. In Proc. 4th ACM European Conf. on Computer Systems, pages 33-46, 2009.
-
(2009)
Proc. 4th ACM European Conf. on Computer Systems
, pp. 33-46
-
-
Salamat, B.1
Jackson, T.2
Gal, A.3
Franz, M.4
-
48
-
-
84870633182
-
-
J. Salwan. ROPgadget, 2012. http://shell-storm.org/project/ROPgadget.
-
(2012)
-
-
Salwan, J.1
-
51
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. 14th ACM Conf. on Computer and Communications Security, pages 552-561, 2007.
-
(2007)
Proc. 14th ACM Conf. on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
52
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proc. 11th ACM Conf. on Computer and Communications Security, pages 298-307, 2004.
-
(2004)
Proc. 11th ACM Conf. on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
54
-
-
84864169671
-
Binary rewriting without relocation information
-
November
-
M. Smithson, K. Anand, A. Kotha, K. Elwazeer, N. Giles, and R. Barua. Binary rewriting without relocation information. Technical report, U. Maryland, November 2010.
-
(2010)
Technical Report, U. Maryland
-
-
Smithson, M.1
Anand, K.2
Kotha, A.3
Elwazeer, K.4
Giles, N.5
Barua, R.6
-
55
-
-
77952399470
-
"Return-to-libc" attack
-
Solar Designer, August
-
Solar Designer. "return-to-libc" attack. Bugtraq, August 1997.
-
(1997)
Bugtraq
-
-
-
56
-
-
31844441420
-
Link-time binary rewriting techniques for program compaction
-
B. D. Sutter, B. D. Bus, and K. D. Bosschere. Link-time binary rewriting techniques for program compaction. ACM Trans. Programming Languages and Systems, 27(5):882-945, 2005.
-
(2005)
ACM Trans. Programming Languages and Systems
, vol.27
, Issue.5
, pp. 882-945
-
-
Sutter, B.D.1
Bus, B.D.2
Bosschere, K.D.3
-
58
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proc. 14th ACM Symposium on Operating Systems Principles, pages 203-216, 1993.
-
(1993)
Proc. 14th ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
59
-
-
80052400545
-
Differentiating code from data in x86 binaries
-
R. Wartell, Y. Zhou, K. W. Hamlen, M. Kantarcioglu, and B. Thuraisingham. Differentiating code from data in x86 binaries. In Proc. European Conf. on Machine Learning and Principles and Practice of Knowledge Discovery in Databases, volume 3, pages 522-536, 2011.
-
(2011)
Proc. European Conf. on Machine Learning and Principles and Practice of Knowledge Discovery in Databases
, vol.3
, pp. 522-536
-
-
Wartell, R.1
Zhou, Y.2
Hamlen, K.W.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
61
-
-
69149106605
-
Native Client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A sandbox for portable, untrusted x86 native code. In Proc. 30th IEEE Symposium on Security and Privacy, pages 79-93, 2009.
-
(2009)
Proc. 30th IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|