-
3
-
-
84870640596
-
-
Jit-spray attacks & advanced shellcode (2010). http://dsecrg.com/ files/pub/pdf/HITB%20-%20JITSpray%20Attacks%20and%20Advanced%20Shellcode.pdf.
-
(2010)
Jit-spray Attacks & Advanced Shellcode
-
-
-
4
-
-
84870641125
-
-
Kvm. http://www.linux-kvm.org/page/Main-Page.
-
Kvm
-
-
-
5
-
-
84870643885
-
-
Qemu. http://wiki.qemu.org/Main Page.
-
-
-
-
6
-
-
84870635365
-
-
Tamarin project. http://wwwarchive.mozilla.org/projects/tamarin/.
-
Tamarin Project
-
-
-
8
-
-
84864919846
-
Jit spraying and mitigations
-
abs/1009.1038
-
P. Bania. Jit spraying and mitigations. CoRR, abs/1009.1038, 2010.
-
(2010)
CoRR
-
-
Bania, P.1
-
10
-
-
79960876719
-
Jitdefender: A defense against jit spraying attacks
-
J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, and C. Rieder, editors, Future Challenges in Security and Privacy for Academia and Industry
-
P. Chen, Y. Fang, B. Mao, and L. Xie. Jitdefender: A defense against jit spraying attacks. In J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, and C. Rieder, editors, Future Challenges in Security and Privacy for Academia and Industry, volume 354 of IFIP Advances in Information and Communication Technology, pages 142-153.
-
IFIP Advances in Information and Communication Technology
, vol.354
, pp. 142-153
-
-
Chen, P.1
Fang, Y.2
Mao, B.3
Xie, L.4
-
11
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
A. Prakash and I. Sen Gupta, editors, Information Systems Security
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie. Drop: Detecting return-oriented programming malicious code. In A. Prakash and I. Sen Gupta, editors, Information Systems Security, volume 5905 of Lecture Notes in Computer Science, pages 163-177.
-
Lecture Notes in Computer Science
, vol.5905
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
13
-
-
78751539789
-
Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks
-
New York, NY, USA, ACM
-
Y. Ding, T. Wei, T. Wang, Z. Liang, and W. Zou. Heap taichi: exploiting memory allocation granularity in heap-spraying attacks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 327-336, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 327-336
-
-
Ding, Y.1
Wei, T.2
Wang, T.3
Liang, Z.4
Zou, W.5
-
14
-
-
76549111997
-
Mitigating driveby download attacks: Challenges and open problems
-
J. Camenisch and D. Kesdogan, editors, iNetSec 2009 C Open Research Problems in Network Security
-
M. Egele, E. Kirda, and C. Kruegel. Mitigating driveby download attacks: Challenges and open problems. In J. Camenisch and D. Kesdogan, editors, iNetSec 2009 C Open Research Problems in Network Security, volume 309 of IFIP Advances in Information and Communication Technology, pages 52-62.
-
IFIP Advances in Information and Communication Technology
, vol.309
, pp. 52-62
-
-
Egele, M.1
Kirda, E.2
Kruegel, C.3
-
15
-
-
70350626575
-
Defending browsers against drive-by downloads: Mitigating heapspraying code injection attacks
-
U. Flegel and D. Bruschi, editors, Detection of Intrusions and Malware, and Vulnerability Assessment
-
M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda. Defending browsers against drive-by downloads: Mitigating heapspraying code injection attacks. In U. Flegel and D. Bruschi, editors, Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5587 of Lecture Notes in Computer Science, pages 88-106.
-
Lecture Notes in Computer Science
, vol.5587
, pp. 88-106
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
16
-
-
77949446893
-
Bubble: A javascript engine level countermeasure against heap-spraying attacks
-
F. Massacci, D. Wallach, and N. Zannone, editors, Engineering Secure Software and Systems
-
F. Gadaleta, Y. Younan, and W. Joosen. Bubble: A javascript engine level countermeasure against heap-spraying attacks. In F. Massacci, D. Wallach, and N. Zannone, editors, Engineering Secure Software and Systems, volume 5965 of Lecture Notes in Computer Science, pages 1-17.
-
Lecture Notes in Computer Science
, vol.5965
, pp. 1-17
-
-
Gadaleta, F.1
Younan, Y.2
Joosen, W.3
-
17
-
-
84870645163
-
-
Microsoft Corporation
-
Microsoft Corporation. On the effectiveness of DEP and ASLR. http://blogs.technet.com/b/srd/archive/2010/12/08/onthe-effectiveness-of-dep- and-aslr.aspx.
-
On the Effectiveness of DEP and ASLR
-
-
-
18
-
-
84870633476
-
-
The Pax team. http://pax.grsecurity.net/docs/aslr.txt.
-
-
-
-
19
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
New York, NY, USA, ACM
-
H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 552-561, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 552-561
-
-
Shacham, H.1
-
20
-
-
84869404004
-
-
Writing JITspray shellcode for fun and profit
-
Sintsov. In Technical Report of Digital, 2010. Writing JITspray shellcode for fun and profit.
-
(2010)
Technical Report of Digital
-
-
Sintsov1
-
22
-
-
78650010363
-
Secure dynamic code generation against spraying
-
New York, NY, USA, ACM
-
T. Wei, T. Wang, L. Duan, and J. Luo. Secure dynamic code generation against spraying. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 738-740, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 738-740
-
-
Wei, T.1
Wang, T.2
Duan, L.3
Luo, J.4
|