-
2
-
-
84871756793
-
-
Android Developers, "Android 4.0 Platform Highlights," http://developer.android.com/sdk/android-4.0-highlights.html
-
Android 4.0 Platform Highlights
-
-
-
7
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation," Programming Language Design and Implementation (PLDI '05), 2005.
-
(2005)
Programming Language Design and Implementation (PLDI '05)
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
10
-
-
60049100434
-
Security through diversity: Leveraging virtual machine technology
-
D. Williams et al. "Security through Diversity: Leveraging Virtual Machine Technology," IEEE Security and Privacy 7, 2009.
-
(2009)
IEEE Security and Privacy
, vol.7
-
-
Williams, D.1
-
12
-
-
0035789216
-
Protection of software-based survivability schemes
-
C. Wang, "Protection of software-based survivability schemes", Dependable Systems and Networks, 2001.
-
(2001)
Dependable Systems and Networks
-
-
Wang, C.1
-
14
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh, "On the effectiveness of address-space randomization," in Proc. of the 11th ACM conference on Computer and communications security (CCS '04), 2004.
-
(2004)
Proc. of the 11th ACM Conference on Computer and Communications Security (CCS '04)
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
15
-
-
79960029974
-
Code pointer masking: Hardening applications against code injection attacks
-
P. Philippaerts, Y. Younan, S. Muylle, F. Piessens, S. Lachmund, and T. Walter, "Code Pointer Masking: Hardening Applications against Code Injection Attacks," in Proc. of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA '11), 2011.
-
(2011)
Proc. of the 8th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA '11)
-
-
Philippaerts, P.1
Younan, Y.2
Muylle, S.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
17
-
-
85084160243
-
StackGuard: Automatic detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "StackGuard: Automatic detection and prevention of buffer-overflow attacks," in Proc. of the 7th USENIX Security Symposium(Security '98), 1998.
-
(1998)
Proc. of the 7th USENIX Security Symposium(Security '98)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
18
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, "Pointguard: protecting pointers from buffer overflow vulnerabilities," in Proc. of the 12th USENIX Security Symposium(Security '03), 2003.
-
(2003)
Proc. of the 12th USENIX Security Symposium(Security '03)
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
19
-
-
84872107134
-
-
"Bzip2 for Windows," http: //gnuwin32.sourceforge.net/packages/ bzip2.htm
-
Bzip2 for Windows
-
-
-
20
-
-
84872117693
-
-
MSDN, "Dynamic-Link Librariesk," http://msdn.microsoft.com/en- us/library/windows/desktop/ms682589%28v=vs.85%29.aspx
-
Dynamic-Link Librariesk
-
-
-
22
-
-
77952573527
-
Dynamic program analysis of Microsoft Windows applications
-
A. Skaletsky, T. Devor, N. Chachmon, R. Cohn, K. Hazelwood, V. Vladimirov, and M. Bach, "Dynamic program analysis of Microsoft Windows applications," in Proc. of IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS '10), 2010.
-
(2010)
Proc. of IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS '10)
-
-
Skaletsky, A.1
Devor, T.2
Chachmon, N.3
Cohn, R.4
Hazelwood, K.5
Vladimirov, V.6
Bach, M.7
-
24
-
-
85175132148
-
ROPdefender: A practical protection tool to protect against return-oriented programming
-
L. Davi, A.-R. Sadeghi, and M. Winandy, "ROPdefender: A practical protection tool to protect against return-oriented programming," in Proc. of the 6th Symposium on Information, Computer and Communications Security (ASIACCS '11), 2011.
-
(2011)
Proc. of the 6th Symposium on Information, Computer and Communications Security (ASIACCS '11)
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
27
-
-
84872112288
-
-
Microsoft TechNet Blogs, "Introducing EMET v3," http://blogs.technet.com/b/srd/archive/2012/05/15/introducing-emet-v3.aspx
-
Introducing EMET v3
-
-
-
29
-
-
78650032454
-
Return-oriented programming without returns
-
Oct
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns," in Proc. of the 17th ACM conference on Computer and communications security (CCS '10), Oct 2010.
-
(2010)
Proc. of the 17th ACM Conference on Computer and Communications Security (CCS '10)
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
30
-
-
84872116706
-
-
PaX Team
-
PaX Team, "vma mirroring," http://pax.grsecurity.net/docs/ vmmirror.txt
-
Vma Mirroring
-
-
-
31
-
-
79956023817
-
DROP: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie, "DROP: Detecting return-oriented programming malicious code," in Proc. of the 5th International Conference on Information Systems Security (ICISS '09), 2009.
-
(2009)
Proc. of the 5th International Conference on Information Systems Security (ICISS '09)
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
34
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
R. Wartell, V. Mohan, K. W. Hamlen, Z. Lin, "Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code," in Proc. of the 19th ACM conference on Computer and communications security (CCS '12), 2012.
-
(2012)
Proc. of the 19th ACM Conference on Computer and Communications Security (CCS '12)
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
|