-
1
-
-
33646767376
-
Control-flow integrity
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow integrity. In CCS'05: Proc. 12th Conf. Computer and Communications Security (2005), pp. 340-353.
-
CCS'05: Proc. 12th Conf. Computer and Communications Security (2005)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
ALEPH1. Nov.
-
ALEPH1. Smashing the stack for fun and profit. Phrack 7, 49 (Nov. 1996), http://phrack.com/issues.html?issue=49&id=14.
-
(1996)
Phrack
, vol.7
, pp. 49
-
-
-
3
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
BARATLOO, A., SINGH, N., AND TSAI, T. Transparent run-time defense against stack smashing attacks. In Proc. USENIX ATC (2000), pp. 251-262.
-
Proc. USENIX ATC (2000)
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
4
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
BHATKAR, E., DUVARNEY, D. C., AND SEKAR, R. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In SSYM'03: Proc. 12th USENIX Security Symp. (2003), pp. 105-120.
-
SSYM'03: Proc. 12th USENIX Security Symp. (2003)
, pp. 105-120
-
-
Bhatkar, E.1
Duvarney, D.C.2
Sekar, R.3
-
5
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
BHATKAR, S., BHATKAR, E., SEKAR, R., AND DUVARNEY, D. C. Efficient techniques for comprehensive protection from memory error exploits. In SSYM'05: Proc. 14th USENIX Security Symp. (2005), pp. 255-270.
-
SSYM'05: Proc. 14th USENIX Security Symp. (2005)
, pp. 255-270
-
-
Bhatkar, S.1
Bhatkar, E.2
Sekar, R.3
Duvarney, D.C.4
-
6
-
-
84874170056
-
The house of lore: Reloaded
-
Nov.
-
BLACKNGEL. The house of lore: Reloaded. Phrack 14, 67 (Nov. 2010), http://phrack.com/issues.html?issue=67&id=8.
-
(2010)
Phrack
, vol.14
, pp. 67
-
-
Blackngel1
-
7
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
BLETSCH, T., JIANG, X., FREEH, V. W., AND LIANG, Z. Jump-oriented programming: a new class of code-reuse attack. In ASIACCS'11: Proc. 6th ACM Symp. on Information, Computer and Communications Security (2011), pp. 30-40.
-
ASIACCS'11: Proc. 6th ACM Symp. on Information, Computer and Communications Security (2011)
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
8
-
-
85084161775
-
Format-guard: Automatic protection from printf format string vulnerabilities
-
COWAN, C., BARRINGER, M., BEATTIE, S., KROAH-HARTMAN, G., FRANTZEN, M., AND LOKIER, J. Format-guard: automatic protection from printf format string vulnerabilities. In SSYM'01: Proc. 10th USENIX Security Symp. (2001).
-
SSYM'01: Proc. 10th USENIX Security Symp. (2001)
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
9
-
-
85009448253
-
PointguardTM: Protecting pointers from buffer overflow vulnerabilities
-
COWAN, C., BEATTIE, S., JOHANSEN, J., AND WAGLE, P. PointguardTM: protecting pointers from buffer overflow vulnerabilities. In SSYM'03: Proc. 12th USENIX Security Symp. (2003).
-
SSYM'03: Proc. 12th USENIX Security Symp. (2003)
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
10
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
COWAN, C., PU, C., MAIER, D., HINTONY, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In SSYM'98: Proc. 7th USENIX Security Symp. (1998).
-
SSYM'98: Proc. 7th USENIX Security Symp. (1998)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
11
-
-
78651539599
-
XFI: Software guards for system address spaces
-
ERLINGSSON, Ú., ABADI, M., VRABLE, M., BUDIU, M., AND NECULA, G. C. XFI: Software guards for system address spaces. In OSDI'06 (2006), pp. 75-88.
-
(2006)
OSDI'06
, pp. 75-88
-
-
Erlingsson, Ú.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
12
-
-
80054829436
-
Instruction-level countermeasures against stack-based buffer overflow attacks
-
ACM
-
GADALETA, F., YOUNAN, Y., JACOBS, B., JOOSEN, W., DE NEVE, E., AND BEOSIER, N. Instruction-level countermeasures against stack-based buffer overflow attacks. In VDTS '09: Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems (2009), ACM, pp. 7-12.
-
VDTS '09: Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems (2009)
, pp. 7-12
-
-
Gadaleta, F.1
Younan, Y.2
Jacobs, B.3
Joosen, W.4
De Neve, E.5
Beosier, N.6
-
13
-
-
34748842480
-
Advances in format string exploitation
-
GERA, AND RIQ. Advances in format string exploitation. Phrack 11, 59 (2002), http://phrack.com/issues.html?issue=59&id=7.
-
(2002)
Phrack
, vol.11
, pp. 59
-
-
Gera1
Riq2
-
14
-
-
84874177500
-
Advanced format string attacks
-
HAAS, P. Advanced format string attacks. https://www.defcon.org/images/ defcon-18/dc-18-presentations/Haas/DEFCON-18-Haas-Adv-Format-String-Attacks.pdf, DEFCON 18 2010.
-
(2010)
DEFCON
, vol.18
-
-
Haas, P.1
-
15
-
-
14844332687
-
ProPolice: Improved stack-smashing attack detection
-
HIROAKI, E., AND KUNIKAZU, Y. ProPolice: Improved stack-smashing attack detection. IPSJ SIG Notes (2001), 181- 188.
-
(2001)
IPSJ SIG Notes
, pp. 181-188
-
-
Hiroaki, E.1
Kunikazu, Y.2
-
16
-
-
3042642332
-
The advanced return-into-lib(c) exploits
-
Nov.
-
NERGAL. The advanced return-into-lib(c) exploits. Phrack 11, 58 (Nov. 2007), http://phrack.com/issues.html?issue=67&id=8.
-
(2007)
Phrack
, vol.11
, pp. 58
-
-
Nergal1
-
20
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
PINCUS, J., AND BAKER, B. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy 2 (2004), 20-27.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
21
-
-
84914134690
-
A eulogy for format strings
-
PLANET, C. A eulogy for format strings. Phrack 14, 67 (2010), http://phrack.com/issues.html?issue=67&id=8.
-
(2010)
Phrack
, vol.14
, pp. 67
-
-
Planet, C.1
-
24
-
-
14844328033
-
On the effectiveness of address-space randomization
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-J., MODADUGU, N., AND BONEH, D. On the effectiveness of address-space randomization. In CCS'04: Proc. 11th Conf. Computer and Communications Security (2004), pp. 298-307.
-
CCS'04: Proc. 11th Conf. Computer and Communications Security (2004)
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
|