-
1
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In Proceedings of the 12th ACM Conference on Computer and Communications Security, pages 340-353, 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
35348976981
-
Defeating compiler-level buffer overflow protection
-
S. Alexander. Defeating compiler-level buffer overflow protection. The USENIX Magazine;LOGIN, 30(3):59-71, 2005.
-
(2005)
The USENIX Magazine;LOGIN
, vol.30
, Issue.3
, pp. 59-71
-
-
Alexander, S.1
-
4
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to risc
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: generalizing return-oriented programming to risc. In Proceedings of the 15th ACM conference on Computer and communications security, pages 27-38, 2008.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
6
-
-
84877987718
-
Core-2007-0219: Openbs's ipv6 mbufs remote kernel buffer overflow
-
CORE Security Technologies Advisories. Core-2007-0219: Openbs's ipv6 mbufs remote kernel buffer overflow. http://www.securityfocus.com/archive/1/ 462728/30/150/threaded, 2007.
-
(2007)
CORE Security Technologies Advisories
-
-
-
7
-
-
85009448253
-
Pointguard™: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. Pointguard™: protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th conference on USENIX Security Symposium, volume 12, pages 91-104, 2003.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
9
-
-
36849034066
-
Spec cpu2006 benchmark descriptions
-
Sept.
-
J. L. Henning. Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34:1-17, Sept. 2006.
-
(2006)
SIGARCH Comput. Archit. News
, vol.34
, pp. 1-17
-
-
Henning, J.L.1
-
11
-
-
84877931575
-
Metasploit penetration testing software & framework
-
Metasploit Open Source Commitment. Metasploit penetration testing software & framework.
-
Metasploit Open Source Commitment
-
-
-
12
-
-
84877958789
-
Image has safe exception handlers
-
Microsoft Visual Studio 2005. Image has safe exception handlers. http://msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx.
-
Microsoft Visual Studio 2005
-
-
-
13
-
-
84877962671
-
EncodePointer function: Provide another layer of protection for pointer values
-
MSDN online library. EncodePointer function: provide another layer of protection for pointer values. http://msdn.microsoft.com/en-us/library/ bb432254(v=vs.85).aspx.
-
MSDN Online Library
-
-
-
14
-
-
84877962235
-
Microsoft Portable Executable (PE) and Common Object File Format (COFF) Specification
-
MSDN online library. Microsoft Portable Executable (PE) and Common Object File Format (COFF) Specification. http://msdn.microsoft.com/en-us/windows/ hardware/gg463119.aspx.
-
MSDN Online Library
-
-
-
16
-
-
0006100649
-
Smashing the stack for fun and profit
-
A. One. Smashing the stack for fun and profit. Phrack magazine, 7:14-16, 1996.
-
(1996)
Phrack Magazine
, vol.7
, pp. 14-16
-
-
One, A.1
-
20
-
-
84872114405
-
Securing untrusted code via compiler-agnostic binary rewriting
-
R. Wartell, V. Mohan, K. Hamlen, and Z. Lin. Securing untrusted code via compiler-agnostic binary rewriting. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12), Orlando, FL, December 2012.
-
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12), Orlando, FL, December 2012
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.3
Lin, Z.4
-
21
-
-
84881218812
-
Practical control flow integrity & randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control flow integrity & randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy, San Francisco, CA, May 2013.
-
Proceedings of the 34th IEEE Symposium on Security and Privacy, San Francisco, CA, May 2013
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|