-
1
-
-
84877933896
-
-
Sycurelab, Syracuse University
-
DECAF: Binary Analysis Platform. Sycurelab, Syracuse University. http://code.google.com/p/decaf-platform/.
-
DECAF: Binary Analysis Platform
-
-
-
2
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
Nov.
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13, 1 (Nov. 2009), 4:1-4:40.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
50249149602
-
Preventing memory error exploits with wit
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., AND CASTRO, M. Preventing memory error exploits with wit. In Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008), SP '08.
-
Proceedings of the 2008 IEEE Symposium on Security and Privacy (2008), SP '08
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
78650574143
-
Dksm: Subverting virtual machine introspection for fun and profit
-
BAHRAM, S., JIANG, X., WANG, Z., GRACE, M., LI, J., SRINIVASAN, D., RHEE, J., AND XU, D. Dksm: Subverting virtual machine introspection for fun and profit. In Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS'10) (2010).
-
Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS'10) (2010)
-
-
Bahram, S.1
Jiang, X.2
Wang, Z.3
Grace, M.4
Li, J.5
Srinivasan, D.6
Rhee, J.7
Xu, D.8
-
8
-
-
35448938417
-
Securing software by enforcing data-flow integrity
-
CASTRO, M., COSTA, M., AND HARRIS, T. Securing software by enforcing data-flow integrity. In Proceedings of the 7th symposium on Operating systems design and implementation, OSDI '06.
-
Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
9
-
-
57349156632
-
A type system for data-flow integrity on windows vista
-
Feb.
-
CHAUDHURI, A., NALDURG, P., AND RAJAMANI, S. A type system for data-flow integrity on windows vista. SIGPLAN Not. 43, 12 (Feb. 2009), 9-20.
-
(2009)
SIGPLAN Not.
, vol.43
, Issue.12
, pp. 9-20
-
-
Chaudhuri, A.1
Naldurg, P.2
Rajamani, S.3
-
11
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
CHEN, S., XU, J., NAKKA, N., KALBARCZYK, Z., AND IYER, R. Defeating memory corruption attacks via pointer taintedness detection. In Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on (2005).
-
(2005)
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.5
-
12
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-control-data attacks are realistic threats. In Proceedings of the 14th conference on USENIX Security Symposium (2005), SSYM'05.
-
Proceedings of the 14th Conference on USENIX Security Symposium (2005), SSYM'05
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
15
-
-
41149160709
-
Bouncer: Securing software by blocking bad input
-
COSTA, M., CASTRO, M., ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: securing software by blocking bad input. In Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07).
-
Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07)
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
16
-
-
85180792449
-
Mocfi: A framework to mitigate control-flow attacks on smartphones
-
DAVI, L., DMITRIENKO, R., EGELE, M., FISCHER, T., HOLZ, T., HUND, R., NÃIJRNBERGER, S., AND REZA SADEGHI, A. Mocfi: A framework to mitigate control-flow attacks on smartphones. In In Proceedings of the Network and Distributed System Security Symposium (NDSS'12).
-
Proceedings of the Network and Distributed System Security Symposium (NDSS'12)
-
-
Davi, L.1
Dmitrienko, R.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nãijrnberger, S.7
Reza Sadeghi, A.8
-
17
-
-
80051981742
-
Virtuoso: Narrowing the semantic gap in virtual machine introspection
-
DOLAN-GAVITT, B., LEEK, T., ZHIVICH, M., GIFFIN, J., AND LEE, W. Virtuoso: Narrowing the semantic gap in virtual machine introspection. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland) (May 2011).
-
Proceedings of the IEEE Symposium on Security and Privacy (Oakland) (May 2011)
-
-
Dolan-Gavitt, B.1
Leek, T.2
Zhivich, M.3
Giffin, J.4
Lee, W.5
-
20
-
-
31844450371
-
Dart: Directed automated random testing
-
ACM
-
GODEFROID, P., KLARLUND, N., AND SEN, K. Dart: directed automated random testing. In Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation (2005), PLDI '05, ACM.
-
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (2005), PLDI '05
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
22
-
-
84870525044
-
Os-sommelier: Memory-only operating system fingerprinting in the cloud
-
GU, Y., FU, Y., PRAKASH, A., LIN, Z., AND YIN, H. Os-sommelier: memory-only operating system fingerprinting in the cloud. In Proceedings of the Third ACM Symposium on Cloud Computing, SoCC '12.
-
Proceedings of the Third ACM Symposium on Cloud Computing, SoCC '12
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
24
-
-
84877987633
-
Dta++: Dynamic taint analysis with targeted control-flow propagation
-
KANG, M. G., MCCAMANT, S., POOSANKAM, P., AND SONG, D. Dta++: Dynamic taint analysis with targeted control-flow propagation. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
-
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Kang, M.G.1
Mccamant, S.2
Poosankam, P.3
Song, D.4
-
26
-
-
79955984933
-
Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
-
LIN, Z., RHEE, J., ZHANG, X., XU, D., AND JIANG, X. Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11).
-
Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS'11)
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
29
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
PETRONI, N. L., JR., FRASER, T., MOLINA, J., AND ARBAUGH, W. A. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of the 13th USENIX Security Symposium (2004).
-
Proceedings of the 13th USENIX Security Symposium (2004)
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
33
-
-
85105238769
-
Efficient software-based fault isolation
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. Efficient software-based fault isolation. In Proceedings of the 14th SymPosium on Operating System Principles (1993).
-
Proceedings of the 14th SymPosium on Operating System Principles (1993)
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
34
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
WARTELL, R., MOHAN, V., HAMLEN, K. W., AND LIN, Z. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
35
-
-
84877988037
-
-
Tech. rep., Apr
-
WEI, T., ZHANG, C., CHEN, Z., DUAN, L., SZEKERES, L., MCCAMANT, S., AND SONG, D. Fpgate: The last building block for a practical cfi solution, technical report for microsoft bluehat prize contest. Tech. rep., Apr 2012.
-
(2012)
Fpgate: The Last Building Block for a Practical Cfi Solution, Technical Report for Microsoft Bluehat Prize Contest
-
-
Wei, T.1
Zhang, C.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
Mccamant, S.6
Song, D.7
-
36
-
-
84866672217
-
Cfimon: Detecting violation of control flow integrity using performance counters
-
XIA, Y., LIU, Y., CHEN, H., AND ZANG, B. Cfimon: Detecting violation of control flow integrity using performance counters. In Dependable Systems and Networks (DSN) 2012.
-
Dependable Systems and Networks (DSN) 2012
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
37
-
-
85060493868
-
Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
-
USENIX Association
-
YAN, L. K., AND YIN, H. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX conference on Security symposium - 2012, USENIX Association.
-
Proceedings of the 21st USENIX Conference on Security Symposium - 2012
-
-
Yan, L.K.1
Yin, H.2
-
38
-
-
77955044524
-
HookScout: Proactive binary-centric hook detection
-
YIN, H., POOSANKAM, P., HANNA, S., AND SONG, D. HookScout: Proactive binary-centric hook detection. In Proceedings of Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'10) (July 2010).
-
Proceedings of Seventh Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA'10) (July 2010)
-
-
Yin, H.1
Poosankam, P.2
Hanna, S.3
Song, D.4
-
39
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
YIN, H., SONG, D., MANUEL, E., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS'07).
-
Proceedings of the 14th ACM Conference on Computer and Communication Security (CCS'07)
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
-
40
-
-
85180735631
-
Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis
-
ZHANG, M., PRAKASH, A., LI, X., LIANG, Z., AND YIN, H. Identifying and analyzing pointer misuses for sophisticated memory-corruption exploit diagnosis. In Proceedings of 19th Annual Network & Distributed System Security Symposium (2012).
-
Proceedings of 19th Annual Network & Distributed System Security Symposium (2012)
-
-
Zhang, M.1
Prakash, A.2
Li, X.3
Liang, Z.4
Yin, H.5
|