-
3
-
-
84861443711
-
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham, "Can DREs provide long-lasting security? the case of return-oriented programming and the AVC advantage," in Proceedings of the 2009 conference on Electronic Voting Technology/Workshop on Trustworthy Elections (EVT/WOTE), 2009.
-
Proceedings of the 2009 Conference on Electronic Voting Technology/Workshop on Trustworthy Elections (EVT/WOTE), 2009
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
7
-
-
84855826604
-
-
P. Solé, "Hanging on a ROPe," http://www.immunitysec. com/downloads/DEPLIB20-ekoparty.pdf.
-
Hanging on a ROPe
-
-
Solé, P.1
-
12
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
G. Fresi Roglia, L. Martignoni, R. Paleari, and D. Bruschi, "Surgically returning to randomized lib(c)," in Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2009.
-
Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2009
-
-
Fresi Roglia, G.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
14
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, "On the effectiveness of address-space randomization," in Proceedings of the 11th ACM conference on Computer and Communications Security (CCS), 2004.
-
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS), 2004
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
15
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, "Defeating return-oriented rootkits with "return-less" kernels," in Proceedings of the 5th European conference on Computer Systems (EuroSys), 2010.
-
Proceedings of the 5th European Conference on Computer Systems (EuroSys), 2010
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
16
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, "G-Free: defeating return-oriented programming through gadget-less binaries," in Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), 2010.
-
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), 2010
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
19
-
-
39049113465
-
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning, "Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software," in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), 2006.
-
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC), 2006
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
20
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-flow integrity," in Proceedings of the 12th ACM conference on Computer and Communications Security (CCS), 2005.
-
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), 2005
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
21
-
-
79956032720
-
ROPdefender: A practical protection tool to protect against return-oriented programming
-
L. Davi, A.-R. Sadeghi, and M. Winandy, "ROPdefender: A practical protection tool to protect against return-oriented programming," in Proceedings of the 6th Symposium on Information, Computer and Communications Security (ASIACCS), 2011.
-
Proceedings of the 6th Symposium on Information, Computer and Communications Security (ASIACCS), 2011
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
22
-
-
79956023817
-
DROP: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie, "DROP: Detecting return-oriented programming malicious code," in Proceedings of the 5th International Conference on Information Systems Security (ICISS), 2009.
-
Proceedings of the 5th International Conference on Information Systems Security (ICISS), 2009
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
25
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi, "Randomized instruction set emulation to disrupt binary code injection attacks," in Proceedings of the 10th ACM conference on Computer and Communications Security (CCS), 2003.
-
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), 2003
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
27
-
-
85175132064
-
-
Corelan Team, "Mona," http://redmine.corelan.be/projects/mona.
-
Mona
-
-
-
30
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
Dec.
-
Nergal, "The advanced return-into-lib(c) exploits: PaX case study," Phrack, vol. 11, no. 58, Dec. 2001.
-
(2001)
Phrack
, vol.11
, Issue.58
-
-
Nergal1
-
33
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, "Return-oriented programming without returns," in Proceedings of the 17th ACM conference on Computer and Communications Security (CCS), 2010.
-
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS), 2010
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
34
-
-
0027684663
-
Operating system protection through program evolution
-
Oct.
-
F. B. Cohen, "Operating system protection through program evolution," Computers and Security, vol. 12, pp. 565-584, Oct. 1993.
-
(1993)
Computers and Security
, vol.12
, pp. 565-584
-
-
Cohen, F.B.1
-
40
-
-
85084160818
-
Static disassembly of obfuscated binaries
-
C. Kruegel, W. Robertson, F. Valeur, and G. Vigna, "Static disassembly of obfuscated binaries," in Proceedings of the 13th USENIX Security Symposium, 2004.
-
Proceedings of the 13th USENIX Security Symposium, 2004
-
-
Kruegel, C.1
Robertson, W.2
Valeur, F.3
Vigna, G.4
-
41
-
-
84864169671
-
-
Tech. Rep.
-
M. Smithson, K. Anand, A. Kotha, K. Elwazeer, N. Giles, and R. Barua, "Binary rewriting without relocation information," University of Maryland, Tech. Rep., 2010, http://www.ece.umd.edu/~barua/without-relocation- technical-report10.pdf.
-
(2010)
Binary Rewriting Without Relocation Information
-
-
Smithson, M.1
Anand, K.2
Kotha, A.3
Elwazeer, K.4
Giles, N.5
Barua, R.6
-
43
-
-
84878374701
-
Locreate: An anagram for relocate
-
Skape, "Locreate: An anagram for relocate," Uninformed, vol. 6, 2007.
-
(2007)
Uninformed
, vol.6
-
-
Skape1
-
47
-
-
84871140130
-
-
Hex-Rays, "IDA Pro Disassembler," http://www.hex-rays.com/ idapro/.
-
IDA Pro Disassembler
-
-
-
49
-
-
84886067644
-
Bird: Binary interpretation using runtime disassembly
-
S. Nanda, W. Li, L.-C. Lam, and T.-c. Chiueh, "Bird: Binary interpretation using runtime disassembly," in Proceedings of the International Symposium on Code Generation and Optimization (CGO), 2006.
-
Proceedings of the International Symposium on Code Generation and Optimization (CGO), 2006
-
-
Nanda, S.1
Li, W.2
Lam, L.-C.3
Chiueh, T.-C.4
-
50
-
-
52349096066
-
Practical analysis of stripped binary code
-
December
-
L. C. Harris and B. P. Miller, "Practical analysis of stripped binary code," SIGARCH Comput. Archit. News, vol. 33, pp. 63-68, December 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, pp. 63-68
-
-
Harris, L.C.1
Miller, B.P.2
-
52
-
-
0004072686
-
-
Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc.
-
A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman, Compilers: Principles, Techniques, and Tools (2nd Edition). Boston, MA, USA: Addison-Wesley Longman Publishing Co., Inc., 2006.
-
(2006)
Compilers: Principles, Techniques, and Tools (2nd Edition)
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
55
-
-
85175130874
-
(2A & 2B): Instruction Set Reference, A-Z
-
ser.
-
Intel 64 and IA-32 Architectures Software Developer's Manual, ser. Volume 2 (2A & 2B): Instruction Set Reference, A-Z, 2011, http://www.intel.com/ Assets/PDF/manual/325383.pdf.
-
(2011)
Intel 64 and IA-32 Architectures Software Developer's Manual
, vol.2
-
-
-
57
-
-
0019530514
-
ALGORITHM TO GENERATE ALL TOPOLOGICAL SORTING ARRANGEMENTS.
-
Y. L. Varol and D. Rotem, "An algorithm to generate all topological sorting arrangements," Comput. J., vol. 24, no. 1, pp. 83-84, 1981. (Pubitemid 11505179)
-
(1981)
Computer Journal
, vol.24
, Issue.1
, pp. 83-84
-
-
Varol, Y.L.1
Rotem, D.2
-
59
-
-
77957355973
-
Bypassing Windows hardware-enforced DEP
-
Sep.
-
Skape and Skywing, "Bypassing Windows hardware-enforced DEP," Uninformed, vol. 2, Sep. 2005.
-
(2005)
Uninformed
, vol.2
-
-
Skape1
Skywing2
-
61
-
-
85175132052
-
-
"Wine," http://www.winehq.org.
-
Wine
-
-
-
65
-
-
84878361127
-
-
Corelan Team, "Corelan ROPdb," https://www.corelan.be/index. php/security/corelan-ropdb/.
-
Corelan ROPdb
-
-
-
66
-
-
84878376442
-
-
"Immunity Debugger," http://www.immunityinc.com/products- immdbg.shtml.
-
Immunity Debugger
-
-
-
67
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage, "When good instructions go bad: generalizing return-oriented programming to RISC," in Proceedings of the 15th ACM conference on Computer and Communications Security (CCS), 2008.
-
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), 2008
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
68
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. Bletsch, X. Jiang, V. Freeh, and Z. Liang, "Jump-oriented programming: A new class of code-reuse attack," in Proceedings of the 6th Symposium on Information, Computer and Communications Security (ASIACCS), 2011.
-
Proceedings of the 6th Symposium on Information, Computer and Communications Security (ASIACCS), 2011
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
Liang, Z.4
|