-
1
-
-
84860095094
-
Once upon a free()
-
Anonymous, August
-
Anonymous. Once upon a free(). . . . Phrack Magazine, 57(9), August 2001. http://www.phrack.org/archives/57/p57-0x09-Once%20upon%20a%20free()-by- anonymous%20author.txt.
-
(2001)
Phrack Magazine
, vol.57
, Issue.9
-
-
-
3
-
-
84880094333
-
Malloc des-maleficarum
-
blackngel, November
-
blackngel. Malloc des-maleficarum. Phrack Magazine, 66(10), November 2009. http://www.phrack.org/archives/66/p66-0x0a-Malloc%20Des-Maleficarum-by- blackngel.txt.
-
(2009)
Phrack Magazine
, vol.66
, Issue.10
-
-
-
4
-
-
84880088171
-
Blackngel. ptmalloc v2 & v3: Analysis & corruption
-
November
-
blackngel. ptmalloc v2 & v3: Analysis & corruption. Phrack Magazine, 67(8), November 2010. http://www.phrack.org/archives/67/p67-0x08- The%20House%20Of%20Lore:%20Reloaded%20ptmalloc%20v2%20&%20v3: %20Analysis%20&%20Corruption-by-blackngel.txt.
-
(2010)
Phrack Magazine
, vol.67
, Issue.8
-
-
-
5
-
-
84861443711
-
Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage
-
David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, August
-
Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/ IAVoSS, August 2009.
-
(2009)
Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/ IAVoSS
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Alex Halderman, J.4
Felten, E.W.5
Shacham, H.6
-
6
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
James Larus, editor, ACM Press, March
-
Xiaoxin Chen, Tal Garfinkel, E. Christopher Lewis, Pratap Subrahmanyam, Carl A. Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan R.K. Ports. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In James Larus, editor, Proceedings of ASPLOS 2008, pages 2-13. ACM Press, March 2008.
-
(2008)
Proceedings of ASPLOS 2008
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
8
-
-
84883516225
-
Exokernel: An operating system architecture for application-level resource management
-
ACM Press, December
-
Dawson R. Engler, M. Frans Kaashoek, and James W. O'Toole. Exokernel: An operating system architecture for application-level resource management,. In Mark Weiser, editor, Proceedings of SOSP 1995, pages 251-66. ACM Press, December 1995.
-
(1995)
Mark Weiser, Editor, Proceedings of SOSP 1995
, pp. 251-66
-
-
Engler, D.R.1
Frans Kaashoek, M.2
O'toole, J.W.3
-
9
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
Virgil Gligor and Mike Reiter, editors, Internet Society, February
-
Tal Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In Virgil Gligor and Mike Reiter, editors, Proceedings of NDSS 2003. Internet Society, February 2003.
-
(2003)
Proceedings of NDSS 2003
-
-
Garfinkel, T.1
-
10
-
-
85180406262
-
Ostia: A delegating architecture for secure system call interposition
-
Mike Reiter and Dan Boneh, editors, Internet Society, February
-
Tal Garfinkel, Ben Pfaff, and Mendel Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Mike Reiter and Dan Boneh, editors, Proceedings of NDSS 2004. Internet Society, February 2004.
-
(2004)
Proceedings of NDSS 2004
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
11
-
-
85084162735
-
A secure environment for untrusted helper applications
-
Greg Rose, editor, USENIX, July
-
Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer. A secure environment for untrusted helper applications. In Greg Rose, editor, Proceedings of USENIX Security 1996. USENIX, July 1996.
-
(1996)
Proceedings of USENIX Security 1996
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
12
-
-
85031663471
-
Moving the default memory manager out of the mach kernel
-
Alan Langerman, editor, November, USENIX
-
David B. Golub and Richard P. Draves. Moving the default memory manager out of the mach kernel. In Alan Langerman, editor, Proceedings of Mach Symposium 1991, pages 177-88, November, 1991. USENIX.
-
(1991)
Proceedings of Mach Symposium 1991
, pp. 177-88
-
-
Golub, D.B.1
Draves, R.P.2
-
13
-
-
14844307465
-
Vudo malloc tricks
-
August
-
Michel Kaempf. Vudo malloc tricks. Phrack Magazine, 57(8), August 2001. http://www.phrack.org/archives/57/p57-0x08-Vudo%20malloc%20tricks-by-MaXX.txt.
-
(2001)
Phrack Magazine
, vol.57
, Issue.8
-
-
Kaempf, M.1
-
14
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
Larry Peterson, editor, ACM Press, October
-
David Lie, Chandramohan Thekkath, and Mark Horowitz. Implementing an untrusted operating system on trusted hardware. In Larry Peterson, editor, Proceedings of SOSP 2003, pages 178-92. ACM Press, October 2003.
-
(2003)
Proceedings of SOSP 2003
, pp. 178-92
-
-
Lie, D.1
Thekkath, C.2
Horowitz, M.3
-
15
-
-
34548722186
-
Minimal tcb code execution (extended abstract)
-
Birgit Pfitzmann and Patrick McDaniel, editors, IEEE Computer Society, May
-
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. Minimal tcb code execution (extended abstract). In Birgit Pfitzmann and Patrick McDaniel, editors, Proceedings of IEEE Security & Privacy ("Oakland") 2007, pages 267-72. IEEE Computer Society, May 2007.
-
(2007)
Proceedings of IEEE Security & Privacy ("Oakland") 2007
, pp. 267-72
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
16
-
-
77957778583
-
How low can you go? recommendations for hardware-supported minimal tcb code execution
-
James Larus, editor, ACM Press, March
-
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. How low can you go? Recommendations for hardware-supported minimal TCB code execution. In James Larus, editor, Proceedings of ASPLOS 2008, pages 14-25. ACM Press, March 2008.
-
(2008)
Proceedings of ASPLOS 2008
, pp. 14-25
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
17
-
-
55149108173
-
Flicker: An execution infrastructure for tcb minimization
-
Steven Hand, editor, ACM, March
-
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, and Arvind Seshadri. Flicker: An execution infrastructure for TCB minimization. In Steven Hand, editor, Proceedings of EuroSys 2008, pages 315-28. ACM Press, March 2008.
-
(2008)
Proceedings of EuroSys 2008
, pp. 315-28
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Seshadri, A.5
-
18
-
-
78650861686
-
Safe passage for passwords and other sensitive data
-
Giovanni Vigna, editor, The Internet Society, February
-
Jonathan M. McCune, Adrian Perrig, and Michael K. Reiter. Safe passage for passwords and other sensitive data. In Giovanni Vigna, editor, Proceedings of NDSS 2009. The Internet Society, February 2009.
-
(2009)
Proceedings of NDSS 2009
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
19
-
-
78650032754
-
Dieharder: Securing the heap
-
Angelos D. Keromytis and Vitaly Shmatikov, editors, ACM Press, October
-
Gene Novark and Emery D. Berger. DieHarder: Securing the heap. In Angelos D. Keromytis and Vitaly Shmatikov, editors, Proceedings of CCS 2010. ACM Press, October 2010.
-
(2010)
Proceedings of CCS 2010
-
-
Novark, G.1
Berger, E.D.2
-
20
-
-
84880119690
-
The stack is back
-
Presented at, January, Presentation. Slides
-
Jon Oberheide. The stack is back. Presented at Infiltrate 2012, January 2012. Presentation. Slides: http://jon.oberheide.org/files/infiltrate12- thestackisback.pdf.
-
(2012)
Infiltrate 2012
-
-
Oberheide, J.1
-
24
-
-
84878346861
-
Improving host security with system call policies
-
Vern Paxson, editor, USENIX, August
-
Niels Provos. Improving host security with system call policies. In Vern Paxson, editor, Proceedings of USENIX Security 2003. USENIX, August 2003.
-
(2003)
Proceedings of USENIX Security 2003
-
-
Provos, N.1
-
26
-
-
84875677480
-
When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography
-
Wenke Lee, editor, Internet Society, February
-
Thomas Ristenpart and Scott Yilek. When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. InWenke Lee, editor, Proceedings of NDSS 2003. Internet Society, February 2003.
-
(2003)
Proceedings of NDSS 2003
-
-
Ristenpart, T.1
Yilek, S.2
-
27
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
To appear
-
Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage. Return-oriented programming: Systems, languages, and applications. Trans. Info. & Sys. Sec., 2012. To appear.
-
(2012)
Trans. Info. & Sys. Sec.
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
28
-
-
78650018752
-
Bypassing browser memory protections in windows vista
-
Presented at, August, Online
-
Alexander Sotirov and Mark Dowd. Bypassing browser memory protections in Windows Vista. Presented at Black Hat 2008, August 2008. Online: http://www.phreedom.org/research/bypassingbrowser-memory-protections/ bypassing-browsermemory-protections.pdf.
-
(2008)
Black Hat 2008
-
-
Sotirov, A.1
Dowd, M.2
-
29
-
-
84877725095
-
When private keys are public: Results from the 2008 debian openssl vulnerability
-
Anja Feldmann and Laurent Mathy, editors, ACM, November
-
Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, and Stefan Savage. When private keys are public: Results from the 2008 Debian OpenSSL vulnerability. In Anja Feldmann and Laurent Mathy, editors, Proceedings of IMC 2009, pages 15-27. ACM Press, November 2009.
-
(2009)
Proceedings of IMC 2009
, pp. 15-27
-
-
Yilek, S.1
Rescorla, E.2
Shacham, H.3
Enright, B.4
Savage, S.5
|