-
1
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
J. Ansel, P. Marchenko, U. Erlingsson, E. Taylor, B. Chen, D. L. Schuff, D. Sehr, C. L. Biffle, and B. Yee. Language-independent sandboxing of just-in-time compilation and self-modifying code. In Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 355-366, 2011.
-
(2011)
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 355-366
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson, U.3
Taylor, E.4
Chen, B.5
Schuff, D.L.6
Sehr, D.7
Biffle, C.L.8
Yee, B.9
-
3
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. Bletsch, X. Jiang, V. Freeh, and Z. Liang. Jump-oriented programming: a new class of code-reuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 30-40, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
Liang, Z.4
-
5
-
-
79960876719
-
JITDefender: A defense against JIT spraying attacks
-
P. Chen, Y. Fang, B. Mao, and L. Xie. JITDefender: A defense against JIT spraying attacks. In Proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC '11, pages 142-153, 2011.
-
(2011)
Proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC '11
, pp. 142-153
-
-
Chen, P.1
Fang, Y.2
Mao, B.3
Xie, L.4
-
6
-
-
0027684663
-
Operating system protection through program evolution
-
Oct.
-
F. Cohen. Operating system protection through program evolution. Computers and Security, 12(6):565-584, Oct. 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
7
-
-
0030697765
-
Building diverse computer systems
-
S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In Proceedings of the 6th Workshop on Hot Topics in Operating Systems, HotOS '97, pages 67-72, 1997.
-
(1997)
Proceedings of the 6th Workshop on Hot Topics in Operating Systems, HotOS '97
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
10
-
-
84869381037
-
ILR: Where'd my gadgets go?
-
J. Hiser, A. Nguyen-Tuong, M. Co, M. Hall, and J. W. Davidson. ILR: Where'd my gadgets go? In Proceedings of the 33rd IEEE Symposium on Security and Privacy, S&P '12, pages 571-585, 2012.
-
(2012)
Proceedings of the 33rd IEEE Symposium on Security and Privacy, S&P '12
, pp. 571-585
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
11
-
-
84876901222
-
Profile-guided automated software diversity
-
A. Homescu, S. Neisius, P. Larsen, S. Brunthaler, and M. Franz. Profile-guided automated software diversity. In Proceedings of the 2013 International Symposium on Code Generation and Optimization, CGO '13, 2013.
-
Proceedings of the 2013 International Symposium on Code Generation and Optimization, CGO '13, 2013
-
-
Homescu, A.1
Neisius, S.2
Larsen, P.3
Brunthaler, S.4
Franz, M.5
-
12
-
-
79957469988
-
Mao - an extensible micro-architectural optimizer
-
R. Hundt, E. Raman, M. Thuresson, and N. Vachharajani. Mao - an extensible micro-architectural optimizer. In Proceedings of the 9th IEEE/ACM International Symposium on Code Generation and Optimization, CGO '11, pages 1-10, 2011.
-
(2011)
Proceedings of the 9th IEEE/ACM International Symposium on Code Generation and Optimization, CGO '11
, pp. 1-10
-
-
Hundt, R.1
Raman, E.2
Thuresson, M.3
Vachharajani, N.4
-
14
-
-
84877282861
-
Compiler-generated software diversity
-
S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, editors, Moving Target Defense, Springer New York
-
T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner, A. Gal, S. Brunthaler, C. Wimmer, and M. Franz. Compiler-generated software diversity. In S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, editors, Moving Target Defense, volume 54 of Advances in Information Security, pages 77-98. Springer New York, 2011.
-
(2011)
Advances in Information Security
, vol.54
, pp. 77-98
-
-
Jackson, T.1
Salamat, B.2
Homescu, A.3
Manivannan, K.4
Wagner, G.5
Gal, A.6
Brunthaler, S.7
Wimmer, C.8
Franz, M.9
-
16
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating return-oriented rootkits with "return-less" kernels. In Proceedings of the 5th European Conference on Computer Systems, EuroSys '10, pages 195-208, 2010.
-
(2010)
Proceedings of the 5th European Conference on Computer Systems, EuroSys '10
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
17
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, PLDI '05, pages 190-200, 2005.
-
(2005)
Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, PLDI '05
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
20
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-Free: Defeating return-oriented programming through gadget-less binaries. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 49-58, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
22
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
V. Pappas, M. Polychronakis, and A. D. Keromytis. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Proceedings of the 33rd IEEE Symposium on Security and Privacy, S&P '12, pages 601-615, 2012.
-
(2012)
Proceedings of the 33rd IEEE Symposium on Security and Privacy, S&P '12
, pp. 601-615
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
25
-
-
84943385283
-
Retargetable and reconfigurable software dynamic translation
-
K. Scott, N. Kumar, S. Velusamy, B. R. Childers, J. W. Davidson, and M. L. Soffa. Retargetable and reconfigurable software dynamic translation. In Proceedings of the 2003 International Symposium on Code Generation and Optimisation, CGO '03, 2003.
-
Proceedings of the 2003 International Symposium on Code Generation and Optimisation, CGO '03, 2003
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.R.4
Davidson, J.W.5
Soffa, M.L.6
-
27
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04, pages 298-307, 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS '04
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
28
-
-
84863448918
-
Compiling for niceness: Mitigating contention for QoS in warehouse scale computers
-
L. Tang, J. Mars, and M. L. Soffa. Compiling for niceness: mitigating contention for QoS in warehouse scale computers. In Proceedings of the 10th IEEE/ACM International Symposium on Code Generation and Optimization, CGO '12, pages 1-12, 2012.
-
(2012)
Proceedings of the 10th IEEE/ACM International Symposium on Code Generation and Optimization, CGO '12
, pp. 1-12
-
-
Tang, L.1
Mars, J.2
Soffa, M.L.3
-
29
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12, pages 157-168, 2012.
-
(2012)
Proceedings of the 19th ACM Conference on Computer and Communications Security, CCS '12
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
30
-
-
79957820877
-
INSeRT: Protect dynamic code generation against spraying
-
T. Wei, T. Wang, L. Duan, and J. Luo. INSeRT: Protect dynamic code generation against spraying. In Proceedings of the 2011 International Conference on Information Science and Technology, ICIST '11, pages 323-328, 2011.
-
(2011)
Proceedings of the 2011 International Conference on Information Science and Technology, ICIST '11
, pp. 323-328
-
-
Wei, T.1
Wang, T.2
Duan, L.3
Luo, J.4
-
31
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In Proceedings of the 30th IEEE Symposium on Security and Privacy, S&P '09, pages 79-93, 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy, S&P '09
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|