-
1
-
-
84890627155
-
Windows xp service pack 2
-
Data Execution Prevention (DEP) Available at
-
Data Execution Prevention (DEP) in Windows XP Service Pack 2, Microsoft Corporation, 2006. Available at: Http://www.support. microsoft.com/kb/875352
-
(2006)
Microsoft Corporation
-
-
-
2
-
-
84890785260
-
-
The Pax project Pax Team 2004 Available at
-
The Pax project, Pax Team, 2004. Available at: Http://www.pax. grsecurity.net/
-
-
-
-
4
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
New York, NY, USA, ACM
-
Shacham, H.: 'The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)'. Proc. 14th ACM Conf. Computer and Communications Security (CCS), New York, NY, USA, ACM, 2007, pp. 552-561
-
(2007)
Proc. 14th ACM Conf. Computer and Communications Security (CCS)
, pp. 552-561
-
-
Shacham, H.1
-
5
-
-
84890609000
-
-
Address Space Layout Randomization in Windows Vista Microsoft Corporation 2006 Available at
-
Address Space Layout Randomization in Windows Vista, Microsoft Corporation, 2006. Available at: Http://www.blogs.msdn.com/b/michaelhoward/ archive/2006/05/26/address-space-layout-randomizationin-windows-vista.aspx
-
-
-
-
6
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Bhatkar, E., Duvarney, D.C., Sekar, R.: 'Address obfuscation: An efficient approach to combat a broad range of memory error exploits'. Proc. 12th USENIX Security Symp., 2003, pp. 105-120
-
(2003)
Proc. 12th USENIX Security Symp
, pp. 105-120
-
-
Bhatkar, E.1
Duvarney, D.C.2
Sekar, R.3
-
7
-
-
85095117136
-
Interpreter exploitation
-
Berkeley, CA, USA, USENIX Association
-
Blazakis, D.: 'Interpreter exploitation'. Proc. Fourth USENIX Conf. Offensive Technologies (WOOT), Berkeley, CA, USA, USENIX Association, 2010, pp. 1-9
-
(2010)
Proc. Fourth USENIX Conf. Offensive Technologies (WOOT)
, pp. 1-9
-
-
Blazakis, D.1
-
8
-
-
78649982227
-
Writing jit-spray shellcode for fun and profit
-
Available at
-
Sintsov, A.: 'Writing jit-spray shellcode for fun and profit,' Digital Security Research Group, Tech. Rep., 2010. Available at: Http://www.dsecrg.com/ files/pub/pdf/Writing%20JIT-Spray%20Shellcode%20for% 20fun%20and%20profit.pdf
-
(2010)
Digital Security Research Group, Tech. Rep
-
-
Sintsov, A.1
-
9
-
-
84890750885
-
-
Sintsov: 'Jit-sprary attacks & advanced shellcode,' Digital Security Research Group, Technical Report, 2010. Available at:
-
Sintsov: 'Jit-sprary attacks & advanced shellcode,' Digital Security Research Group, Technical Report, 2010. Available at: Http://www.dsecrg.com/ files/pub/pdf/HITB%20-%20JIT-Spray%20Attacks%20and %20Advanced%20Shellcode.pdf
-
-
-
-
10
-
-
84890742514
-
It spraying
-
Available at
-
Liebowitz, M.: 'it spraying': Hackers find new ways to hi-jack applications,' 2011. Available at: Http://www.securitynewsdaily.com/921-jit- spraying-hackers-find-new-ways-to-hijack-documents.html
-
(2011)
Hackers Find New Ways to Hi-jack Applications
-
-
Liebowitz, M.1
-
11
-
-
84890615522
-
-
Wikipedia Heap spraying Available at
-
Wikipedia: 'Heap spraying,' 2010. Available at: Http://www.en. wikipedia.org/wiki/Heap-spraying
-
(2010)
-
-
-
12
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Available at
-
Roemer, R., Buchanan, E., Shacham, H., Savage, S.: 'Return-oriented programming: Systems, languages, and applications', ACM Trans. Inf. Syst. Secur. (TISSEC), 2012, 15, (1), pp. 1-34. Available at: Http ://www.cseweb.ucsd.edu/ ~hovav/papers/rbss12.html
-
(2012)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.15
, Issue.1
, pp. 1-34
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
13
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
Berlin, Heidelberg, Springer-Verlag
-
Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: 'Drop: Detecting return-oriented programming malicious code'. Proc. Fifth Int. Conf. on Information Systems Security (ICISS), Berlin, Heidelberg, Springer-Verlag, 2009, pp. 163-177
-
(2009)
Proc. Fifth Int. Conf. on Information Systems Security (ICISS)
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
14
-
-
84890680282
-
-
The WebKit Open Source Project Webkit 2010 Available at
-
The WebKit Open Source Project, Webkit, 2010. Available at: Http ://www.webkit.org/
-
-
-
-
15
-
-
84890754469
-
-
V8 JavaScript Engine Google Inc 2010 Available at
-
V8 JavaScript Engine, Google Inc., 2010. Available at: Http://www.code.google.com/apis/v8/intro.html
-
-
-
-
16
-
-
84890656944
-
-
Google Chrome 0.2.149.27 'SaveAs' Function Buffer Overflow Vulnerability, Security Vulnerability Research Team, 2008. Available at
-
Google Chrome 0.2.149.27 'SaveAs' Function Buffer Overflow Vulnerability, Security Vulnerability Research Team, 2008. Available at: Http://www.seclists. org/bugtraq/2008/Sep/70
-
-
-
-
17
-
-
84890763328
-
-
SAP GUI 7.10 WebViewer3D ActiveX-JIT-Spray Exploit Digital Security Research Group 2010 Available at
-
SAP GUI 7.10 WebViewer3D ActiveX-JIT-Spray Exploit, Digital Security Research Group, 2010. Available at: Http://www.dsecrg.com/files/exploits/SAP- Logon7-System.zip
-
-
-
-
18
-
-
84890623044
-
-
Oracle Document Capture (EasyMail Objects EMSMTP.DLL 6.0.1) ActiveX Control BOF-JIT-Spray Exploit Digital Security Research Group 2010 Available at
-
Oracle Document Capture (EasyMail Objects EMSMTP.DLL 6.0.1) ActiveX Control BOF-JIT-Spray Exploit, Digital Security Research Group, 2010. Available at: Http://www.dsecrg.com/files/exploits/QuikSoft-reverse.zip
-
-
-
-
20
-
-
79956058308
-
Automatic construction of jump-oriented programming shellcode (on the x86)
-
New York, NY, USA, ACM
-
Chen, P., Xing, X., Mao, B., Xie, L., Shen, X., Yin, X.: 'Automatic construction of jump-oriented programming shellcode (on the x86)'. Proc. Sixth ACM Symp. on Information, Computer and Communications Security (ASIACCS), New York, NY, USA, ACM, 2011, pp. 20-29
-
(2011)
Proc. Sixth ACM Symp. on Information, Computer and Communications Security (ASIACCS)
, pp. 20-29
-
-
Chen, P.1
Xing, X.2
Mao, B.3
Xie, L.4
Shen, X.5
Yin, X.6
-
21
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Berkeley, CA, USA, USENIX Association
-
Cowan, C., Pu, C., Maier, D., et al.: 'Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks'. Proc. Seventh Conf. on USENIX Security Symp. (USENIX), Berkeley, CA, USA, USENIX Association, 1998, pp. 63-78
-
(1998)
Proc. Seventh Conf. on USENIX Security Symp. (USENIX)
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
-
23
-
-
33745222343
-
Quantum malware
-
Wu, L.-A., Lidar, D.: 'Quantum malware', Quantum Inf. Process., 2006, 5, (2), pp. 69-81
-
(2006)
Quantum Inf. Process
, vol.5
, Issue.2
, pp. 69-81
-
-
Wu, L.-A.1
Lidar, D.2
-
24
-
-
70350669095
-
-
Available at
-
Sotirov, A.: 'Heap feng shui in javascript,' 2007. Available at: Https ://www.blackhat.com/presentations/bh-europe-07/Sotirov/Presentation/ bh-eu-07-sotirov-apr19.pdf
-
(2007)
Heap Feng Shui in Javascript
-
-
Sotirov, A.1
-
25
-
-
78751539789
-
Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks
-
New York, NY, USA ACM
-
Ding, Y.,Wei, T.,Wang, T., Liang, Z., Zou,W.: 'Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks'. Proc. 26th Annual Computer Security Applications Conf. (ACSAC), New York, NY, USA, ACM, 2010, pp. 327-336
-
(2010)
Proc. 26th Annual Computer Security Applications Conf. (ACSAC)
, pp. 327-336
-
-
Ding, Y.W.1
Wang, T.2
Liang, Z.3
Zou, W.4
-
26
-
-
70350626575
-
Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
-
Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: 'Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks'. Proc. Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2009, pp. 88-106
-
(2009)
Proc. Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Egele, M.1
Wurzinger, P.2
Kruegel, C.3
Kirda, E.4
-
27
-
-
84890686652
-
-
Libemu: 'X86 shellcode detection and emulation,' 2010. Available at
-
Libemu: 'X86 shellcode detection and emulation,' 2010. Available at: Http://www.libemu.mwcollect.org/
-
-
-
-
28
-
-
84924734121
-
Nozzle: A defense against heap-spraying code injection attacks
-
Berkeley, CA, USA, USENIX Association
-
Ratanaworabhan, P., Livshits, B., Zorn, B.: 'Nozzle: A defense against heap-spraying code injection attacks'. Proc. 18th Conf. on USENIX Security Symp. (SSYM), Berkeley, CA, USA, USENIX Association, 2009, pp. 169-186
-
(2009)
Proc. 18th Conf. on USENIX Security Symp. (SSYM)
, pp. 169-186
-
-
Ratanaworabhan, P.1
Livshits, B.2
Zorn, B.3
-
30
-
-
78650010363
-
Secure dynamic code generation against spraying
-
New York, NY, USA, ACM
-
Tao, W., Tielei, W., Lei, D., Jing, L.: 'Secure dynamic code generation against spraying'. Proc. 17th ACM Conf. on Computer and Communications Security (CCS) poster, New York, NY, USA, ACM, 2010, pp. 738-740
-
(2010)
Proc. 17th ACM Conf. on Computer and Communications Security (CCS) Poster
, pp. 738-740
-
-
Tao, W.1
Tielei, W.2
Lei, D.3
Jing, L.4
-
31
-
-
77949446893
-
Bubble: A javascript engine level countermeasure against heap-spraying attacks
-
Massacci, F., Wallach, D., Zannone, N. (Ed.) Springer-Berlin, Heidelberg
-
Gadaleta, F., Younan, Y., Joosen, W.: 'Bubble: A javascript engine level countermeasure against heap-spraying attacks', in Massacci, F., Wallach, D., Zannone, N. (Ed.): 'Engineering Secure Software and Systems' (Springer-Berlin, Heidelberg, 2010), vol. 5965, pp. 1-17
-
(2010)
Engineering Secure Software and Systems
, vol.5965
, pp. 1-17
-
-
Gadaleta, F.1
Younan, Y.2
Joosen, W.3
-
32
-
-
79960875294
-
Jitsec: Just-in-time security for code injection attacks
-
November Available at
-
De Groef, W., Nikiforakis, N., Younan, Y., Piessens, F.: 'Jitsec: just-in-time security for code injection attacks'. Benelux Workshop on Information and System Security (WISSEC 2010), November 2010. Available at: Https://www.lirias.kuleuven.be/handle/123456789/286573
-
(2010)
Benelux Workshop on Information and System Security (WISSEC 2010)
-
-
De Groef, W.1
Nikiforakis, N.2
Younan, Y.3
Piessens, F.4
|