-
2
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing Memory Error Exploits with WIT. In IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One Nov.
-
Aleph One. Smashing the Stack for Fun and Profit. Phrack, 7, Nov. 1996.
-
(1996)
Phrack
, vol.7
-
-
-
5
-
-
79960594842
-
Once upon a free()
-
Anonymous
-
Anonymous. Once upon a free(). Phrack, 57, 2001.
-
(2001)
Phrack
, pp. 57
-
-
-
14
-
-
79960566389
-
Basic integer overflows
-
Blexim
-
Blexim. Basic Integer Overflows. Phrack, 60, 2002.
-
(2002)
Phrack
, pp. 60
-
-
-
19
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
20
-
-
84901629830
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nürnberger, and A.-R. Sadeghi. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Symposium on Network and Distributed System Security (NDSS), 2012.
-
(2012)
Symposium on Network and Distributed System Security (NDSS)
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.-R.8
-
22
-
-
78651539599
-
XFI: Software guards for system address spaces
-
U. Erlingsson, S. Valley, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In USENIX Symposium on Operating Systems Design and Implementation, 2006.
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation
-
-
Erlingsson, U.1
Valley, S.2
Abadi, M.3
Vrable, M.4
Budiu, M.5
Necula, G.C.6
-
24
-
-
84893335244
-
-
GCC Chapter 3.10
-
GCC. GCC Manual - Chapter 3.10, 2013.
-
(2013)
GCC Manual
-
-
-
32
-
-
33845305578
-
-
Chapter 24: Signal Handling, Aug. v0.10
-
S. Loosemore, R. M. Stallman, R. McGrath, A. Oram, and U. Drepper. The GNU C Library, Chapter 24: Signal Handling, Aug. 2001. v0.10.
-
(2001)
The GNU C Library
-
-
Loosemore, S.1
Stallman, R.M.2
McGrath, R.3
Oram, A.4
Drepper, U.5
-
37
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
July
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. In IEEE Symposium on Security and Privacy, July 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Pincus, J.1
Baker, B.2
-
39
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information and System Security (TISSEC), 15(1), 2012.
-
(2012)
ACM Transactions on Information and System Security (TISSEC)
, vol.15
, Issue.1
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
40
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, E. jin Goh, N. Modadugu, B. Pfaff, and D. Boneh. On the effectiveness of address-space randomization. In ACM Conference on Computer and Communications Security (CCS), 2004.
-
(2004)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
Jin Goh, E.2
Modadugu, N.3
Pfaff, B.4
Boneh, D.5
-
42
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Wang, Z.1
Jiang, X.2
-
46
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
G. Inc.
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Orm, S. Okasaka, N. Narula, N. Fullagar, and G. Inc. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In IEEE Symposium on Security and Privacy, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Orm, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
47
-
-
84901619881
-
Strato - A retargetable framework for low-level inlined-reference monitors
-
B. Zeng, G. Tan, and U. Erlingsson. Strato - A Retargetable Framework for Low-Level Inlined-Reference Monitors. In USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Zeng, B.1
Tan, G.2
Erlingsson, U.3
|