-
2
-
-
72449145808
-
Controlflow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Controlflow integrity principles, implementations, and applications. ACM TISSEC, 2009.
-
(2009)
ACM TISSEC
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
84864169650
-
-
Technical report University of Maryland
-
K. Anand, M. Smithson, A. Kotha, K. Elwazeer, and R. Barua. Decompilation to compiler high IR in a binary rewriter. Technical report, University of Maryland, 2010.
-
(2010)
Decompilation to Compiler High IR in A Binary Rewriter
-
-
Anand, K.1
Smithson, M.2
Kotha, A.3
Elwazeer, K.4
Barua, R.5
-
4
-
-
84877692058
-
A compiler-level intermediate representation based binary analysis and rewriting system
-
K. Anand, M. Smithson, K. Elwazeer, A. Kotha, and J. Gruen et al. A compiler-level intermediate representation based binary analysis and rewriting system. In EuroSys, 2013.
-
(2013)
EuroSys
-
-
Anand, K.1
Smithson, M.2
Elwazeer, K.3
Kotha, A.4
Gruen, J.5
-
5
-
-
84866637805
-
AEG: Automatic exploit generation
-
T. Avgerinos, S. K. Cha, A. Rebert, E. J. Schwartz, and M. Woo et al. AEG: automatic exploit generation. In NDSS, 2011.
-
(2011)
NDSS
-
-
Avgerinos, T.1
Cha, S.K.2
Rebert, A.3
Schwartz, E.J.4
Woo, M.5
-
6
-
-
84897489745
-
Mitigating code-reuse attacks with control-flow locking
-
T. Bletsch, X. Jiang, and V. Freeh. Mitigating code-reuse attacks with control-flow locking. In ACSAC, 2011.
-
(2011)
ACSAC
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
-
7
-
-
84886049933
-
Software-based transparent and comprehensive control-flow error detection
-
E. Borin, C. Wang, Y. Wu, and G. Araujo. Software-based transparent and comprehensive control-flow error detection. In CGO, 2006.
-
(2006)
CGO
-
-
Borin, E.1
Wang, C.2
Wu, Y.3
Araujo, G.4
-
11
-
-
79956023817
-
DROP: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, and B. Mao et al. DROP: detecting return-oriented programming malicious code. In ICISS, 2009.
-
(2009)
ICISS
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
-
12
-
-
79956032720
-
ROPdefender: A detection tool to defend against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy. ROPdefender: a detection tool to defend against return-oriented programming attacks. In ASIACCS, 2011.
-
(2011)
ASIACCS
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
13
-
-
84883093655
-
Scalable variable and data type detection in a binary rewriter
-
K. ElWazeer, K. Anand, A. Kotha, M. Smithson, and R. Barua. Scalable variable and data type detection in a binary rewriter. In PLDI, 2013.
-
(2013)
PLDI
-
-
Elwazeer, K.1
Anand, K.2
Kotha, A.3
Smithson, M.4
Barua, R.5
-
14
-
-
78651539599
-
XFI: Software guards for system address spaces
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula. XFI: software guards for system address spaces. In OSDI, 2006.
-
(2006)
OSDI
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
15
-
-
84858758065
-
Vx32: Lightweight user-level sandboxing on the x86
-
B. Ford and R. Cox. Vx32: lightweight user-level sandboxing on the x86. In USENIX ATC, 2008.
-
(2008)
USENIX ATC
-
-
Ford, B.1
Cox, R.2
-
16
-
-
84869381037
-
ILR: Where'd my gadgets go?
-
J. Hiser, A. Nguyen-Tuong, M. Co, M. Hall, and J. Davidson. ILR: where'd my gadgets go? In S&P, 2012.
-
(2012)
S&P
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.5
-
19
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, and A. Klauser et al. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI, 2005.
-
(2005)
PLDI
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
-
21
-
-
84886067644
-
BIRD: Binary interpretation using runtime disassembly
-
S. Nanda, W. Li, L.-C. Lam, and T.-c. Chiueh. BIRD: binary interpretation using runtime disassembly. In CGO, 2006.
-
(2006)
CGO
-
-
Nanda, S.1
Li, W.2
Lam, L.-C.3
Chiueh, T.-C.4
-
22
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI, 2007.
-
(2007)
PLDI
-
-
Nethercote, N.1
Seward, J.2
-
23
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
-
24
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-Free: defeating return-oriented programming through gadget-less binaries. In ACSAC, 2010.
-
(2010)
ACSAC
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
25
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using inplace code randomization
-
V. Pappas, M. Polychronakis, and A. Keromytis. Smashing the gadgets: Hindering return-oriented programming using inplace code randomization. In S&P, 2012.
-
(2012)
S&P
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.3
-
26
-
-
79953214068
-
Fine-grained user-space security through virtualization
-
M. Payer and T. Gross. Fine-grained user-space security through virtualization. In VEE, 2011.
-
(2011)
VEE
-
-
Payer, M.1
Gross, T.2
-
27
-
-
2642520196
-
A binary rewriting defense against stack based overflow attacks
-
M. Prasad and T.-c. Chiueh. A binary rewriting defense against stack based overflow attacks. In USENIX ATC, 2003.
-
(2003)
USENIX ATC
-
-
Prasad, M.1
Chiueh, T.-C.2
-
28
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H.-s. Kim, and Y. Zhou et al. LIFT: a low-overhead practical information flow tracking system for detecting security attacks. In MICRO, 2006.
-
(2006)
MICRO
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
-
29
-
-
43449135047
-
Efficient fine-grained binary instrumentation with applications to taint-tracking
-
P. Saxena, R. Sekar, and V. Puranik. Efficient fine-grained binary instrumentation with applications to taint-tracking. In CGO, 2008.
-
(2008)
CGO
-
-
Saxena, P.1
Sekar, R.2
Puranik, V.3
-
30
-
-
84943385283
-
Retargetable and reconfigurable software dynamic translation
-
K. Scott, N. Kumar, S. Velusamy, B. Childers, and J. Davidson et al. Retargetable and reconfigurable software dynamic translation. In CGO, 2003.
-
(2003)
CGO
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.4
Davidson, J.5
-
31
-
-
70449684394
-
BitBlaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, and I. Jager et al. BitBlaze: a new approach to computer security via binary analysis. In ICISS, 2008.
-
(2008)
ICISS
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
-
33
-
-
84872114405
-
Securing untrusted code via compiler-agnostic binary rewriting
-
R. Wartell, V. Mohan, K. Hamlen, and Z. Lin. Securing untrusted code via compiler-agnostic binary rewriting. In ACSAC, 2012.
-
(2012)
ACSAC
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.3
Lin, Z.4
-
34
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
R.Wartell, V. Mohan, K. Hamlen, and Z. Lin. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. In CCS, 2012.
-
(2012)
CCS
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.3
Lin, Z.4
-
35
-
-
69149106605
-
Native Client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, and R. Muth et al. Native Client: a sandbox for portable, untrusted x86 native code. In S&P, 2009.
-
(2009)
S&P
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
-
36
-
-
84877975195
-
Protecting function pointers in binary
-
C. Zhang, T. Wei, Z. Chen, L. Duan, and S. McCamant et al. Protecting function pointers in binary. In ASIACCS, 2013.
-
(2013)
ASIACCS
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
McCamant, S.5
-
37
-
-
84881218812
-
Practical control flow integrity & randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, and L. Szekeres et al. Practical control flow integrity & randomization for binary executables. In S&P, 2013.
-
(2013)
S&P
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
-
38
-
-
85041451135
-
Control flow integrity for COTS binaries
-
M. Zhang and R. Sekar. Control flow integrity for COTS binaries. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Zhang, M.1
Sekar, R.2
|