-
1
-
-
72449145808
-
Control-ow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-ow integrity: Principles, implementations, and applications. ACM Trans. Inf. Syst. Secur., 13(1), 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
50249149602
-
Preventing memory error exploits with wit
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In IEEE Symposium on Security and Privacy, S&P '08, 2008.
-
(2008)
IEEE Symposium on Security and Privacy, S&P '08
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 1996.
-
(1996)
Phrack Magazine
, vol.49
, pp. 14
-
-
One, A.1
-
5
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In ACM Conference on Computer and Communications Security, CCS '10, 2010.
-
(2010)
ACM Conference on Computer and Communications Security, CCS '10
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
6
-
-
85180792449
-
Mocfi: A framework to mitigate control-ow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger, and A.-R. Sadeghi. MoCFI: A framework to mitigate control-ow attacks on smartphones. In Network and Distributed System Security Symposium, NDSS '12, 2012.
-
(2012)
Network and Distributed System Security Symposium, NDSS '12
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nurnberger, S.7
Sadeghi, A.-R.8
-
8
-
-
84914159903
-
Out of control: Overcoming control-ow integrity
-
E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis. Out of control: Overcoming control-ow integrity. In IEEE Symposium on Security and Privacy, S&P '14, 2014.
-
(2014)
IEEE Symposium on Security and Privacy, S&P '14
-
-
Goktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
10
-
-
84903219684
-
Dynamic sequence checking of programs to detect code reuse attacks
-
A. K. Kanuparthi, J. Rajendran, M. Zahran, and R. Karri. Dynamic sequence checking of programs to detect code reuse attacks. Technical report, 2013. http://isis.poly.edu/~arun/tvlsi.pdf.
-
(2013)
Technical report
-
-
Kanuparthi, A.K.1
Rajendran, J.2
Zahran, M.3
Karri, R.4
-
11
-
-
4444331720
-
Security as a new dimension in embedded system design
-
P. Kocher, R. Lee, G. McGraw, and A. Raghunathan. Security as a new dimension in embedded system design. In Annual Design Automation Conference, DAC '04, 2004.
-
(2004)
Annual Design Automation Conference, DAC '04
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
-
13
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
July
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4), July 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, pp. 4
-
-
Pincus, J.1
Baker, B.2
-
14
-
-
84880296077
-
Extreme scale computing
-
J. Rattner. Extreme scale computing. ISCA Keynote, 2012.
-
(2012)
ISCA Keynote
-
-
Rattner, J.1
-
15
-
-
85014332650
-
Security in embedded systems: Design challenges
-
Aug
-
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady. Security in embedded systems: Design challenges. ACM Trans. Embed. Comput. Syst., 3(3), Aug. 2004.
-
(2004)
ACM Trans. Embed. Comput. Syst.
, vol.3
, Issue.3
-
-
Ravi, S.1
Raghunathan, A.2
Kocher, P.3
Hattangady, S.4
-
16
-
-
77952351839
-
The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86). In ACM Conf. on Computer and Communications Security, CCS '07, 2007.
-
(2007)
ACM Conf. On Computer and Communications Security, CCS '07
-
-
Shacham, H.1
-
17
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE Symposium on Security and Privacy, S&P '13, 2013.
-
(2013)
IEEE Symposium on Security and Privacy, S&P '13
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
18
-
-
84866672217
-
Cfimon: Detecting violation of control ow integrity using performance counters
-
Y. Xia, Y. Liu, H. Chen, and B. Zang. CFIMon: Detecting violation of control ow integrity using performance counters. In Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN '12, 2012.
-
(2012)
Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN '12
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
20
-
-
29144462647
-
Anomalous path detection with hardware support
-
T. Zhang, X. Zhuang, S. Pande, and W. Lee. Anomalous path detection with hardware support. In Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES '05, 2005.
-
(2005)
Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES '05
-
-
Zhang, T.1
Zhuang, X.2
Pande, S.3
Lee, W.4
|