-
1
-
-
84907024294
-
-
LLVM. http://llvm.org.
-
-
-
-
3
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity. In 12th ACM Conference on Computer and Communications Security (CCS), pages 340-353, 2005.
-
(2005)
12th ACM Conference on Computer and Communications Security (CCS
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In IEEE Symposium on Security and Privacy (S&P), pages 263-277, 2008.
-
(2008)
IEEE Symposium on Security and Privacy (S&P
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
5
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
J. Ansel, P. Marchenko, Ú. Erlingsson, E. Taylor, B. Chen, D. Schuff, D. Sehr, C. Biffle, and B. Yee. Language-independent sandboxing of just-in-time compilation and self-modifying code. In ACM Conference on Programming Language Design and Implementation (PLDI), pages 355-366, 2011.
-
(2011)
ACM Conference on Programming Language Design and Implementation (PLDI
, pp. 355-366
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson, U.3
Taylor, E.4
Chen, B.5
Schuff, D.6
Sehr, D.7
Biffle, C.8
Yee, B.9
-
6
-
-
78249251746
-
Transactional mutex locks
-
Berlin, Heidelberg, Springer-Verlag
-
L. Dalessandro, D. Dice, M. Scott, N. Shavit, and M. Spear. Transactional mutex locks. In Proceedings of the 16th International Euro-Par Conference on Parallel Processing: Part II, Euro-Par'10, pages 2-13, Berlin, Heidelberg, 2010. Springer-Verlag. ISBN 3-642-15290-2, 978-3-642-15290-0.
-
(2010)
Proceedings of the 16th International Euro-Par Conference on Parallel Processing: Part II, Euro-Par'10
, pp. 2-13
-
-
Dalessandro, L.1
Dice, D.2
Scott, M.3
Shavit, N.4
Spear, M.5
-
7
-
-
84901629830
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
L. Davi, R. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger, and A. reza Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Network and Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Network and Distributed System Security Symposium (NDSS
-
-
Davi, L.1
Dmitrienko, R.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nurnberger, S.7
Reza Sadeghi, A.8
-
9
-
-
78651539599
-
XFI: Software guards for system address spaces
-
Ú. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula. XFI: Software guards for system address spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 75-88, 2006.
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
10
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
IEEE, San Jose, CA, USA, May
-
E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis. Out of control: Overcoming control-flow integrity. In Security & Privacy (Oakland), San Jose, CA, USA, May 2014. IEEE.
-
(2014)
Security & Privacy (Oakland)
-
-
Goktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
12
-
-
77954614533
-
Defeating returnoriented rootkits with "return-less" kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating returnoriented rootkits with "return-less" kernels. In Proceedings of the 5th European Conference on Computer Systems, pages 195-208, 2010.
-
(2010)
Proceedings of the 5th European Conference on Computer Systems
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
14
-
-
84863454556
-
Rocksalt: Better, faster, stronger sfi for the x86
-
G. Morrisett, G. Tan, J. Tassarotti, J.-B. Tristan, and E. Gan. Rocksalt: Better, faster, stronger SFI for the x86. In ACM Conference on Programming Language Design and Implementation (PLDI), pages 395-404, 2012.
-
(2012)
ACM Conference on Programming Language Design and Implementation (PLDI
, pp. 395-404
-
-
Morrisett, G.1
Tan, G.2
Tassarotti, J.3
Tristan, J.-B.4
Gan, E.5
-
15
-
-
3042642332
-
The advanced return-into-lib(c) exploits: Pax case study
-
0x58, File 4 of 14
-
Nergal. The advanced return-into-lib(c) exploits: Pax case study. Phrack Magazine, Volume 11, Issue 0x58, File 4 of 14, 2001.
-
(2001)
Phrack Magazine
, vol.11
-
-
Nergal1
-
18
-
-
85072933898
-
Adapting software fault isolation to contemporary CPU architectures
-
D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko, K. Schimpf, B. Yee, and B. Chen. Adapting software fault isolation to contemporary CPU architectures. In 19th Usenix Security Symposium, pages 1-12, 2010.
-
(2010)
19th Usenix Security Symposium
, pp. 1-12
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
19
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: return-intolibc without function calls (on the x86). In 14th ACM Conference on Computer and Communications Security (CCS), pages 552-561, 2007.
-
(2007)
14th ACM Conference on Computer and Communications Security (CCS
, pp. 552-561
-
-
Shacham, H.1
-
21
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE Symposium on Security and Privacy (S&P), pages 380-395, 2010.
-
(2010)
IEEE Symposium on Security and Privacy (S&P
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
22
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
May
-
B. Yee, D. Sehr, G. Dardyk, B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In IEEE Symposium on Security and Privacy (S&P), May 2009.
-
(2009)
IEEE Symposium on Security and Privacy (S&P
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
24
-
-
84901619881
-
Strato: A retargetable framework for low-level inlined-reference monitors
-
B. Zeng, G. Tan, and Ú. Erlingsson. Strato: A retargetable framework for low-level inlined-reference monitors. In 22nd Usenix Security Symposium, pages 369-382, 2013.
-
(2013)
22nd Usenix Security Symposium
, pp. 369-382
-
-
Zeng, B.1
Tan, G.2
Erlingsson, U.3
-
25
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control flow integrity and randomization for binary executables. In IEEE Symposium on Security and Privacy (S&P), pages 559-573, 2013.
-
(2013)
IEEE Symposium on Security and Privacy (S&P
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|