-
2
-
-
84860095094
-
Once upon a free()
-
anonymous
-
anonymous. Once upon a free(). Phrack, 57, 2001.
-
(2001)
Phrack
, vol.57
-
-
-
3
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
Orlando, Florida, U.S.A., June ACM
-
T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient detection of all pointer and array access errors. In Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation, pages 290-301, Orlando, Florida, U.S.A., June 1994. ACM.
-
(1994)
Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
4
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
San Diego, California, U.S.A., June USENIX Association
-
A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing attacks. In USENIX 2000 Annual Technical Conference Proceedings, pages 251-262, San Diego, California, U.S.A., June 2000. USENIX Association.
-
(2000)
USENIX 2000 Annual Technical Conference Proceedings
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
5
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, District of Columbia, U.S.A., Oct. ACM
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanović, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003), pages 281-289, Washington, District of Columbia, U.S.A., Oct. 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanović, D.5
Zovi, D.D.6
-
6
-
-
85117731645
-
-
May
-
BBP. BSD heap smashing. http://www.security-protocols.com/modules.php? name=News&file=article&si%d=1586, May 2003.
-
(2003)
BSD Heap Smashing
-
-
-
7
-
-
26844531642
-
Basic integer overflows
-
blexim. Dec
-
blexim. Basic integer overflows. Phrack, 60, Dec. 2002.
-
(2002)
Phrack
, vol.60
-
-
-
9
-
-
38049018397
-
-
Feb
-
B. Bray. Compiler security checks in depth. http://msdn.microsoft.com/library/en-us/dv\_vstechart/html/vctchCompile% rSecurityChecksInDepth.asp, Feb. 2002.
-
(2002)
Compiler Security Checks in Depth
-
-
Bray, B.1
-
10
-
-
17644393012
-
Bypassing stackguard and stackshield
-
Kil3r
-
Bulba and Kil3r. Bypassing Stackguard and stackshield. Phrack, 56, 2000.
-
(2000)
Phrack
, vol.56
-
-
Bulba1
-
11
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
Phoenix, Arizona, USA, Apr. IEEE Computer Society, IEEE Press
-
T. Chiueh and F.-H. Hsu. RAD: A compile-time solution to buffer overflow attacks. In Proceedings of the 21st International Conference on Distributed Computing Systems, pages 409-420, Phoenix, Arizona, USA, Apr. 2001. IEEE Computer Society, IEEE Press.
-
(2001)
Proceedings of the 21st International Conference on Distributed Computing Systems
, pp. 409-420
-
-
Chiueh, T.1
Hsu, F.-H.2
-
12
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, District of Columbia, U.S.A., Aug. USENIX Association
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, pages 91-104, Washington, District of Columbia, U.S.A., Aug. 2003. USENIX Association.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
13
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, U.S.A., Jan. USENIX Association
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, pages 63-78, San Antonio, Texas, U.S.A., Jan. 1998. USENIX Association.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
15
-
-
14944385012
-
Protecting from stack-smashing attacks
-
IBM Research Divison, Tokyo Research Laboratory, June
-
H. Etoh and K. Yoda. Protecting from stack-smashing attacks. Technical report, IBM Research Divison, Tokyo Research Laboratory, June 2000.
-
(2000)
Technical Report
-
-
Etoh, H.1
Yoda, K.2
-
16
-
-
85084163372
-
Stackghost: Hardware facilitated stack protection
-
Washington, District of Columbia, U.S.A., Aug. USENIX Association
-
M. Frantzen and M. Shuey. StackGhost: Hardware facilitated stack protection. In Proceedings of the 10th USENIX Security Symposium, pages 55-66, Washington, District of Columbia, U.S.A., Aug. 2001. USENIX Association.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 55-66
-
-
Frantzen, M.1
Shuey, M.2
-
19
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Monterey, California, U.S.A., June USENIX Association
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference, pages 275-288, Monterey, California, U.S.A., June 2002. USENIX Association.
-
(2002)
USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
20
-
-
12544250338
-
Backwards-compatible bounds checking for arrays and pointers in C programs
-
Linköping, Sweden, Linköping University Electronic Press
-
R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automatic Debugging, number 009-02 in Linköping Electronic Articles in Computer and Information Science, pages 13-26, Linköping, Sweden, 1997. Linköping University Electronic Press.
-
(1997)
Proceedings of the 3rd International Workshop on Automatic Debugging, Number 009-02 in Linköping Electronic Articles in Computer and Information Science
, pp. 13-26
-
-
Jones, R.W.M.1
Kelly, P.H.J.2
-
21
-
-
0004301215
-
-
JTC 1/SC 22/WG 14. ISO/IEC 9899:1999: Technical report, International Organization for Standards
-
JTC 1/SC 22/WG 14. ISO/IEC 9899:1999: Programming languages - C. Technical report, International Organization for Standards, 1999.
-
(1999)
Programming Languages - C
-
-
-
22
-
-
84874468457
-
Vudo - An object superstitiously believed to embody magical powers
-
M. Kaempf. Vudo - an object superstitiously believed to embody magical powers. Phrack, 57, 2001.
-
(2001)
Phrack
, vol.57
-
-
Kaempf, M.1
-
23
-
-
3042716872
-
-
Technical Report ESD-TR-74-193, HQ Electronic Systems Division, Hanscom Air Force Base, Massachusetts, U.S.A., June
-
P. A. Karger and R. R. Schell. Multics security evaluation: Vulnerability analysis. Technical Report ESD-TR-74-193, HQ Electronic Systems Division, Hanscom Air Force Base, Massachusetts, U.S.A., June 1974.
-
(1974)
Multics Security Evaluation: Vulnerability Analysis
-
-
Karger, P.A.1
Schell, R.R.2
-
24
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Washington, District of Columbia, U.S.A., Oct. ACM
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003), pages 272-280, Washington, District of Columbia, U.S.A., Oct. 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003)
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
25
-
-
17644371841
-
BCC: Runtime checking for C programs
-
Toronto, Ontario, Canada, July USENIX Association
-
S. C. Kendall. Bcc: Runtime checking for C programs. In Proceedings of the USENIX Summer 1983 Conference, pages 5-16, Toronto, Ontario, Canada, July 1983. USENIX Association.
-
(1983)
Proceedings of the USENIX Summer 1983 Conference
, pp. 5-16
-
-
Kendall, S.C.1
-
26
-
-
3042541202
-
The frame pointer overwrite
-
klog
-
klog. The frame pointer overwrite. Phrack, 55, 1999.
-
(1999)
Phrack
, vol.55
-
-
-
28
-
-
3042669120
-
Righting software
-
May/June
-
J. R. Larus, T. Ball, M. Das, R. DeLine, M. Fähndrich, J. Pincus, S. K. Rajamani, and R. Venkatapathy. Righting software. IEEE Software, 21(3):92-100, May/June 2004.
-
(2004)
IEEE Software
, vol.21
, Issue.3
, pp. 92-100
-
-
Larus, J.R.1
Ball, T.2
Das, M.3
DeLine, R.4
Fähndrich, M.5
Pincus, J.6
Rajamani, S.K.7
Venkatapathy, R.8
-
31
-
-
85084161451
-
Type-assisted dynamic buffer overflow detection
-
San Francisco, California, U.S.A., Aug. USENIX Association
-
K.-S. Lhee and S. J. Chapin. Type-assisted dynamic buffer overflow detection. In Proceedings of the 11th USENIX Security Symposium, pages 81-90, San Francisco, California, U.S.A., Aug. 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 81-90
-
-
Lhee, K.-S.1
Chapin, S.J.2
-
34
-
-
0036040304
-
Ccured: Type-safe retrofitting of legacy code
-
Portland, Oregon, U.S.A., Jan. ACM
-
G. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In Conference Record of POPL 2002: The 29th SIGPLANSIGACT Symposium on Principles of Programming Languages, pages 128-139, Portland, Oregon, U.S.A., Jan. 2002. ACM.
-
(2002)
Conference Record of POPL 2002: The 29th SIGPLANSIGACT Symposium on Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.1
McPeak, S.2
Weimer, W.3
-
35
-
-
35248827742
-
Fail-safe ANSI-C compiler: An approach to making C programs secure: Progress report
-
Tokyo, Japan, Nov
-
Y. Oiwa, T. Sekiguchi, E. Sumii, and A. Yonezawa. Fail-safe ANSI-C compiler: An approach to making C programs secure: Progress report. In Proceedings of International Symposium on Software Security 2002, pages 133-153, Tokyo, Japan, Nov. 2002.
-
(2002)
Proceedings of International Symposium on Software Security 2002
, pp. 133-153
-
-
Oiwa, Y.1
Sekiguchi, T.2
Sumii, E.3
Yonezawa, A.4
-
37
-
-
0038524496
-
Smashing C++ VPtrs
-
rix
-
rix. Smashing C++ VPTRs. Phrack, 56, 2000.
-
(2000)
Phrack
, vol.56
-
-
-
38
-
-
85094678188
-
Run-time detection of heap-based overflows
-
San Diego, California, U.S.A., Oct. USENIX Association
-
W. Robertson, C. Kruegel, D. Mutz, and F. Valeur. Run-time detection of heap-based overflows. In Proceedings of the 17th Large Installation Systems Administrators Conference, pages 51-60, San Diego, California, U.S.A., Oct. 2003. USENIX Association.
-
(2003)
Proceedings of the 17th Large Installation Systems Administrators Conference
, pp. 51-60
-
-
Robertson, W.1
Kruegel, C.2
Mutz, D.3
Valeur, F.4
-
40
-
-
84948970972
-
Repaired security bugs in multics
-
number MIT/LCS/TM-87, Cambridge, Massachusetts, U.S.A., June Massachusetts Institute of Technology
-
J. H. Saltzer. Repaired security bugs in multics. In Ancillary Reports: Kernel Design Project, number MIT/LCS/TM-87, pages 1-4, Cambridge, Massachusetts, U.S.A., June 1977. Massachusetts Institute of Technology.
-
(1977)
Ancillary Reports: Kernel Design Project
, pp. 1-4
-
-
Saltzer, J.H.1
-
43
-
-
85117700430
-
Getting around non-executable stack (and fix)
-
mailinglist Aug
-
Solar Designer. Getting around non-executable stack (and fix). Posted on the Bugtraq mailinglist http://www.securityfocus.com/archive/1/7480, Aug. 1997.
-
(1997)
Posted on the Bugtraq
-
-
-
45
-
-
0026845567
-
Adding run-time checking to the portable C compiler
-
Apr. ISSN
-
J. L. Steffen. Adding run-time checking to the portable C compiler. Software: Practice and Experience, 22(4):305-316, Apr. 1992. ISSN: 0038-0644.
-
(1992)
Software: Practice and Experience
, vol.22
, Issue.4
, pp. 305-316
-
-
Steffen, J.L.1
-
48
-
-
21844444349
-
Defeating solar designer non-executable stack patch
-
Jan
-
R. Wojtczuk. Defeating solar designer non-executable stack patch. Posted on the Bugtraq mailinglist http://www.securityfocus.com/archive/1/8470, Jan. 1998.
-
(1998)
Posted on the Bugtraq Mailinglist
-
-
Wojtczuk, R.1
-
49
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy, Oct. IEEE Computer Society, IEEE Press
-
J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. In 22nd International Symposium on Reliable Distributed Systems (SRDS'03), pages 260-269, Florence, Italy, Oct. 2003. IEEE Computer Society, IEEE Press.
-
(2003)
22nd International Symposium on Reliable Distributed Systems (SRDS'03)
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
52
-
-
38849147719
-
Code injection in C and C++: A survey of vulnerabilities and countermeasures
-
Departement Computerwetenschappen, Katholieke Universiteit Leuven, July
-
Y. Younan, W. Joosen, and F. Piessens. Code injection in C and C++: A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July 2004.
-
(2004)
Technical Report CW386
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
|