-
4
-
-
33646767376
-
Control-flow integrity
-
ACM
-
Abadi, M., Budiu, M., Erlingsson, U., and Ligatti, J. Control-flow integrity. In ACM Conference on Computer and Communications Security (CCS) (2005), ACM, pp. 340-353.
-
(2005)
ACM Conference on Computer and Communications Security (CCS)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
5
-
-
78651539599
-
XFI: Software guards for system address spaces
-
Abadi, M., Budiu, M., Erlingsson, U., Necula, G. C., and Vrable, M. XFI: Software Guards for System Address Spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006).
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Necula, G.C.4
Vrable, M.5
-
6
-
-
50249149602
-
Preventing memory error exploits with wit
-
Akritidis, P., Cadar, C., Raiciu, C., Costa, M., and Castro, M. Preventing Memory Error Exploits with WIT. IEEE Symposium on Security and Privacy (2008).
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
7
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the Stack for Fun and Profit. Phrack Magazine 49, 14 (1996).
-
(1996)
Phrack Magazine
, vol.49
, pp. 14
-
-
One, A.1
-
8
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
USENIX Association
-
Bhatkar, S., Sekar, R., and DuVarney, D. C. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security Symposium (2005), USENIX Association.
-
(2005)
USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
9
-
-
84914132233
-
Hacking blind
-
Bittau, A., Belay, A., Mashtizadeh, A., Mazialres, D., and Boneh, D. Hacking Blind. In IEEE Symposium on Security and Privacy (2014).
-
(2014)
IEEE Symposium on Security and Privacy
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazialres, D.4
Boneh, D.5
-
10
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
Bletsch, T., Jiang, X., Freeh, V. W., and Liang, Z. Jump-oriented Programming: A New Class of Code-reuse Attack. In ACM Symposium on Information, Computer and Communications Security (ASIACCS) (2011).
-
(2011)
ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
11
-
-
26844531642
-
Basic integer overflows
-
blexim. Basic Integer Overflows. Phrack Magazine 60, 10 (2002).
-
(2002)
Phrack Magazine
, vol.60
, pp. 10
-
-
blexim1
-
12
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to risc
-
Buchanan, E., Roemer, R., Shacham, H., and Savage, S. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC. In ACM Conference on Computer and Communications Security (CCS) (2008).
-
(2008)
ACM Conference on Computer and Communications Security (CCS)
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
14
-
-
78650032454
-
Return-oriented programming without returns
-
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-R., Shacham, H., and Winandy, M. Return-oriented Programming Without Returns. In ACM Conference on Computer and Communications Security (CCS) (2010).
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
15
-
-
84910672622
-
ROPecker: A generic and practical approach for defending against rop attacks
-
Cheng, Y., Zhou, Z., Yu, M., Ding, X., and Deng, R. H. ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks. In Symposium on Network and Distributed System Security (NDSS) (2014).
-
(2014)
Symposium on Network and Distributed System Security (NDSS)
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R.H.5
-
16
-
-
84901629830
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
Davi, L., Dmitrienko, A., Egele, M., Fischer, T., Holz, T., Hund, R., Nürnberger, S., and Sadeghi, A.-R. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Symposium on Network and Distributed System Security (NDSS) (2012).
-
(2012)
Symposium on Network and Distributed System Security (NDSS)
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.-R.8
-
17
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
Davi, L., Lehmann, D., Sadeghi, A.-R., and Monrose, F. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium (2014).
-
(2014)
USENIX Security Symposium
-
-
Davi, L.1
Lehmann, D.2
Sadeghi, A.-R.3
Monrose, F.4
-
18
-
-
84877943121
-
Gadge me if you can: Secure and efficient ad-hoc instruction-level randomization for x86 and arm
-
ACM
-
Davi, L. V., Dmitrienko, A., Nürnberger, S., and Sadeghi, A.-R. Gadge me if you can: Secure and efficient ad-hoc instruction-level randomization for x86 and arm. In 8th ACM SIGSAC symposium on Information, computer and communications security (ACM ASIACCS 2013) (2013), ACM, pp. 299-310.
-
(2013)
8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ACM ASIACCS 2013)
, pp. 299-310
-
-
Davi, L.V.1
Dmitrienko, A.2
Nürnberger, S.3
Sadeghi, A.-R.4
-
20
-
-
34748842480
-
Advances in format string exploitation
-
gera. Advances in Format String Exploitation. Phrack Magazine 59, 12 (2002).
-
(2002)
Phrack Magazine
, vol.59
, pp. 12
-
-
gera1
-
21
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
USENIX Association
-
Giuffrida, C., Kuijsten, A., and Tanenbaum, A. S. Enhanced operating system security through efficient and fine-grained address space randomization. In Proceedings of the 21st USENIX conference on Security symposium (2012), USENIX Association, pp. 40-40.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 40-40
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
22
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
Goktas, E., Athanasopoulos, E., Bos, H., and Portokalidis, G. Out of control: Overcoming control-flow integrity. In IEEE Symposium on Security and Privacy (2014).
-
(2014)
IEEE Symposium on Security and Privacy
-
-
Goktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
23
-
-
84977858681
-
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
-
Göktas, E., Athanasopoulos, E., Polychronakis, M., Bos, H., and Portokalidis, G. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. In USENIX Security Symposium (2014).
-
(2014)
USENIX Security Symposium
-
-
Göktas, E.1
Athanasopoulos, E.2
Polychronakis, M.3
Bos, H.4
Portokalidis, G.5
-
24
-
-
84869381037
-
ILR: Where'd my gadgets go?
-
Hiser, J. D., Nguyen-Tuong, A., Co, M., Hall, M., and Davidson, J. W. ILR: Where'd My Gadgets Go? In IEEE Symposium on Security and Privacy (2012).
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Hiser, J.D.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
25
-
-
84893301083
-
-
100 of Advances in Information Security Springer
-
Jajodia, S., Ghosh, A. K., Subrahmanian, V. S., Swarup, V., Wang, C., and Wang, X. S., Eds. Moving Target Defense II-Application of Game Theory and Adversarial Modeling, vol. 100 of Advances in Information Security. Springer, 2013.
-
(2013)
Moving Target Defense II-Application of Game Theory and Adversarial Modeling
-
-
Jajodia, S.1
Ghosh, A.K.2
Subrahmanian, V.S.3
Swarup, V.4
Wang, C.5
Wang, X.S.6
-
26
-
-
39049113465
-
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
-
Kil, C., Jun, J., Bookholt, C., Xu, J., and Ning, P. Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software. In Annual Computer Security Applications Conference (ACSAC) (2006).
-
(2006)
Annual Computer Security Applications Conference (ACSAC)
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
31
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
Dec
-
Onarlioglu, K., Bilge, L., Lanzi, A., Balzarotti, D., and Kirda, E. G-Free: defeating return-oriented programming through gadget-less binaries. In ACSAC'10, Annual Computer Security Applications Conference (Dec. 2010).
-
(2010)
ACSAC'10, Annual Computer Security Applications Conference
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
34
-
-
84910650736
-
-
PaX Team. http://pax.grsecurity.net/.
-
-
-
-
36
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Mar
-
Roemer, R., Buchanan, E., Shacham, H., and Savage, S. Return-Oriented Programming: Systems, Languages, and Applications. ACM Transactions on Information and System Security 15, 1 (Mar. 2012).
-
(2012)
ACM Transactions on Information and System Security
, vol.15
, Issue.1
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
37
-
-
85072933898
-
Adapting software fault isolation to contemporary cpu architectures
-
Sehr, D., Muth, R., Biffle, C., Khimenko, V., Pasko, E., Schimpf, K., Yee, B., and Chen, B. Adapting Software Fault Isolation to Contemporary CPU Architectures. In USENIX Security Symposium (2010).
-
(2010)
USENIX Security Symposium
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
38
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86
-
Shacham, H. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In ACM Conference on Computer and Communications Security (CCS) (2007).
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
-
39
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Shacham, H., jin Goh, E., Modadugu, N., Pfaff, B., and Boneh, D. On the Effectiveness of Address-space Randomization. In ACM Conference on Computer and Communications Security (CCS) (2004).
-
(2004)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
Jin Goh, E.2
Modadugu, N.3
Pfaff, B.4
Boneh, D.5
-
40
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
Snow, K. Z., Monrose, F., Davi, L., Dmitrienko, A., Liebchen, C., and Sadeghi, A.-R. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. In IEEE Symposium on Security and Privacy (2013).
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
41
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
Snow, K. Z., Monrose, F., Davi, L., Dmitrienko, A., Liebchen, C., and Sadeghi, A.-R. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE Symposium on Security and Privacy (2013).
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
43
-
-
77952405499
-
ShadowWalker: Raising the bar for rootkit detection
-
Sparks, S., and Butler, J. ShadowWalker: Raising the Bar for Rootkit detection. In Black Hat Japan (2005).
-
(2005)
Black Hat Japan
-
-
Sparks, S.1
Butler, J.2
-
45
-
-
84857304973
-
On the expressiveness of return-into-libc attacks
-
Springer-Verlag
-
Tran, M., Etheridge, M., Bletsch, T., Jiang, X., Freeh, V., and Ning, P. On the expressiveness of return-into-libc attacks. In Proceedings of the 14th international conference on Recent Advances in Intrusion Detection (2011), Springer-Verlag.
-
(2011)
Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection
-
-
Tran, M.1
Etheridge, M.2
Bletsch, T.3
Jiang, X.4
Freeh, V.5
Ning, P.6
-
46
-
-
84867874938
-
Memory errors: The past, the present, and the future
-
Springer
-
Van der Veen, V., Cavallaro, L., Bos, H., et al. Memory errors: the past, the present, and the future. In Research in Attacks, Intrusions, and Defenses. Springer, 2012, pp. 86-106.
-
(2012)
Research in Attacks, Intrusions, and Defenses
, pp. 86-106
-
-
Van Der Veen, V.1
Cavallaro, L.2
Bos, H.3
-
47
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
Wartell, R., Mohan, V., Hamlen, K. W., and Lin, Z. Binary Stirring: Self-randomizing Instruction Addresses of Legacy x86 Binary Code. In ACM Conference on Computer and Communications Security (CCS) (2012).
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
48
-
-
68149145720
-
Address-space layout randomization using code islands
-
IOS Press
-
Xu, H., and Chapin, S. Address-space layout randomization using code islands. In Journal of Computer Security (2009), IOS Press, pp. 331-362.
-
(2009)
Journal of Computer Security
, pp. 331-362
-
-
Xu, H.1
Chapin, S.2
-
49
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
Yee, B., Sehr, D., Dardyk, G., Chen, J. B., Muth, R., Ormandy, T., Okasaka, S., Narula, N., and Fullagar, N. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. IEEE Symposium on Security and Privacy (2009).
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
50
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
Zhang, C., Wei, T., Chen, Z., Duan, L., Szekeres, L., McCamant, S., Song, D., and Zou, W. Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (2013).
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|