-
1
-
-
84910627299
-
-
Google V8 vulnerabilities. http://www.cvedetails.com/product/17734/Google-V8.html?vendor-id=1224.
-
Google V8 Vulnerabilities
-
-
-
2
-
-
84871337216
-
-
Itanium c++ abi. http://mentorembedded.github.io/cxx-abi/abi.html.
-
Itanium C++ Abi
-
-
-
3
-
-
33646767376
-
Control-flow integrity
-
ABADI, M., BUDIU, M., ERLINGSSON, Ú., AND LIGATTI, J. Control-Flow Integrity. In 12th ACM Conference on Computer and Communications Security (CCS) (2005), pp. 340-353.
-
(2005)
12th ACM Conference on Computer and Communications Security (CCS)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
50249149602
-
Preventing memory error exploits with WIT
-
May
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., AND CASTRO, M. Preventing Memory Error Exploits with WIT. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (May 2008), pp. 263-277.
-
(2008)
Security and Privacy, 2008. SP 2008 IEEE Symposium on
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
5
-
-
84910684630
-
-
Personal communication March
-
ANSEL, J. Personal communication, March 2014.
-
(2014)
-
-
Ansel, J.1
-
6
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
ANSEL, J., MARCHENKO, P., ERLINGSSON, Ú., TAYLOR, E., CHEN, B., SCHUFF, D., SEHR, D., BIFFLE, C., AND YEE, B. Language-Independent Sandboxing of Just-In-Time Compilation and Self-Modifying Code. In ACM Conference on Programming Language Design and Implementation (PLDI) (2011), pp. 355-366.
-
(2011)
ACM Conference on Programming Language Design and Implementation (PLDI)
, pp. 355-366
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson Ú.3
Taylor, E.4
Chen, B.5
Schuff, D.6
Sehr, D.7
Biffle, C.8
Yee, B.9
-
10
-
-
79960876719
-
JITDefender: A defense against jit spraying attacks
-
CHEN, P., FANG, Y., MAO, B., AND XIE, L. JITDefender: A Defense against JIT Spraying Attacks. In 26th IFIP International Information Security Conference (2011), vol. 354, pp. 142-153.
-
(2011)
26th IFIP International Information Security Conference
, vol.354
, pp. 142-153
-
-
Chen, P.1
Fang, Y.2
Mao, B.3
Xie, L.4
-
11
-
-
84890631913
-
JITSafe: A framework against just-in-time spraying attacks
-
December
-
CHEN, P., WU, R., AND MAO, B. JITSafe: A Framework Against Just-In-Time Spraying Attacks. Information Security, IET 7, 4 (December 2013), 283-292.
-
(2013)
Information Security, IET
, vol.7
, Issue.4
, pp. 283-292
-
-
Chen, P.1
Wu, R.2
Mao, B.3
-
12
-
-
84901629830
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
DAVI, L., DMITRIENKO, R., EGELE, M., FISCHER, T., HOLZ, T., HUND, R., NURNBERGER, S., AND SADEGHI, A. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Network and Distributed System Security Symposium (NDSS) (2012).
-
(2012)
Network and Distributed System Security Symposium (NDSS)
-
-
Davi, L.1
Dmitrienko, R.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nurnberger, S.7
Sadeghi, A.8
-
13
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
Aug USENIX Association
-
DAVI, L., LEHMANN, D., SADEGHI, A., AND MONROSE, F. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium (USENIX Security 14) (Aug. 2014), USENIX Association.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
-
-
Davi, L.1
Lehmann, D.2
Sadeghi, A.3
Monrose, F.4
-
14
-
-
84948958710
-
Optimization of object-oriented programs using static class hierarchy analysis
-
DEAN, J., GROVE, D., AND CHAMBERS, C. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis. In Proceedings of the 9th European Conference on Object-Oriented Programming (1995), ECOOP '95, pp. 77-101.
-
Proceedings of the 9th European Conference on Object-Oriented Programming 1995), ECOOP '95
, pp. 77-101
-
-
Dean, J.1
Grove, D.2
Chambers, C.3
-
15
-
-
0021199937
-
Efficient implementation of the smalltalk-80 system
-
ACM
-
DEUTSCH, L. P., AND SCHIFFMAN, A. M. Efficient Implementation of the Smalltalk-80 System. In Proceedings of the 11th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages (1984), POPL '84, ACM, pp. 297-302.
-
Proceedings of the 11th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages 1984), POPL '84
, pp. 297-302
-
-
Deutsch, L.P.1
Schiffman, A.M.2
-
16
-
-
78651539599
-
XFI: Software guards for system address spaces
-
ERLINGSSON, Ú., ABADI, M., VRABLE, M., BUDIU, M., AND NECULA, G. XFI: Software Guards for System Address Spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006), pp. 75-88.
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
17
-
-
84945709825
-
Trie memory
-
Sept
-
FREDKIN, E. Trie Memory. Communications of ACM 3, 9 (Sept. 1960), 490-499.
-
(1960)
Communications of ACM
, vol.3
, Issue.9
, pp. 490-499
-
-
Fredkin, E.1
-
18
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
May
-
GOKTAS, E., ATHANASOPOULOS, E., BOS, H., AND PORTOKALIDIS, G. Out Of Control: Overcoming Control-Flow Integrity. In Security and Privacy (SP), 2014 IEEE Symposium on (May 2014).
-
(2014)
Security and Privacy (SP), 2014 IEEE Symposium on
-
-
Goktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
19
-
-
85006805669
-
Optimizing dynamically-typed object-oriented languages with polymorphic inline caches
-
P. America, Ed., 512 of Lecture Notes in Computer Science Springer Berlin Heidelberg
-
HÖLZLE, U., CHAMBERS, C., AND UNGAR, D. Optimizing Dynamically-Typed Object-Oriented Languages with Polymorphic Inline Caches. In ECOOP'91 European Conference on Object-Oriented Programming, P. America, Ed., vol. 512 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1991, pp. 21-38.
-
(1991)
ECOOP'91 European Conference on Object-Oriented Programming
, pp. 21-38
-
-
Hölzle, U.1
Chambers, C.2
Ungar, D.3
-
20
-
-
0026993865
-
Debugging optimized code with dynamic deoptimization
-
ACM
-
HÖLZLE, U., CHAMBERS, C., AND UNGAR, D. Debugging Optimized Code with Dynamic Deoptimization. In Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation (1992), PLDI '92, ACM, pp. 32-43.
-
Proceedings of the ACM SIGPLAN 1992 Conference on Programming Language Design and Implementation 1992), PLDI '92
, pp. 32-43
-
-
Hölzle, U.1
Chambers, C.2
Ungar, D.3
-
21
-
-
84889076199
-
Librando: Transparent code randomization for just-in-time compilers
-
ACM
-
HOMESCU, A., BRUNTHALER, S., LARSEN, P., AND FRANZ, M. Librando: Transparent Code Randomization for Just-In-Time Compilers. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security (2013), CCS '13, ACM, pp. 993-1004.
-
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security 2013), CCS '13
, pp. 993-1004
-
-
Homescu, A.1
Brunthaler, S.2
Larsen, P.3
Franz, M.4
-
22
-
-
84937897579
-
SafeDispatch: Securing c++ virtual calls from memory corruption attacks
-
The Internet Society
-
JANG, D., TATLOCK, Z., AND LERNER, S. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. In 20th Annual Network and Distributed System Security Symposium (2014), NDSS '14, The Internet Society.
-
20th Annual Network and Distributed System Security Symposium 2014), NDSS '14
-
-
Jang, D.1
Tatlock, Z.2
Lerner, S.3
-
24
-
-
84863454556
-
RockSalt: Better, faster, stronger sfi for the x86
-
ACM
-
MORRISETT, G., TAN, G., TASSAROTTI, J., TRISTAN, J., AND GAN, E. RockSalt: Better, Faster, Stronger SFI for the x86. In Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (2012), PLDI '12, ACM, pp. 395-404.
-
Proceedings of the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation 2012), PLDI '12
, pp. 395-404
-
-
Morrisett, G.1
Tan, G.2
Tassarotti, J.3
Tristan, J.4
Gan, E.5
-
25
-
-
84889065012
-
Monitor integrity protection with space efficiency and separate compilation
-
ACM
-
NIU, B., AND TAN, G. Monitor Integrity Protection with Space Efficiency and Separate Compilation. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (2013), CCS '13, ACM, pp. 199-210.
-
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security 2013, CCS '13
, pp. 199-210
-
-
Niu, B.1
Tan, G.2
-
26
-
-
84901593819
-
Modular control-flow integrity
-
ACM
-
NIU, B., AND TAN, G. Modular Control-Flow Integrity. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (2014), PLDI '14, ACM, pp. 577-587.
-
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation 2014, PLDI '14
, pp. 577-587
-
-
Niu, B.1
Tan, G.2
-
29
-
-
85072933898
-
Adapting software fault isolation to contemporary cpu architectures
-
SEHR, D., MUTH, R., BIFFLE, C., KHIMENKO, V., PASKO, E., SCHIMPF, K., YEE, B., AND CHEN, B. Adapting Software Fault Isolation to Contemporary CPU Architectures. In 19th Usenix Security Symposium (2010), pp. 1-12.
-
(2010)
19th Usenix Security Symposium
, pp. 1-12
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
31
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in gcc & llvm
-
Aug USENIX Association
-
TICE, C., ROEDER, T., COLLINGBOURNE, P., CHECKOWAY, S., ERLINGSSON, Ú., LOZANO, L., AND PIKE, G. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In 23rd USENIX Security Symposium (USENIX Security 14) (Aug. 2014), USENIX Association.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson Ú.5
Lozano, L.6
Pike, G.7
-
32
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. Efficient Software-based Fault Isolation. In Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles (1993), SOSP '93, ACM, pp. 203-216.
-
Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles 1993, SOSP '93
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
33
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
May
-
WANG, Z., AND JIANG, X. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In Security and Privacy (SP), 2010 IEEE Symposium on (May 2010), pp. 380-395.
-
(2010)
Security and Privacy (Sp), 2010 IEEE Symposium on
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
34
-
-
79957820877
-
INSeRT: Protect dynamic code generation against spraying
-
March
-
WEI, T., WANG, T., DUAN, L., AND LUO, J. INSeRT: Protect Dynamic Code Generation against Spraying. In Information Science and Technology (ICIST), 2011 International Conference on (March 2011), pp. 323-328.
-
(2011)
Information Science and Technology (ICIST), 2011 International Conference on
, pp. 323-328
-
-
Wei, T.1
Wang, T.2
Duan, L.3
Luo, J.4
-
35
-
-
84869467444
-
RIM: A method to defend from jit spraying attack
-
Aug
-
WU, R., CHEN, P., MAO, B., AND XIE, L. RIM: A Method to Defend from JIT Spraying Attack. In Availability, Reliability and Security (ARES), 2012 Seventh International Conference on (Aug 2012), pp. 143-148.
-
(2012)
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
, pp. 143-148
-
-
Wu, R.1
Chen, P.2
Mao, B.3
Xie, L.4
-
36
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
May
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. In Security and Privacy, 2009 IEEE Symposium on (May 2009), pp. 79-93.
-
(2009)
Security and Privacy, 2009 IEEE Symposium on
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
37
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
May
-
ZHANG, C., WEI, T., CHEN, Z., DUAN, L., SZEKERES, L., MCCAMANT, S., SONG, D., AND ZOU, W. Practical Control Flow Integrity and Randomization for Binary Executables. In Security and Privacy (SP), 2013 IEEE Symposium on (May 2013), pp. 559-573.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
38
-
-
85041451135
-
Control flow integrity for cots binaries
-
USENIX Association
-
ZHANG, M., AND SEKAR, R. Control Flow Integrity for COTS Binaries. In Proceedings of the 22Nd USENIX Conference on Security (2013), SEC'13, USENIX Association, pp. 337-352.
-
Proceedings of the 22Nd USENIX Conference on Security 2013, SEC'13
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
|