-
1
-
-
33646767376
-
Control-flow integrity
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow integrity. In Computer and Communications Security (CCS) (2005).
-
(2005)
Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
50249149602
-
Preventing memory error exploits withwit
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., AND CASTRO, M. Preventing Memory Error Exploits withWIT. In Security and Privacy (2008).
-
(2008)
Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
70349705152
-
Data space randomization
-
BHATKAR, S., AND SEKAR, R. Data space randomization. In DIMVA (2008).
-
(2008)
DIMVA
-
-
Bhatkar, S.1
Sekar, R.2
-
5
-
-
0003291909
-
Differential fault analysis of secret key cryptosystems
-
BIHAM, E., AND SHAMIR, A. Differential fault analysis of secret key cryptosystems. In CRYPTO (1997).
-
(1997)
CRYPTO
-
-
Biham, E.1
Shamir, A.2
-
6
-
-
84910652137
-
Hacking blind
-
BITTAU, A., BELAY, A., MASHTIZADEH, A., MAZIERES, D., AND BONEH, D. Hacking blind. In Security and Privacy (2014).
-
(2014)
Security and Privacy
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazieres, D.4
Boneh, D.5
-
7
-
-
84910613790
-
Leaking addresses with vulnerabilities that can't read good
-
BLAZAKIS, D. Leaking addresses with vulnerabilities that can't read good. SummerCon '13. http://www.trapbit.com/talks/Summerc0n2013-GCWoah.pdf.
-
SummerCon '13
-
-
Blazakis, D.1
-
8
-
-
77955204687
-
Cache-collision timing attacks against AES
-
BONNEAU, J., AND MIRONOV, I. Cache-collision timing attacks against AES. In CHES (2006).
-
(2006)
CHES
-
-
Bonneau, J.1
Mironov, I.2
-
9
-
-
84892848299
-
Remote timing attacks are still practical
-
BRUMLEY, B. B., AND TUVERI, N. Remote timing attacks are still practical. In ESORICS (2011).
-
(2011)
ESORICS
-
-
Brumley, B.B.1
Tuveri, N.2
-
11
-
-
78650032454
-
Return-oriented programming without returns
-
CHECKOWAY, S., DAVI, L., DMITRIENKO, A., SADEGHI, A.-R., SHACHAM, H., AND WINANDY, M. Return-oriented programming without returns. In CCS (2010).
-
(2010)
CCS
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
12
-
-
60349110770
-
Opportunities and limits of remote timing attacks
-
Jan
-
CROSBY, S. A., WALLACH, D. S., AND RIEDI, R. H. Opportunities and limits of remote timing attacks. ACM Transactions on Information and System Security 12, 3 (Jan. 2009), 17:1-17:29.
-
(2009)
ACM Transactions on Information and System Security 12
, vol.3
, pp. 171-1729
-
-
Crosby, S.A.1
Wallach, D.S.2
Riedi, R.H.3
-
13
-
-
84875113626
-
-
7771 of Lecture Notes in Computer Science
-
DURVAUX, F., RENAULD, M., STANDAERT, F.-X., VAN OLDENEEL TOT OLDENZEEL, L., AND VEYRAT-CHARVILLON, N. Efficient removal of random delays from embedded software implementations using hidden markov models. vol. 7771 of Lecture Notes in Computer Science. 2013, pp. 123-140.
-
(2013)
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models
, pp. 123-140
-
-
Durvaux, F.1
Renauld, M.2
Standaert, F.-X.3
Van Oldeneel Tot Oldenzeel, L.4
Veyrat-Charvillon, N.5
-
16
-
-
84876901222
-
Profile-guided automated software diversity
-
FRANZ, M., BRUNTHALER, S., LARSEN, P., HOMESCU, A., AND NEISIUS, S. Profile-guided automated software diversity. In the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (2013).
-
(2013)
The 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)
-
-
Franz, M.1
Brunthaler, S.2
Larsen, P.3
Homescu, A.4
Neisius, S.5
-
18
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
GIUFFRIDA, C., KUIJSTEN, A., AND TANENBAUM, A. S. Enhanced operating system security through efficient and fine-grained address space randomization. In the 21st USENIX Security Symposium (2012).
-
(2012)
The 21st USENIX Security Symposium
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
19
-
-
84869381037
-
ILR: Where'd my gadgets go?
-
HISER, J., NGUYEN-TUONG, A., CO, M., HALL, M., AND DAVIDSON, J. W. ILR: Where'd my gadgets go? In Security and Privacy (2012).
-
(2012)
Security and Privacy
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
20
-
-
35048850492
-
Fault analysis of stream ciphers
-
Springer
-
HOCH, J. J., AND SHAMIR, A. Fault analysis of stream ciphers. In CHES (2004), Springer, pp. 240-253.
-
(2004)
CHES
, pp. 240-253
-
-
Hoch, J.J.1
Shamir, A.2
-
21
-
-
84889076199
-
Librando: Transparent code randomization for just-in-time compilers
-
HOMESCU, A., BRUNTHALER, S., LARSEN, P., AND FRANZ, M. librando: Transparent code randomization for just-in-time compilers. In CCS (2013).
-
(2013)
CCS
-
-
Homescu, A.1
Brunthaler, S.2
Larsen, P.3
Franz, M.4
-
22
-
-
84881238589
-
Practical timing side channel attacks against kernel space aslr
-
HUND, R., WILLEMS, C., AND HOLZ, T. Practical timing side channel attacks against kernel space aslr. In Security and Privacy (2013).
-
(2013)
Security and Privacy
-
-
Hund, R.1
Willems, C.2
Holz, T.3
-
23
-
-
84910617265
-
Diversifying the software stack using randomized nop insertion
-
JACKSON, T., HOMESCU, A., CRANE, S., LARSEN, P., BRUNTHALER, S., AND FRANZ, M. Diversifying the software stack using randomized nop insertion. Moving Target Defense II: Application of Game Theory and Adversarial Modeling 100 (2013), 151-174.
-
(2013)
Moving Target Defense II: Application of Game Theory and Adversarial Modeling
, vol.100
, pp. 151-174
-
-
Jackson, T.1
Homescu, A.2
Crane, S.3
Larsen, P.4
Brunthaler, S.5
Franz, M.6
-
24
-
-
51349125128
-
On second-order differential power analysis
-
JOYE, M., PAILLIER, P., AND SCHOENMAKERS, B. On second-order differential power analysis. In CHES (2005).
-
(2005)
CHES
-
-
Joye, M.1
Paillier, P.2
Schoenmakers, B.3
-
25
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
KC, G. S., KEROMYTIS, A. D., AND PREVELAKIS, V. Countering code-injection attacks with instruction-set randomization. In CCS (2003).
-
(2003)
CCS
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
26
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
KIL, C., JUN, J., BOOKHOLT, C., XU, J., AND NING, P. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. In ACSAC (2006).
-
(2006)
ACSAC
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
27
-
-
0001297528
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
KOCHER, P. C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In CRYPTO (1996).
-
(1996)
CRYPTO
-
-
Kocher, P.C.1
-
29
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
ONARLIOGLU, K., BILGE, L., LANZI, A., BALZAROTTI, D., AND KIRDA, E. G-free: Defeating return-oriented programming through gadget-less binaries. In ACSAC'10 (2010).
-
(2010)
ACSAC'10
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
30
-
-
84910634271
-
Side-channel attacks on the Yubikey 2 one-time password generator
-
OSWALD, D., RICHTER, B., AND PAAR, C. Side-channel attacks on the Yubikey 2 one-time password generator. In Research in Attacks, Intrusions, and Defenses (RAID). 2013.
-
(2013)
Research in Attacks, Intrusions, and Defenses (RAID
-
-
Oswald, D.1
Richter, B.2
Paar, C.3
-
31
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
PAPPAS, V., POLYCHRONAKIS, M., AND KEROMYTIS, A. D. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Security and Privacy (2012).
-
(2012)
Security and Privacy
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
32
-
-
66049085129
-
Statistical analysis of second order differential power analysis
-
PROUFF, E., RIVAIN, M., AND BÉVAN, R. Statistical analysis of second order differential power analysis. IEEE Transactions on Computers 58, 6 (2009), 799-811.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.6
, pp. 799-811
-
-
Prouff, E.1
Rivain, M.2
Bévan, R.3
-
33
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the ×86)
-
SHACHAM, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the ×86). In CCS (2007).
-
(2007)
CCS
-
-
Shacham, H.1
-
34
-
-
14844328033
-
On the effectiveness of address-space randomization
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-J., MODADUGU, N., AND BONEH, D. On the effectiveness of address-space randomization. In CCS (2004).
-
(2004)
CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
35
-
-
84945216591
-
Systematic analysis of defenses against return-oriented programming
-
SKOWYRA, R., CASTEEL, K., OKHRAVI, H., ZELDOVICH, N., AND STREILEIN,W. Systematic analysis of defenses against return-oriented programming. In RAID. 2013.
-
(2013)
RAID
-
-
Skowyra, R.1
Casteel, K.2
Okhravi, H.3
Zeldovich, N.4
Streilein, W.5
-
36
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
SNOW, K. Z., MONROSE, F., DAVI, L., DMITRIENKO, A., LIEBCHEN, C., AND SADEGHI, A.-R. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In Security and Privacy (2013).
-
(2013)
Security and Privacy
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
38
-
-
70349100695
-
Breaking the memory secrecy assumption
-
STRACKX, R., YOUNAN, Y., PHILIPPAERTS, P., PIESSENS, F., LACHMUND, S., AND WALTER, T. Breaking the memory secrecy assumption. In EUROSEC (2009).
-
(2009)
EUROSEC
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
39
-
-
84881235941
-
Sok: Eternal war in memory
-
SZEKERES, L., PAYER, M., WEI, T., AND SONG, D. Sok: Eternal war in memory. In Security and Privacy (2013).
-
(2013)
Security and Privacy
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
41
-
-
74349098073
-
Efficient cache attacks on AES, and countermeasures
-
Jan
-
TROMER, E., OSVIK, D. A., AND SHAMIR, A. Efficient cache attacks on AES, and countermeasures. Journal of Cryptology 23, 2 (Jan. 2010), 37-71.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 37-71
-
-
Tromer, E.1
Osvik, D.A.2
Shamir, A.3
-
42
-
-
70349867776
-
Acoustic cryptanalysis: On nosy people and noisy machines
-
TROMER, E., AND SHAMIR, A. Acoustic cryptanalysis: on nosy people and noisy machines. In Eurocrypt Rump Session (2004).
-
(2004)
Eurocrypt Rump Session
-
-
Tromer, E.1
Shamir, A.2
-
45
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
WARTELL, R., MOHAN, V., HAMLEN, K. W., AND LIN, Z. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. In CCS (2012).
-
(2012)
CCS
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
46
-
-
84869859962
-
Cross-vm side channels and their use to extract private keys
-
ZHANG, Y., JUELS, A., REITER, M. K., AND RISTENPART, T. Cross-vm side channels and their use to extract private keys. In CCS (2012).
-
(2012)
CCS
-
-
Zhang, Y.1
Juels, A.2
Reiter, M.K.3
Ristenpart, T.4
|