-
1
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, H. Hintongif, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. of the 7th USENIX Security Symposium, Jan 1998, pp. 63-78.
-
(1998)
Proc. of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintongif, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
4
-
-
7244258833
-
New chips stop buffer overflow attacks
-
L. D. Paulson, "New chips stop buffer overflow attacks," Computer, vol. 37, no. 10, pp. 28-30, 2004.
-
(2004)
Computer
, vol.37
, Issue.10
, pp. 28-30
-
-
Paulson, L.D.1
-
6
-
-
84889014187
-
-
A. 'pi3' Zabrocki, November, [Online]
-
A. 'pi3' Zabrocki, "Scraps of notes on remote stack overflow exploitation," November 2010. [Online]. Available: http://www.phrack.org/issues.html?issue=67&id=13#article
-
(2010)
Scraps of Notes on Remote Stack Overflow Exploitation
-
-
-
7
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
Washington, DC, USA, IEEE Computer Society, [Online]
-
G. F. Roglia, L. Martignoni, R. Paleari, and D. Bruschi, "Surgically returning to randomized lib(c)," in Proceedings of the 2009 Annual Computer Security Applications Conference, ser. ACSAC '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 60-69. [Online]. Available: http://dx.doi.org/10.1109/ACSAC.2009.16
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, Ser. ACSAC '09
, pp. 60-69
-
-
Roglia, G.F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
8
-
-
70350655246
-
On the effectiveness of software diversity: A systematic study on real-world vulnerabilities
-
Berlin, Heidelberg: Springer-Verlag, [Online]
-
J. Han, D. Gao, and R. H. Deng, "On the effectiveness of software diversity: A systematic study on real-world vulnerabilities," in Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, ser. DIMVA '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 127-146. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-02918-98
-
(2009)
Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Ser. DIMVA '09
, pp. 127-146
-
-
Han, J.1
Gao, D.2
Deng, R.H.3
-
9
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
Nergal
-
Nergal, "The advanced return-into-lib(c) exploits: PaX case study," Phrack, no. 58, 2001.
-
(2001)
Phrack
, Issue.58
-
-
-
10
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Mar., [Online]
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage, "Return-oriented programming: Systems, languages, and applications," ACM Trans. Inf. Syst. Secur., vol. 15, no. 1, pp. 2:1-2:34, Mar. 2012. [Online]. Available: http://doi.acm.org/10.1145/2133375.2133377
-
(2012)
ACM Trans. Inf. Syst. Secur.
, vol.15
, Issue.1
, pp. 21-234
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
11
-
-
84889011675
-
Bypassing stackguard and stackshield
-
Bulba and Kil3r
-
Bulba and Kil3r, "Bypassing stackguard and stackshield," Phrack, 56, 2002.
-
(2002)
Phrack
, vol.56
-
-
-
12
-
-
84911032889
-
-
NIST, September, [Online]
-
NIST. (2011, September) Vulnerability Summary for CVE-2010-3867. [Online]. Available: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3867
-
(2011)
Vulnerability Summary for CVE-2010-3867
-
-
-
13
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
E. Bhatkar, D. C. Duvarney, and R. Sekar, "Address obfuscation: an efficient approach to combat a broad range of memory error exploits," in In Proceedings of the 12th USENIX Security Symposium, 2003, pp. 105-120.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, E.1
Duvarney, D.C.2
Sekar, R.3
|