-
1
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Mar. [Online]
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage, "Return-oriented programming: Systems, languages, and applications," ACM Trans. Inf. Syst. Secur., vol. 15, no. 1, pp. 2:1-2:34, Mar. 2012. [Online]. Available: http://doi.acm.org/10.1145/2133375.2133377
-
(2012)
ACM Trans. Inf. Syst. Secur.
, vol.15
, Issue.1
, pp. 1-34
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
2
-
-
84914126478
-
-
[Online]
-
mitre. Cve-2013-2028. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2028
-
Mitre. Cve-2013-2028
-
-
-
3
-
-
84914126478
-
-
Cve-2008-0226. [Online]
-
-. Cve-2008-0226. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226
-
Mitre. Cve-2013-2028
-
-
-
4
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov. [Online]
-
A. One, "Smashing The Stack For Fun And Profit," Phrack, vol. 7, no. 49, Nov. 1996. [Online]. Available: http://phrack.com/issues.html?issue=49&id=14#article
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
8
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a board range of memory error exploits
-
ser. SSYM'03. Berkeley, CA, USA: USENIX Association, [Online]
-
S. Bhatkar, D. C. DuVarney, and R. Sekar, "Address obfuscation: an efficient approach to combat a board range of memory error exploits," in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12, ser. SSYM'03. Berkeley, CA, USA: USENIX Association, 2003, pp. 8-8. [Online]. Available: http://dl.acm.org/citation.cfm?id=1251353.1251361
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
, pp. 8-8
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
9
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ser. CCS '04. New York, NY, USA: ACM, [Online]
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, "On the effectiveness of address-space randomization," in Proceedings of the 11th ACM conference on Computer and communications security, ser. CCS '04. New York, NY, USA: ACM, 2004, pp. 298-307. [Online]. Available: http://doi.acm.org/10.1145/1030083.1030124
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
10
-
-
84914126476
-
-
gera and riq. [Online]
-
gera and riq. Advances in format string exploitation. [Online]. Available: http://www.phrack.org/archives/59/p59 0x07 Advances% 20in%20format%20string%20exploitation by riq%20&%20gera.txt
-
Advances in Format String Exploitation
-
-
-
11
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
ser. SSYM'98. Berkeley, CA, USA: USENIX Association, [Online]
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks," in Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, ser. SSYM'98. Berkeley, CA, USA: USENIX Association, 1998, pp. 5-5. [Online]. Available: http://dl.acm.org/citation.cfm?id=1267549.1267554
-
(1998)
Proceedings of the 7th Conference on USENIX Security Symposium
, vol.7
, pp. 5-5
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
13
-
-
17644393012
-
Bypassing stackguard and stackshield
-
May [Online]
-
Bulba and Kil3r, "Bypassing stackguard and stackshield," Phrack Magazine, May 2000. [Online]. Available: http://phrack.org/issues.html?issue=56&id=5#article
-
(2000)
Phrack Magazine
-
-
-
15
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
ser. ACSAC '09. Washington, DC, USA: IEEE Computer Society, [Online]
-
G. F. Roglia, L. Martignoni, R. Paleari, and D. Bruschi, "Surgically returning to randomized lib(c)," in Proceedings of the 2009 Annual Computer Security Applications Conference, ser. ACSAC '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 60-69. [Online]. Available: http://dx.doi.org/10.1109/ACSAC.2009.16
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference
, pp. 60-69
-
-
Roglia, G.F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
16
-
-
84914126474
-
-
[Online]
-
Ubuntu security features. [Online]. Available: https://wiki.ubuntu.com/Security/Features
-
Ubuntu Security Features
-
-
-
17
-
-
84914158456
-
-
[Online]
-
Peach fuzzer. [Online]. Available: http://peachfuzzer.com/
-
Peach Fuzzer
-
-
-
18
-
-
84914126473
-
-
mitre. Cve-2002-0392. [Online]
-
mitre. Cve-2002-0392. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0392
-
-
-
-
19
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
ser. Security'12. Berkeley, CA, USA: USENIX Association, [Online]
-
C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, "Enhanced operating system security through efficient and fine-grained address space randomization," in Proceedings of the 21st USENIX conference on Security symposium, ser. Security'12. Berkeley, CA, USA: USENIX Association, 2012, pp. 40-40. [Online]. Available: http://dl.acm.org/citation.cfm?id=2362793.2362833
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 40-40
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
21
-
-
84914126471
-
-
grsecurity. [Online]
-
grsecurity. Deter exploit bruteforcing. [Online]. Available: http://en.wikibooks.org/wiki/Grsecurity/Appendix/Grsecurity and PaX Configuration Options#Deter exploit bruteforcing
-
Deter Exploit Bruteforcing
-
-
-
22
-
-
33646767376
-
Controlflow integrity
-
ser. CCS '05. New York, NY, USA: ACM, [Online]
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Controlflow integrity," in Proceedings of the 12th ACM Conference on Computer and Communications Security, ser. CCS '05. New York, NY, USA: ACM, 2005, pp. 340-353. [Online]. Available: http://doi.acm.org/10.1145/1102120.1102165
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
23
-
-
84977859802
-
Transparent ROP exploit mitigation using indirect branch tracing
-
ser. SEC'13. Berkeley, CA, USA: USENIX Association, [Online]
-
V. Pappas, M. Polychronakis, and A. D. Keromytis, "Transparent ROP exploit mitigation using indirect branch tracing," in Proceedings of the 22nd USENIX conference on Security, ser. SEC'13. Berkeley, CA, USA: USENIX Association, 2013, pp. 447-462. [Online]. Available: http://dl.acm.org/citation.cfm?id=2534766.2534805
-
(2013)
Proceedings of the 22nd USENIX Conference on Security
, pp. 447-462
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
24
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
ser. CCS '12. New York, NY, USA: ACM, [Online]
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, "Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12. New York, NY, USA: ACM, 2012, pp. 157-168. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382216
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
25
-
-
84869381037
-
Ilr: Where'd my gadgets go?
-
ser. SP '12. Washington, DC, USA: IEEE Computer Society, [Online]
-
J. Hiser, A. Nguyen-Tuong, M. Co, M. Hall, and J. W. Davidson, "Ilr: Where'd my gadgets go?" in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 571-585. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.39
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
, pp. 571-585
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
26
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
ser. SP '12. Washington, DC, USA: IEEE Computer Society, [Online]
-
V. Pappas, M. Polychronakis, and A. D. Keromytis, "Smashing the gadgets: Hindering return-oriented programming using in-place code randomization," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 601-615. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.41
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
, pp. 601-615
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
27
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
ACM
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, "G-free: defeating return-oriented programming through gadget-less binaries," in Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 2010, pp. 49-58.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
29
-
-
33745209231
-
SAFECode: Enforcing alias analysis for weakly typed languages
-
ser. PLDI '06. New York, NY, USA: ACM, [Online]
-
D. Dhurjati, S. Kowshik, and V. Adve, "SAFECode: Enforcing alias analysis for weakly typed languages," in Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, ser. PLDI '06. New York, NY, USA: ACM, 2006, pp. 144-157. [Online]. Available: http://doi.acm.org/10.1145/1133981. 1133999
-
(2006)
Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 144-157
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
-
31
-
-
85084164484
-
Half-blind attacks: Mask ROM bootloaders are dangerous
-
T. Goodspeed and A. Francillon, "Half-Blind Attacks: Mask ROM Bootloaders are Dangerous," in WOOT, 2009.
-
(2009)
WOOT
-
-
Goodspeed, T.1
Francillon, A.2
-
32
-
-
84906818067
-
Where's the feeb?: The effectiveness of instruction set randomization
-
A. N. Sovarel, D. Evans, and N. Paul, "Where's the feeb?: The effectiveness of instruction set randomization," in Usenix Security, 2005.
-
(2005)
Usenix Security
-
-
Sovarel, A.N.1
Evans, D.2
Paul, N.3
|