-
2
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Berkeley, CA, USA, USENIX Association
-
Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, SSYM'05, pages 17-17, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05
, pp. 17-17
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
3
-
-
79955994779
-
Jump-oriented programming: A new class of codereuse attack
-
New York, NY, USA, ACM
-
Tyler Bletsch, Xuxian Jiang, Vince W. Freeh, and Zhenkai Liang. Jump-oriented programming: a new class of codereuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 30-40, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
4
-
-
84914110149
-
-
January
-
Bulba and Kil3r. Bypassing StackGuard and Stack-Shield. http://www.phrack.org/issues.html?issue=56&id= 5article, January 2000.
-
(2000)
Bypassing StackGuard and Stack-Shield
-
-
-
5
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
Berlin, Heidelberg, Springer-Verlag
-
Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, and Li Xie. Drop: Detecting return-oriented programming malicious code. In Proceedings of the 5th International Conference on Information Systems Security, ICISS '09, pages 163-177, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 5th International Conference on Information Systems Security, ICISS '09
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
6
-
-
79956032720
-
Ropdefender: A detection tool to defend against returnoriented programming attacks
-
New York, NY, USA, ACM
-
Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. Ropdefender: a detection tool to defend against returnoriented programming attacks. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pages 40-51, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11
, pp. 40-51
-
-
Davi, L.1
Sadeghi, A.2
Winandy, M.3
-
7
-
-
84914110148
-
Exploitation and state machines: Programming the 'weird machine', revisited
-
Miami, FLA, April
-
Thomas Dullien. Exploitation and state machines: Programming the 'weird machine', revisited. In Infiltrate Conference, Miami, FLA, April 2011.
-
(2011)
Infiltrate Conference
-
-
Dullien, T.1
-
8
-
-
84914110147
-
-
(asterisk exploit related to cve-2012-5976)
-
Brandon Edwards. Dos? then who was phone? (asterisk exploit related to cve-2012-5976). http://blog.exodusintel.com/tag/asterisk-exploit/.
-
Dos? Then Who Was Phone?
-
-
Edwards, B.1
-
10
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
Washington, DC, USA, IEEE Computer Society
-
Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, and Peng Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Proceedings of the 22nd Annual Computer Security Applications Conference, ACSAC '06, pages 339-348, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
Proceedings of the 22nd Annual Computer Security Applications Conference, ACSAC '06
, pp. 339-348
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
11
-
-
77954614533
-
Defeating return-oriented rootkits with "return-less" kernels
-
New York, NY, USA, ACM
-
Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, and Sina Bahram. Defeating return-oriented rootkits with "return-less" kernels. In Proceedings of the 5th European conference on Computer systems, EuroSys '10, pages 195-208, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 5th European Conference on Computer Systems, EuroSys '10
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
13
-
-
84859453835
-
Everybody be cool, this is a roppery!
-
Las Vegas, USA
-
Vincenzo Lozzo, Tim Kornau, and Ralf-Philipp Weinmann. Everybody be cool, this is a roppery! In Proceedings of BlackHat USA, Las Vegas, USA, 2010.
-
(2010)
Proceedings of BlackHat USA
-
-
Lozzo, V.1
Kornau, T.2
Weinmann, R.3
-
15
-
-
84914110144
-
Preventing the exploitation of seh overwrites
-
Matt Miller. Preventing the exploitation of seh overwrites. Uninformed Journal, 5, 2006.
-
(2006)
Uninformed Journal
, vol.5
-
-
Miller, M.1
-
17
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
ACM, December
-
Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-free: defeating return-oriented programming through gadget-less binaries. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), ACSAC '10, pages 49-58. ACM, December 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC), ACSAC '10
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
19
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
Washington, DC, USA, IEEE Computer Society
-
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 601-615, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 601-615
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
21
-
-
84914110142
-
-
Dennis Ritchie. Unix version 6 - signal.s. http://minnie.tuhs.org/cgi-bin/utree.pl?file=V6/usr/source/s5/signal.s, 1975.
-
(1975)
Unix Version 6 - Signal
-
-
Ritchie, D.1
-
22
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
Washington, DC, USA, IEEE Computer Society
-
Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, and Danilo Bruschi. Surgically returning to randomized lib(c). In Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09, pages 60-69, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC '09
, pp. 60-69
-
-
Roglia, G.F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
25
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
27
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
Washington, DC, USA, IEEE Computer Society
-
Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, pages 574-588, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13
, pp. 574-588
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.6
-
30
-
-
84987620538
-
The automated exploitation grand challenge, tales of weird machines
-
Sao Paulo, Brazil, October
-
Julien Vanegue. The automated exploitation grand challenge, tales of weird machines. In H2C2 conference, Sao Paulo, Brazil, October 2013.
-
(2013)
H2C2 Conference
-
-
Vanegue, J.1
-
31
-
-
84906743353
-
Jekyll on ios: When benign apps become evil
-
Berkeley, CA, USA, USENIX Association
-
Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. Jekyll on ios: when benign apps become evil. In Proceedings of the 22nd USENIX conference on Security, SEC'13, pages 559-572, Berkeley, CA, USA, 2013. USENIX Association.
-
(2013)
Proceedings of the 22nd USENIX Conference on Security, SEC'13
, pp. 559-572
-
-
Wang, T.1
Lu, K.2
Lu, L.3
Chung, S.4
Lee, W.5
|