-
1
-
-
84928147285
-
-
0vercl0k
-
0vercl0k. Rp++ tool. https://github.com/0vercl0k/rp.
-
Rp++ Tool
-
-
-
2
-
-
33646767376
-
Control-ow integrity
-
ACM
-
Martín Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti. Control-ow integrity. In Proceedings of the 12th ACM conference on Computer and communications security, pages 340-353. ACM, 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
33846321458
-
Proposed automatic calculating machine
-
Howard Aiken, AG Oettinger, and TC Bartee. Proposed automatic calculating machine. Spectrum, IEEE, 1(8):62-69, 1964.
-
(1964)
Spectrum, IEEE
, vol.1
, Issue.8
, pp. 62-69
-
-
Aiken, H.1
Oettinger, A.G.2
Bartee, T.C.3
-
4
-
-
84910680268
-
You can run but you can't read: Preventing disclosure exploits in executable code
-
ACM
-
Michael Backes, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, and Jannik Pewny. You can run but you can't read: Preventing disclosure exploits in executable code. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 1342-1353. ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1342-1353
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
5
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In
-
ACM
-
Xiaoxin Chen, Tal Garnkel, E Christopher Lewis, Pratap Subrahmanyam, Carl A Waldspurger, Dan Boneh, Jeffrey Dwoskin, and Dan RK Ports. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. In ACM SIGOPS Operating Systems Review, volume 42, pages 2-13. ACM, 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, pp. 2-13
-
-
Chen, X.1
Garnkel, T.2
Christopher, L.E.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Dan, R.K.8
-
6
-
-
84928101958
-
-
Specification, Unix System Laboratories
-
Tool Interface Standards Committee et al. Executable and linkable format (ELF). Specification, Unix System Laboratories, 2001.
-
(2001)
Executable and Linkable Format (ELF)
-
-
-
7
-
-
85060818077
-
Introduction and overview of the multics system
-
ACM
-
Fernando J Corbató and Victor A. Vyssotsky. Introduction and overview of the multics system. In Proceedings of the November 30-December 1, 1965, fall joint computer conference, part I, pages 185-196. ACM, 1965.
-
(1965)
Proceedings of the November 30-December 1, 1965, Fall Joint Computer Conference, Part I
, pp. 185-196
-
-
Corbató, F.J.1
Vyssotsky, V.A.2
-
9
-
-
33846272389
-
Strengthening software self-checksumming via self-modifying code
-
IEEE
-
Jonathon T. Giffin, Mihai Christodorescu, and Louis Kruger. Strengthening software self-checksumming via self-modifying code. In Computer Security Applications Conference, 21st Annual, pages 10-pp. IEEE, 2005.
-
(2005)
Computer Security Applications Conference, 21st Annual
, pp. 10
-
-
Giffin, J.T.1
Christodorescu, M.2
Kruger, L.3
-
10
-
-
84914159903
-
Out of control: Overcoming control-ow integrity
-
IEEE Symposium on, San Jose, CA, USA, May 2014. IEEE
-
Enes Göktas, Elias Athanasopoulos, Herbert Bos, and Gerogios Portokalidis. Out of control: Overcoming control-ow integrity. In Security and Privacy (SP), 2014 IEEE Symposium on, San Jose, CA, USA, May 2014. IEEE.
-
(2014)
Security and Privacy (SP)
-
-
Göktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
11
-
-
84876901222
-
Profile-guided automated software diversity
-
Washington, DC, USA, IEEE Computer Society
-
Andrei Homescu, Steven Neisius, Per Larsen, Stefan Brunthaler, and Michael Franz. Profile-guided automated software diversity. In Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), CGO '13, pages 1-11, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), CGO '13
, pp. 1-11
-
-
Homescu, A.1
Neisius, S.2
Larsen, P.3
Brunthaler, S.4
Franz, M.5
-
12
-
-
85084161742
-
Microgadgets: Size does matter in turing-complete return-oriented programming
-
Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, and Michael Franz. Microgadgets: Size does matter in turing-complete return-oriented programming. In WOOT, pages 64-76, 2012.
-
(2012)
WOOT
, pp. 64-76
-
-
Homescu, A.1
Stewart, M.2
Larsen, P.3
Brunthaler, S.4
Franz, M.5
-
13
-
-
84928147282
-
-
Intel System Programming Guide, Part, 1
-
Intel. Intel architectures manual. Volume 3A: System Programming Guide, Part, 1, 64.
-
Intel Architectures Manual
, vol.3 A
, pp. 64
-
-
-
14
-
-
39049113465
-
Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software
-
IEEE
-
Chongkyung Kil, Jinsuk Jim, Christopher Bookholt, Jun Xu, and Peng Ning. Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 339-348. IEEE, 2006.
-
(2006)
Computer Security Applications Conference,2006. ACSAC'06. 22nd Annual
, pp. 339-348
-
-
Kil, C.1
Jim, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
15
-
-
84914111191
-
SoK: Automated software diversity
-
Washington, DC, USA, IEEE Computer Society
-
Per Larsen, Andrei Homescu, Stefan Brunthaler, and Michael Franz. SoK: Automated software diversity. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14, pages 276-291, Washington, DC, USA, 2014. IEEE Computer Society.
-
(2014)
Proceedings of the 2014 IEEE Symposium on Security and Privacy, SP '14
, pp. 276-291
-
-
Larsen, P.1
Homescu, A.2
Brunthaler, S.3
Franz, M.4
-
16
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
David Lie, Chandramohan Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell, and Mark Horowitz. Architectural support for copy and tamper resistant software. ACM SIGPLAN Notices, 35(11):168-177, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
17
-
-
84928147281
-
-
MWR labs pwn2own 2013 write-up
-
MWR labs pwn2own 2013 write-up. MWR Labs. https://labs.mwrinfosecurity.com/blog/2013/04/19/mwr-labs-pwn2own-2013-write-up-webkit-exploit/.
-
MWR Labs
-
-
-
18
-
-
78149470447
-
An architectural approach to preventing code injection attacks. Dependable and Secure Computing
-
Ryan Riley, Xuxian Jiang, and Dongyan Xu. An architectural approach to preventing code injection attacks. Dependable and Secure Computing, IEEE Transactions on, 7(4):351-365, 2010.
-
(2010)
IEEE Transactions on
, vol.7
, Issue.4
, pp. 351-365
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
22
-
-
70349444399
-
ARM architecture reference manual
-
David Seal. ARM architecture reference manual. Pearson Education, 2001.
-
(2001)
Pearson Education
-
-
Seal, D.1
-
24
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
Washington, DC, USA,IEEE Computer Society
-
Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, pages 574-588, Washington, DC, USA, 2013. IEEE Computer Society.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13
, pp. 574-588
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
25
-
-
77952405499
-
Shadow walker: Raising the bar for rootkit detection
-
Sherri Sparks and Jamie Butler. Shadow walker: Raising the bar for rootkit detection. Black Hat Japan, pages 504-533, 2005.
-
(2005)
Black Hat Japan
, pp. 504-533
-
-
Sparks, S.1
Butler, J.2
-
26
-
-
84944412608
-
Efficient memory integrity verification and encryption for secure processors
-
IEEE Computer Society
-
G. Edward Suh, Dwaine Clarke, Blaise Gassend, Marten van Dijk, and Srinivas Devadas. Efficient memory integrity verification and encryption for secure processors. In Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture, page 339. IEEE Computer Society, 2003.
-
(2003)
Proceedings of the 36th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 339
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Dijk, M.V.4
Devadas, S.5
-
27
-
-
84889034552
-
Cleanos: Limiting mobile data exposure with idle eviction
-
Yang Tang, Phillip Ames, Sravan Bhamidipati, Ashish Bijlani, Roxana Geambasu, and Nikhil Sarda. Cleanos: Limiting mobile data exposure with idle eviction. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI, volume 12, 2012.
-
(2012)
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI
, vol.12
-
-
Tang, Y.1
Ames, P.2
Bhamidipati, S.3
Bijlani, A.4
Geambasu, R.5
Sarda, N.6
-
30
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance. Dependable and Secure Computing
-
Paul C. Van Oorschot, Anil Somayaji, and Glenn Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. Dependable and Secure Computing, IEEE Transactions on, 2(2):82-92, 2005.
-
(2005)
IEEE Transactions on
, vol.2
, Issue.2
, pp. 82-92
-
-
Van Oorschot, P.C.1
Somayaji, A.2
Wurster, G.3
-
33
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM
-
Robert Wahbe, Steven Lucco, Thomas E. Anderson, and Susan L. Graham. Efficient software-based fault isolation. In ACM SIGOPS Operating Systems Review, volume 27, pages 203-216. ACM, 1994.
-
(1994)
ACM SIGOPS Operating Systems Review
, vol.27
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
34
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
ACM
-
Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, and Zhiqiang Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 157-168. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
35
-
-
80052400545
-
Differentiating code from data in x86 binaries
-
Springer
-
Richard Wartell, Yan Zhou, Kevin W. Hamlen, Murat Kantarcioglu, and Bhavani Thuraisingham. Differentiating code from data in x86 binaries. In Machine Learning and Knowledge Discovery in Databases, pages 522-536. Springer, 2011.
-
(2011)
Machine Learning and Knowledge Discovery in Databases
, pp. 522-536
-
-
Wartell, R.1
Zhou, Y.2
Hamlen, K.W.3
Kantarcioglu, M.4
Thuraisingham, B.5
|