-
1
-
-
84882582017
-
An inside look at botnets
-
M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, volume 27 of Advances in Information Security, Springer US
-
P. Barford and V. Yegneswaran. An inside look at botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Malware Detection, volume 27 of Advances in Information Security, pages 171-191. Springer US, 2007.
-
(2007)
Malware Detection
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
2
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
New York, NY, USA, ACM
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03, pages 281-289, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
3
-
-
84914132233
-
Hacking blind
-
A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh. Hacking blind. In Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014.
-
(2014)
Proceedings of the 35th IEEE Symposium on Security and Privacy
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazieres, D.4
Boneh, D.5
-
4
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In Proc. of the 17th ACM CCS, pages 559-572, 2010.
-
(2010)
Proc. of the 17th ACM CCS
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.4
Shacham, H.5
Winandy, M.6
-
9
-
-
84910617265
-
Diversifying the software stack using randomized nop insertion
-
T. Jackson, A. Homescu, S. Crane, P. Larsen, S. Brunthaler, and M. Franz. Diversifying the software stack using randomized nop insertion. In Moving Target Defense, pages 151-173. 2013.
-
(2013)
Moving Target Defense
, pp. 151-173
-
-
Jackson, T.1
Homescu, A.2
Crane, S.3
Larsen, P.4
Brunthaler, S.5
Franz, M.6
-
10
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
New York, NY, USA, ACM
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, pages 272-280, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
11
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
Ieee
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Proc. of ACSAC'06, pages 339-348. Ieee, 2006.
-
(2006)
Proc. of ACSAC'06
, pp. 339-348
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
13
-
-
0004272772
-
-
Cambridge University Press, New York, NY, USA
-
D. J. C. MacKay. Information Theory, Inference & Learning Algorithms. Cambridge University Press, New York, NY, USA, 2002.
-
(2002)
Information Theory, Inference & Learning Algorithms
-
-
MacKay, D.J.C.1
-
15
-
-
70450237674
-
Softbound: Highly compatible and complete spatial memory safety for c
-
New York, NY, USA, ACM
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic. Softbound: Highly compatible and complete spatial memory safety for c. In Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '09, pages 245-258, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '09
, pp. 245-258
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
16
-
-
77954726241
-
Cets: Compiler enforced temporal safety for c
-
New York, NY, USA, ACM
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic. Cets: Compiler enforced temporal safety for c. In Proceedings of the 2010 International Symposium on Memory Management, ISMM '10, pages 31-40, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 2010 International Symposium on Memory Management, ISMM '10
, pp. 31-40
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
17
-
-
3042642332
-
The advanced return-into-lib(c) exploits (pax case study)
-
Dec
-
Nergal. The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine, 58(4):54, Dec 2001.
-
(2001)
Phrack Magazine
, vol.58
, Issue.4
, pp. 54
-
-
Nergal1
-
18
-
-
84858289309
-
Creating a cyber moving target for critical infrastructure applications using platform diversity
-
Mar
-
H. Okhravi, A. Comella, E. Robinson, and J. Haines. Creating a cyber moving target for critical infrastructure applications using platform diversity. Elsevier International Journal of Critical Infrastructure Protection, 5:30-39, Mar 2012.
-
(2012)
Elsevier International Journal of Critical Infrastructure Protection
, vol.5
, pp. 30-39
-
-
Okhravi, H.1
Comella, A.2
Robinson, E.3
Haines, J.4
-
19
-
-
84899526686
-
Finding focus in the blur of moving-target techniques
-
Mar
-
H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein. Finding focus in the blur of moving-target techniques. IEEE Security & Privacy, 12(2):16-26, Mar 2014.
-
(2014)
IEEE Security & Privacy
, vol.12
, Issue.2
, pp. 16-26
-
-
Okhravi, H.1
Hobson, T.2
Bigelow, D.3
Streilein, W.4
-
21
-
-
78751524890
-
Fast and practical instruction-set randomization for commodity systems
-
New York, NY, USA, ACM
-
G. Portokalidis and A. D. Keromytis. Fast and practical instruction-set randomization for commodity systems. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 41-48, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 41-48
-
-
Portokalidis, G.1
Keromytis, A.D.2
-
23
-
-
84910683130
-
Information leaks without memory disclosures: Remote side channel attacks on diversified code
-
J. Seibert, H. Okhravi, and E. Soderstrom. Information leaks without memory disclosures: Remote side channel attacks on diversified code. In Proc. of the 21st ACM CCS, 2014.
-
(2014)
Proc. of the 21st ACM CCS
-
-
Seibert, J.1
Okhravi, H.2
Soderstrom, E.3
-
25
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. of ACM CCS, pages 552-561, 2007.
-
(2007)
Proc. of ACM CCS
, pp. 552-561
-
-
Shacham, H.1
-
26
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proc. of ACM CCS, pages 298-307, 2004.
-
(2004)
Proc. of ACM CCS
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
27
-
-
84906818067
-
Where's the feeb? the effectiveness of instruction set randomization
-
A. N. Sovarel, D. Evans, and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In 14th USENIX Security Symposium, volume 6, 2005.
-
(2005)
14th USENIX Security Symposium
, vol.6
-
-
Sovarel, A.N.1
Evans, D.2
Paul, N.3
-
28
-
-
70349100695
-
Breaking the memory secrecy assumption
-
R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and T. Walter. Breaking the memory secrecy assumption. In Proceedings of EuroSec '09, 2009.
-
(2009)
Proceedings of EuroSec '09
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
30
-
-
84857304973
-
On the expressiveness of return-into-libc attacks
-
M. Tran, M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, and P. Ning. On the expressiveness of return-into-libc attacks. In Proc. of RAID'11, pages 121-141, 2011.
-
(2011)
Proc. of RAID'11
, pp. 121-141
-
-
Tran, M.1
Etheridge, M.2
Bletsch, T.3
Jiang, X.4
Freeh, V.5
Ning, P.6
|