-
1
-
-
84942540009
-
-
Itanium(R) Processor Family Performance Advantages: Register Stack Architecture October
-
Itanium(R) Processor Family Performance Advantages: Register Stack Architecture. https://software.intel.com/en-us/articles/itaniumr-processor-family-performance-advantages-register-stack-architecture, October 2008.
-
(2008)
-
-
-
2
-
-
84883075478
-
-
September
-
SPEC CPU2006: Read Me First. http://www.spec.org/cpu2006/Docs/readme1st.html, September 2011.
-
(2011)
SPEC CPU2006: Read Me First.
-
-
-
4
-
-
84892460413
-
-
September
-
ARM Information Center. http://infocenter.arm.com/help/index.jsp? topic=/com.arm.doc.ddi0439d/Chdedegj.html, September 2013.
-
(2013)
ARM Information Center.
-
-
-
7
-
-
72449145808
-
Control-ow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-ow integrity principles, implementations, and applications. TISSEC, 2009.
-
(2009)
TISSEC
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
8
-
-
85084160891
-
Transparent run-time defense against stack-smashing attacks
-
A. Baratloo, N. Singh, and T. K. Tsai. Transparent Run-Time Defense Against Stack-Smashing Attacks. In USENIX ATC, 2000.
-
(2000)
USENIX ATC
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.K.3
-
9
-
-
84954188728
-
Eficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Eficient Techniques for Comprehensive Protection from Memory Error Exploits. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
10
-
-
47349088877
-
Performance characterization of spec cpu benchmarks on intel's core microarchitecture based processor
-
S. Bird, A. Phansalkar, L. K. John, A. Mericas, and R. Indukuru. Performance Characterization of SPEC CPU Benchmarks on Intel's Core Microarchitecture Based Processor. In SPEC Benchmark Workshop, 2007.
-
(2007)
SPEC Benchmark Workshop
-
-
Bird, S.1
Phansalkar, A.2
John, L.K.3
Mericas, A.4
Indukuru, R.5
-
11
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang. Jump-oriented programming: a new class of code-reuse attack. In CCS, 2011.
-
(2011)
CCS
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
13
-
-
85076293126
-
Rop is still dangerous: Breaking modern defenses
-
N. Carlini and D. Wagner. ROP is still dangerous: Breaking modern defenses. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Carlini, N.1
Wagner, D.2
-
14
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In CCS, 2010.
-
(2010)
CCS
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
15
-
-
0035017559
-
Rad: A compile-time solution to buér overow attacks
-
T.-c. Chiueh and F.-H. Hsu. RAD: A compile-time solution to buér overow attacks. In ICDCS, 2001.
-
(2001)
ICDCS
-
-
Chiueh, T.-C.1
Hsu, F.-H.2
-
18
-
-
84903161773
-
Hardware-assisted fine-grained control-flow integrity: Towards eficient protection of embedded systems against software exploitation
-
L. Davi, P. Koeberl, and A.-R. Sadeghi. Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Eficient Protection of Embedded Systems Against Software Exploitation. In DAC, 2014.
-
(2014)
DAC
-
-
Davi, L.1
Koeberl, P.2
Sadeghi, A.-R.3
-
19
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-ow integrity protection
-
L. Davi, D. Lehmann, A.-R. Sadeghi, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-ow integrity protection. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Davi, L.1
Lehmann, D.2
Sadeghi, A.-R.3
Monrose, F.4
-
20
-
-
79956032720
-
Ropdefender: A detection tool to defend against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy. ROPdefender: A detection tool to defend against return-oriented programming attacks. In CCS, 2011.
-
(2011)
CCS
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
21
-
-
78651539599
-
Xfi: Software guards for system address spaces
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, 2006.
-
(2006)
OSDI
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
23
-
-
85084163372
-
Stackghost: Hardware facilitated stack protection
-
M. Frantzen and M. Shuey. StackGhost: Hardware Facilitated Stack Protection. In USENIX Security, 2001.
-
(2001)
USENIX Security
-
-
Frantzen, M.1
Shuey, M.2
-
26
-
-
47349111332
-
Lock and unlock: A data management algorithm for a security-aware cache
-
K. Inoue. Lock and Unlock: A Data Management Algorithm for A Security-Aware Cache. In ICECS, 2006.
-
(2006)
ICECS
-
-
Inoue, K.1
-
27
-
-
84942540017
-
On the object orientedness of c++ programs in spec cpu
-
C. Isen and L. John. On the object orientedness of c++ programs in spec cpu 2006. In SPEC Benchmark Workshop, 2008.
-
(2008)
2006 SPEC Benchmark Workshop
-
-
Isen, C.1
John, L.2
-
29
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-Pointer Integrity. In OSDI, 2014.
-
(2014)
OSDI
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
32
-
-
84976840279
-
Superoptimizer: A look at the smallest program
-
H. Massalin. Superoptimizer: a look at the smallest program. In ACM SIGPLAN Notices, 1987.
-
(1987)
ACM SIGPLAN Notices
-
-
Massalin, H.1
-
36
-
-
0006100649
-
Smashing the stack for fun and profft
-
A. One. Smashing the stack for fun and profft. Phrack magazine, 1996.
-
(1996)
Phrack Magazine
-
-
One, A.1
-
37
-
-
79960860887
-
Retrofftting security in cots software with binary rewriting
-
P. O'Sullivan, K. Anand, A. Kotha, M. Smithson, R. Barua, and A. D. Keromytis. Retrofftting security in COTS software with binary rewriting. In Future Challenges in Security and Privacy for Academia and Industry. 2011.
-
(2011)
Future Challenges in Security and Privacy for Academia and Industry.
-
-
Osullivan, P.1
Anand, K.2
Kotha, A.3
Smithson, M.4
Barua, R.5
Keromytis, A.D.6
-
38
-
-
33748501504
-
Smashguard: A hardware solution to prevent security attacks on the function return address
-
H. Ozdoganoglu, T. Vijaykumar, C. E. Brodley, B. A. Kuperman, and A. Jalote. SmashGuard: A hardware solution to prevent security attacks on the function return address. Computers, IEEE Transactions on, 2006.
-
(2006)
Computers IEEE Transactions on
-
-
Ozdoganoglu, H.1
Vijaykumar, T.2
Brodley, C.E.3
Kuperman, B.A.4
Jalote, A.5
-
39
-
-
34347264136
-
The dynamic buér overow detection and prevention tool for windows executables using binary rewriting
-
S.-H. Park, Y.-J. Han, S.-J. Hong, H.-C. Kim, and T.-M. Chung. The dynamic buér overow detection and prevention tool for windows executables using binary rewriting. In The 9th International Conference on Advanced Communication Technology, 2007.
-
(2007)
The 9th International Conference on Advanced Communication Technology
-
-
Park, S.-H.1
Han, Y.-J.2
Hong, S.-J.3
Kim, H.-C.4
Chung, T.-M.5
-
40
-
-
79953214068
-
Fine-grained user-space security through virtualization
-
M. Payer and T. R. Gross. Fine-grained user-space security through virtualization. In VEE, 2011.
-
(2011)
VEE
-
-
Payer, M.1
Gross, T.R.2
-
41
-
-
84877697492
-
Safe loading-A foundation for secure execution of untrusted programs
-
M. Payer, T. Hartmann, and T. R. Gross. Safe loading-A foundation for secure execution of untrusted programs. In IEEE S&P, 2012.
-
(2012)
IEEE S&P
-
-
Payer, M.1
Hartmann, T.2
Gross, T.R.3
-
42
-
-
2642520196
-
A binary rewriting defense against stack based buér overow attacks
-
M. Prasad and T.-c. Chiueh. A Binary Rewriting Defense Against Stack based Buér Overow Attacks. In USENIX ATC, 2003.
-
(2003)
USENIX ATC
-
-
Prasad, M.1
Chiueh, T.-C.2
-
44
-
-
77952351839
-
The geometry of innocent ESH on the bone: Return-into-libc without function calls (on the x86
-
H. Shacham. The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86). In CCS, 2007.
-
(2007)
CCS
-
-
Shacham, H.1
-
48
-
-
85021046176
-
Enforcing forward-edge control-ow integrity in GCC & llvm
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway,-U. Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-ow integrity in gcc & llvm. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
49
-
-
27644592979
-
-
Vendicator
-
Vendicator. Stack Shield. http://www.angelfire.com/sk/stackshield/info.html, 2000.
-
(2000)
Stack Shield
-
-
-
50
-
-
32344441314
-
Stackguard: Simple stack smash protection for GCC
-
P. Wagle and C. Cowan. Stackguard: Simple stack smash protection for gcc. In GCC Developers Summit, 2003.
-
(2003)
GCC Developers Summit
-
-
Wagle, P.1
Cowan, C.2
-
53
-
-
84970902256
-
Practical control ow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control ow integrity and randomization for binary executables. In IEEE S&P, 2013.
-
(2013)
IEEE S&P
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
54
-
-
84897515810
-
A platform for secure static binary instrumentation
-
M. Zhang, R. Qiao, N. Hasabnis, and R. Sekar. A platform for secure static binary instrumentation. In VEE, 2014.
-
(2014)
VEE
-
-
Zhang, M.1
Qiao, R.2
Hasabnis, N.3
Sekar, R.4
-
55
-
-
85041451135
-
Control flow integrity for cots binaries
-
M. Zhang and R. Sekar. Control Flow Integrity for COTS Binaries. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Zhang, M.1
Sekar, R.2
|