-
3
-
-
33646767376
-
Control-flow integrity
-
ACM
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In Proceedings of the 12th ACM conference on Computer and communications security, pages 340-353. ACM, 2005.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
85076276275
-
Cling: A memory allocator to mitigate dangling pointers
-
P. Akritidis. Cling: A memory allocator to mitigate dangling pointers. In USENIX Security Symposium, pages 177-192, 2010.
-
(2010)
USENIX Security Symposium
, pp. 177-192
-
-
Akritidis, P.1
-
5
-
-
50249149602
-
Preventing memory error exploits with wit
-
IEEE
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with wit. In Security and Privacy, 2008. SP 2008. IEEE Symposium on, pages 263-277. IEEE, 2008.
-
(2008)
Security and Privacy, 2008. SP 2008. IEEE Symposium on
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
7
-
-
84910680268
-
You can run but you can't read: Preventing disclosure exploits in executable code
-
ACM
-
M. Backes, T. Holz, B. Kollenda, P. Koppe, S. Nürnberger, and J. Pewny. You can run but you can't read: Preventing disclosure exploits in executable code. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pages 1342-1353. ACM, 2014.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1342-1353
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
8
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
New York, NY, USA. ACM
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Ste-fanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03, pages 281-289, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Ste-Fanovic, D.4
Zovi, D.D.5
-
9
-
-
84914132233
-
Hacking blind
-
A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh. Hacking blind. In Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014.
-
(2014)
Proceedings of the 35th IEEE Symposium on Security and Privacy
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazieres, D.4
Boneh, D.5
-
10
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. Bletsch, X. Jiang, V. Freeh, and Z. Liang. Jump-oriented programming: A new class of code-reuse attack. In Proc. of the 6th ACM Symposium on Info., Computer and Comm. Security, pages 30-40, 2011.
-
(2011)
Proc. of the 6th ACM Symposium on Info., Computer and Comm. Security
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
Liang, Z.4
-
12
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In Proc. of the 17th ACM CCS, pages 559-572, 2010.
-
(2010)
Proc. of the 17th ACM CCS
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.4
Shacham, H.5
Winandy, M.6
-
13
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In Usenix Security, volume 5, 2005.
-
(2005)
Usenix Security
, vol.5
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
15
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
S. Crane, C. Liebchen, A. Homescu, L. Davi, P. Larsen, A.-R. Sadeghi, S. Brunthaler, and M. Franz. Readactor: Practical code randomization resilient to memory disclosure. In IEEE Symposium on Security and Privacy, 2015.
-
(2015)
IEEE Symposium on Security and Privacy
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.-R.6
Brunthaler, S.7
Franz, M.8
-
16
-
-
60349110770
-
Opportunities and limits of remote timing attacks
-
S. A. Crosby, D. S. Wallach, and R. H. Riedi. Opportunities and limits of remote timing attacks. ACM Transactions on Information and System Security (TISSEC), 12(3):17, 2009.
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.12
, Issue.3
, pp. 17
-
-
Crosby, S.A.1
Wallach, D.S.2
Riedi, R.H.3
-
17
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarsegrained control-flow integrity protection
-
L. Davi, D. Lehmann, A.-R. Sadeghi, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarsegrained control-flow integrity protection. In USENIX Security Symposium, 2014.
-
(2014)
USENIX Security Symposium
-
-
Davi, L.1
Lehmann, D.2
Sadeghi, A.-R.3
Monrose, F.4
-
19
-
-
84910597085
-
-
Springer
-
F. Durvaux, M. Renauld, F.-X. Standaert, L. v. O. tot Oldenzeel, and N. Veyrat-Charvillon. Efficient removal of random delays from embedded software implementations using hidden markov models. Springer, 2013.
-
(2013)
Efficient Removal of Random Delays from Embedded Software Implementations Using Hidden Markov Models
-
-
Durvaux, F.1
Renauld, M.2
Standaert, F.-X.3
Tot Oldenzeel, L.V.O.4
Veyrat-Charvillon, N.5
-
20
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security Symposium, pages 475-490, 2012.
-
(2012)
USENIX Security Symposium
, pp. 475-490
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
22
-
-
36849034066
-
Spec cpu2006 benchmark descriptions
-
Sept.
-
J. L. Henning. Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34(4):1-17, Sept. 2006.
-
(2006)
SIGARCH Comput. Archit. News
, vol.34
, Issue.4
, pp. 1-17
-
-
Henning, J.L.1
-
23
-
-
84869381037
-
Ilr: Where'd my gadgets go
-
J. Hiser, A. Nguyen, M. Co, M. Hall, and J. Davidson. Ilr: Where'd my gadgets go. In IEEE Symposium on Security and Privacy, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Hiser, J.1
Nguyen, A.2
Co, M.3
Hall, M.4
Davidson, J.5
-
24
-
-
33745212805
-
-
G. Hunt, J. Larus, M. Abadi, M. Aiken, P. Barham, M. Fähndrich, C. Hawblitzel, O. Hodson, S. Levi, N. Murphy, et al. An overview of the singularity project. 2005.
-
(2005)
An Overview of the Singularity Project.
-
-
Hunt, G.1
Larus, J.2
Abadi, M.3
Aiken, M.4
Barham, P.5
Fähndrich, M.6
Hawblitzel, C.7
Hodson, O.8
Levi, S.9
Murphy, N.10
-
26
-
-
84910617265
-
Diversifying the software stack using randomized nop insertion
-
T. Jackson, A. Homescu, S. Crane, P. Larsen, S. Brun-thaler, and M. Franz. Diversifying the software stack using randomized nop insertion. In Moving Target Defense, pages 151-173. 2013.
-
(2013)
Moving Target Defense
, pp. 151-173
-
-
Jackson, T.1
Homescu, A.2
Crane, S.3
Larsen, P.4
Brun-Thaler, S.5
Franz, M.6
-
27
-
-
84877282861
-
Compiler-generated software diversity
-
T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner, A. Gal, S. Brunthaler, C. Wimmer, and M. Franz. Compiler-generated software diversity. Moving Target Defense, pages 77-98, 2011.
-
(2011)
Moving Target Defense
, pp. 77-98
-
-
Jackson, T.1
Salamat, B.2
Homescu, A.3
Manivannan, K.4
Wagner, G.5
Gal, A.6
Brunthaler, S.7
Wimmer, C.8
Franz, M.9
-
28
-
-
85084164164
-
Cyclone: A safe dialect of c
-
General Track
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of c. In USENIX Annual Technical Conference, General Track, pages 275-288, 2002.
-
(2002)
USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
29
-
-
83755183629
-
The minestrone architecture combining static and dynamic analysis techniques for software security
-
IEEE
-
A. D. Keromytis, S. J. Stolfo, J. Yang, A. Stavrou, A. Ghosh, D. Engler, M. Dacier, M. Elder, and D. Kien-zle. The minestrone architecture combining static and dynamic analysis techniques for software security. In SysSec Workshop (SysSec), 2011 First, pages 53-56. IEEE, 2011.
-
(2011)
SysSec Workshop (SysSec), 2011 First
, pp. 53-56
-
-
Keromytis, A.D.1
Stolfo, S.J.2
Yang, J.3
Stavrou, A.4
Ghosh, A.5
Engler, D.6
Dacier, M.7
Elder, M.8
Kien-Zle, D.9
-
30
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
Ieee
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Proc. of ACSAC'06, pages 339-348. Ieee, 2006.
-
(2006)
Proc. of ACSAC'06
, pp. 339-348
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
31
-
-
84942539024
-
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. 2014.
-
(2014)
Code-pointer Integrity
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
32
-
-
84889021222
-
Low-fat pointers: Compact encoding and efficient gatelevel implementation of fat pointers for spatial safety and capability-based security
-
ACM
-
A. Kwon, U. Dhawan, J. Smith, T. Knight, and A. Dehon. Low-fat pointers: compact encoding and efficient gatelevel implementation of fat pointers for spatial safety and capability-based security. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 721-732. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 721-732
-
-
Kwon, A.1
Dhawan, U.2
Smith, J.3
Knight, T.4
Dehon, A.5
-
34
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. ACM Sigplan Notices, 40(6):190-200, 2005.
-
(2005)
ACM Sigplan Notices
, vol.40
, Issue.6
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
36
-
-
77954726241
-
Cets: Compiler enforced temporal safety for c
-
ACM
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic. Cets: compiler enforced temporal safety for c. In ACM Sigplan Notices, volume 45, pages 31-40. ACM, 2010.
-
(2010)
ACM Sigplan Notices
, vol.45
, pp. 31-40
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
37
-
-
0036040304
-
Ccured: Typesafe retrofitting of legacy code
-
G. C. Necula, S. McPeak, and W. Weimer. Ccured: Typesafe retrofitting of legacy code. ACM SIGPLAN Notices, 37(1):128-139, 2002.
-
(2002)
ACM SIGPLAN Notices
, vol.37
, Issue.1
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
38
-
-
67650085819
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
ACM
-
N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In ACM Sigplan Notices, volume 42, pages 89-100. ACM, 2007.
-
(2007)
ACM Sigplan Notices
, vol.42
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
39
-
-
84899526686
-
Finding focus in the blur of moving-target techniques
-
Mar
-
H. Okhravi, T. Hobson, D. Bigelow, and W. Streilein. Finding focus in the blur of moving-target techniques. IEEE Security & Privacy, 12(2):16-26, Mar 2014.
-
(2014)
IEEE Security & Privacy
, vol.12
, Issue.2
, pp. 16-26
-
-
Okhravi, H.1
Hobson, T.2
Bigelow, D.3
Streilein, W.4
-
40
-
-
0006100649
-
Smashing the stack for fun and profit
-
A. One. Smashing the stack for fun and profit. Phrack magazine, 7(49):14-16, 1996.
-
(1996)
Phrack Magazine
, vol.7
, Issue.49
, pp. 14-16
-
-
One, A.1
-
41
-
-
85018993890
-
-
OpenBSD
-
OpenBSD. Openbsd 3.3, 2003.
-
(2003)
Openbsd 3.3
-
-
-
45
-
-
84857955714
-
Nginx: The high-performance web server and reverse proxy
-
W. Reese. Nginx: the high-performance web server and reverse proxy. Linux Journal, 2008(173):2, 2008.
-
(2008)
Linux Journal, 2008
, Issue.173
, pp. 2
-
-
Reese, W.1
-
46
-
-
84943385283
-
Retargetable and reconfigurable software dynamic translation
-
IEEE Computer Society
-
K. Scott, N. Kumar, S. Velusamy, B. Childers, J. W. Davidson, and M. L. Soffa. Retargetable and reconfigurable software dynamic translation. In Proceedings of the international symposium on Code generation and optimization: feedback-directed and runtime optimization, pages 36-47. IEEE Computer Society, 2003.
-
(2003)
Proceedings of the International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization
, pp. 36-47
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.4
Davidson, J.W.5
Soffa, M.L.6
-
48
-
-
85077122585
-
Addresssanitizer: A fast address sanity checker
-
K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov. Addresssanitizer: A fast address sanity checker. In USENIX Annual Technical Conference, pages 309-318, 2012.
-
(2012)
USENIX Annual Technical Conference
, pp. 309-318
-
-
Serebryany, K.1
Bruening, D.2
Potapenko, A.3
Vyukov, D.4
-
50
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. of ACM CCS, pages 552-561, 2007.
-
(2007)
Proc. of ACM CCS
, pp. 552-561
-
-
Shacham, H.1
-
51
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proc. of ACM CCS, pages 298-307, 2004.
-
(2004)
Proc. of ACM CCS
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
52
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
IEEE
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 574-588. IEEE, 2013.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 574-588
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
53
-
-
70349100695
-
Breaking the memory secrecy assumption
-
R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and T. Walter. Breaking the memory secrecy assumption. In Proc. of EuroSec'09, pages 1-8, 2009.
-
(2009)
Proc. of EuroSec'09
, pp. 1-8
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
54
-
-
70349100695
-
Breaking the memory secrecy assumption
-
R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and T. Walter. Breaking the memory secrecy assumption. In Proceedings of EuroSec '09, 2009.
-
(2009)
Proceedings of EuroSec '09
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
56
-
-
84857304973
-
On the expressiveness of return-into-libc attacks
-
M. Tran, M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, and P. Ning. On the expressiveness of return-into-libc attacks. In Proc. of RAID'11, pages 121-141, 2011.
-
(2011)
Proc. of RAID'11
, pp. 121-141
-
-
Tran, M.1
Etheridge, M.2
Bletsch, T.3
Jiang, X.4
Freeh, V.5
Ning, P.6
-
57
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
ACM
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 157-168. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
58
-
-
84941001078
-
Cheri: A hybrid capability-system architecture for scalable software compartmentalization
-
R. N. Watson, J. Woodruff, P. G. Neumann, S. W. Moore, J. Anderson, D. Chisnall, N. Dave, B. Davis, B. Laurie, S. J. Murdoch, R. Norton, M. Roe, S. Son, M. Vadera, and K. Gudka. Cheri: A hybrid capability-system architecture for scalable software compartmentalization. In IEEE Symposium on Security and Privacy, 2015.
-
(2015)
IEEE Symposium on Security and Privacy
-
-
Watson, R.N.1
Woodruff, J.2
Neumann, P.G.3
Moore, S.W.4
Anderson, J.5
Chisnall, D.6
Dave, N.7
Davis, B.8
Laurie, B.9
Murdoch, S.J.10
Norton, R.11
Roe, M.12
Son, S.13
Vadera, M.14
Gudka, K.15
-
60
-
-
60049100434
-
Security through diversity: Leveraging virtual machine technology
-
D. Williams, W. Hu, J. W. Davidson, J. D. Hiser, J. C. Knight, and A. Nguyen-Tuong. Security through diversity: Leveraging virtual machine technology. Security & Privacy, IEEE, 7(1):26-33, 2009.
-
(2009)
Security & Privacy, IEEE
, vol.7
, Issue.1
, pp. 26-33
-
-
Williams, D.1
Hu, W.2
Davidson, J.W.3
Hiser, J.D.4
Knight, J.C.5
Nguyen-Tuong, A.6
-
61
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
IEEE
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control flow integrity and randomization for binary executables. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 559-573. IEEE, 2013.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
62
-
-
85041451135
-
Control flow integrity for cots binaries
-
M. Zhang and R. Sekar. Control flow integrity for cots binaries. In USENIX Security, pages 337-352, 2013.
-
(2013)
USENIX Security
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
|