-
2
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, “Control-flow integrity, ” in Proceedings of the 12th ACM conference on Computer and Communications Security (CCS), 2005.
-
(2005)
Proceedings of the 12th ACM conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
85057365973
-
-
Adobe Product Security Incident Response Team, “Inside Adobe Reader Protected Mode, ” http://blogs.adobe.com/security/2010/11/inside-adobe-reader-protected-mode-part-3broker-process-policies-and-inter-process-communication.html, 2010.
-
(2010)
Inside Adobe Reader Protected Mode
-
-
-
5
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
J. Ansel, P. Marchenko, Ú. Erlingsson, E. Taylor, B. Chen, D. L. Schuff, D. Sehr, C. L. Biffle, and B. Yee, “Language-independent sandboxing of just-in-time compilation and self-modifying code, ” in Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2011.
-
(2011)
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson, Ú.3
Taylor, E.4
Chen, B.5
Schuff, D. L.6
Sehr, D.7
Biffle, C. L.8
Yee, B.9
-
7
-
-
0345565890
-
A brief history of just-in-time
-
J. Aycock, “A brief history of just-in-time, ” ACM Computing Surveys (CSUR), vol. 35, no. 2, pp. 97-113, 2003.
-
(2003)
ACM Computing Surveys (CSUR)
, vol.35
, Issue.2
, pp. 97-113
-
-
Aycock, J.1
-
8
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi, “Randomized instruction set emulation to disrupt binary code injection attacks, ” in Proceedings of the 10th ACM conference on Computer and Communications Security (CCS), 2003.
-
(2003)
Proceedings of the 10th ACM conference on Computer and Communications Security (CCS)
-
-
Barrantes, E. G.1
Ackley, D. H.2
Palmer, T. S.3
Stefanovic, D.4
Zovi, D. D.5
-
10
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
M. Castro, M. Costa, J.-P. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black, “Fast byte-granularity software fault isolation, ” in Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles (SOSP), 2009.
-
(2009)
Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles (SOSP)
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
12
-
-
34547335786
-
Tainttrace: Efficient flow tracing with dynamic binary rewriting
-
W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige, “Tainttrace: Efficient flow tracing with dynamic binary rewriting, ” in Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC), 2006.
-
(2006)
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC)
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
13
-
-
84910672622
-
Ropecker: A generic and practical approach for defending against rop attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng, “Ropecker: A generic and practical approach for defending against rop attacks, ” in Proceedings of the Symposium on Network and Distributed System Security (NDSS), 2014.
-
(2014)
Proceedings of the Symposium on Network and Distributed System Security (NDSS)
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R. H.5
-
22
-
-
85180545695
-
-
Google, “Seccompsandbox, ” https://code.google.com/p/seccompsandbox/wiki/overview.
-
Seccompsandbox
-
-
-
24
-
-
85180550568
-
-
Google, “Design of chrome v8, ” https://developers.google.com/v8/design, 2008.
-
(2008)
Design of chrome v8
-
-
-
25
-
-
84869381037
-
ILR: Where'd My Gadgets Go?
-
J. Hiser, A. Nguyen-Tuong, M. Co, M. Hall, and J. W. Davidson, “ILR: Where'd My Gadgets Go?” in Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP), 2012.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy (SP)
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J. W.5
-
26
-
-
33745944184
-
Secure and practical defense against code-injection attacks using software dynamic translation
-
W. Hu, J. Hiser, D. Williams, A. Filipi, J. W. Davidson, D. Evans, J. C. Knight, A. Nguyen-Tuong, and J. Rowanhill, “Secure and practical defense against code-injection attacks using software dynamic translation, ” in Proceedings of the 2nd international conference on Virtual Execution Environments (VEE), 2006.
-
(2006)
Proceedings of the 2nd international conference on Virtual Execution Environments (VEE)
-
-
Hu, W.1
Hiser, J.2
Williams, D.3
Filipi, A.4
Davidson, J. W.5
Evans, D.6
Knight, J. C.7
Nguyen-Tuong, A.8
Rowanhill, J.9
-
27
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jim, C. Bookholt, J. Xu, and P. Ning, “Address space layout permutation (aslp): Towards fine-grained randomization of commodity software, ” in Proceedings of the 22Nd Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
Proceedings of the 22Nd Annual Computer Security Applications Conference (ACSAC)
-
-
Kil, C.1
Jim, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
28
-
-
33745304805
-
Pin: building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, “Pin: building customized program analysis tools with dynamic instrumentation, ” in Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2005.
-
(2005)
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V. J.8
Hazelwood, K.9
-
29
-
-
0016336411
-
Operating system integrity in os/vs2
-
W. S. McPhee, “Operating system integrity in os/vs2, ” IBM Systems Journal, vol. 13, no. 3, pp. 230-252, 1974.
-
(1974)
IBM Systems Journal
, vol.13
, Issue.3
, pp. 230-252
-
-
McPhee, W. S.1
-
31
-
-
67650812047
-
Softbound: Highly compatible and complete spatial memory safety for c
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, “Softbound: Highly compatible and complete spatial memory safety for c, ” in Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), 2009.
-
(2009)
Proceedings of the 2009 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M. M.3
Zdancewic, S.4
-
32
-
-
77954726241
-
Cets: compiler enforced temporal safety for c
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, “Cets: compiler enforced temporal safety for c, ” in Proceedings of the 2010 International Symposium on Memory Management (ISMM), 2010.
-
(2010)
Proceedings of the 2010 International Symposium on Memory Management (ISMM)
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M. M.3
Zdancewic, S.4
-
34
-
-
0026829493
-
What are race conditions?: Some issues and formalizations
-
R. H. Netzer and B. P. Miller, “What are race conditions?: Some issues and formalizations, ” ACM Letters on Programming Languages and Systems (LOPLAS), vol. 1, no. 1, pp. 74-88, 1992.
-
(1992)
ACM Letters on Programming Languages and Systems (LOPLAS)
, vol.1
, Issue.1
, pp. 74-88
-
-
Netzer, R. H.1
Miller, B. P.2
-
41
-
-
0030836322
-
Low-cost, concurrent checking of pointer and array accesses in c programs
-
H. PATIL and C. FISCHER, “Low-cost, concurrent checking of pointer and array accesses in c programs, ” Software: Practice and Experience, vol. 27, no. 1, pp. 87-110, 1997.
-
(1997)
Software: Practice and Experience
, vol.27
, Issue.1
, pp. 87-110
-
-
PATIL, H.1
FISCHER, C.2
-
44
-
-
85180546011
-
-
T. project authors
-
T. V. project authors, http://v8.googlecode.com/svn/data/benchmarks/v7/run.html.
-
-
-
-
45
-
-
40349087553
-
Lift: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H.-s. Kim, Y. Zhou, and Y. Wu, “Lift: A low-overhead practical information flow tracking system for detecting security attacks, ” in Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, 2006.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-s.4
Zhou, Y.5
Wu, Y.6
-
46
-
-
77950856300
-
Surgically returning to randomized lib (c)
-
G. F. Roglia, L. Martignoni, R. Paleari, and D. Bruschi, “Surgically returning to randomized lib (c), ” in Proceedings of the 2009 Annual Computer Security Applications Conference (ACSAC), 2009.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference (ACSAC)
-
-
Roglia, G. F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
47
-
-
84943385283
-
Retargetable and reconfigurable software dynamic translation
-
K. Scott, N. Kumar, S. Velusamy, B. Childers, J. W. Davidson, and M. L. Soffa, “Retargetable and reconfigurable software dynamic translation, ” in Proceedings of the International Symposium on Code Generation and Optimization (CGO), 2003.
-
(2003)
Proceedings of the International Symposium on Code Generation and Optimization (CGO)
-
-
Scott, K.1
Kumar, N.2
Velusamy, S.3
Childers, B.4
Davidson, J. W.5
Soffa, M. L.6
-
48
-
-
67650092861
-
Strata: A software dynamic translation infrastructure
-
K. Scott and J. Davidson, “Strata: A software dynamic translation infrastructure, ” Tech. Rep., 2001.
-
(2001)
Tech. Rep
-
-
Scott, K.1
Davidson, J.2
-
49
-
-
85072933898
-
Adapting software fault isolation to contemporary cpu architectures
-
D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko, K. Schimpf, B. Yee, and B. Chen, “Adapting software fault isolation to contemporary cpu architectures, ” in Proceedings of the 19th USENIX Conference on Security, 2010.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
50
-
-
84937679667
-
The info leak era on software exploitation
-
F. J. Serna, “The info leak era on software exploitation, ” Black Hat USA, 2012.
-
(2012)
Black Hat USA
-
-
Serna, F. J.1
-
53
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, “On the effectiveness of address-space randomization, ” in Proceedings of the 11th ACM conference on Computer and Communications Security (CCS), 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
55
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi, “Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization, ” in Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP), 2013.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP)
-
-
Snow, K. Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
56
-
-
84888986097
-
-
Standard Performance Evaluation Corporation, “SPEC CINT2006 Benchmarks, ” http://www.spec.org/cpu2006/CINT2006/.
-
SPEC CINT2006 Benchmarks
-
-
-
57
-
-
85180554439
-
-
W3C, http://www.w3.org/TR/workers/, 2012.
-
(2012)
-
-
-
58
-
-
0001225966
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, “Efficient software-based fault isolation, ” in Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles (SOSP), 1994.
-
(1994)
Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles (SOSP)
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T. E.3
Graham, S. L.4
-
59
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, “Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code, ” in Proceedings of the 2012 ACM conference on Computer and Communications Security (CCS), 2012.
-
(2012)
Proceedings of the 2012 ACM conference on Computer and Communications Security (CCS)
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K. W.3
Lin, Z.4
-
60
-
-
84920596681
-
Secure dynamic code generation against spraying
-
T. Wei, T. Wang, L. Duan, and J. Luo, “Secure dynamic code generation against spraying, ” in Proceedings of the 17th ACM conference on Computer and Communications Security (CCS), 2010.
-
(2010)
Proceedings of the 17th ACM conference on Computer and Communications Security (CCS)
-
-
Wei, T.1
Wang, T.2
Duan, L.3
Luo, J.4
-
62
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, “Native client: A sandbox for portable, untrusted x86 native code, ” in Proceedings of the 2009 IEEE Symposium on Security and Privacy (SP), 2009.
-
(2009)
Proceedings of the 2009 IEEE Symposium on Security and Privacy (SP)
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J. B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
63
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, “Practical control flow integrity and randomization for binary executables, ” in Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP), 2013.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP)
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|