-
2
-
-
85180622802
-
-
Ollydbg. http://www.ollydbg.de/.
-
Ollydbg
-
-
-
3
-
-
0004072686
-
-
Second Edition. Pearson Education, Addison Wesley
-
A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools, Second Edition. Pearson Education, Addison Wesley, 2007.
-
(2007)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A. V.1
Lam, M. S.2
Sethi, R.3
Ullman, J. D.4
-
4
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
6
-
-
0028743437
-
Compiler transformations for high-performance computing
-
D. F. Bacon, S. L. Graham, and O. J. Sharp. Compiler transformations for high-performance computing. ACM Comput. Surv., 26:345–420, 1994.
-
(1994)
ACM Comput. Surv
, vol.26
, pp. 345-420
-
-
Bacon, D. F.1
Graham, S. L.2
Sharp, O. J.3
-
7
-
-
24644506256
-
Codesurfer/x86—a platform for analyzing x86 executuables
-
Springer
-
G. Balakrishnan, R. Gruian, T. Reps, and T. Teitelbaum. Codesurfer/x86—a platform for analyzing x86 executuables. In Lecture Notes in Computer Science, pages 250–254. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 250-254
-
-
Balakrishnan, G.1
Gruian, R.2
Reps, T.3
Teitelbaum, T.4
-
9
-
-
33646744677
-
WYSINWYX: What you see is not what you execute
-
G. Balakrishnan, T. Reps, D. Melski, and T. Teitelbaum. WYSINWYX: What you see is not what you execute. In In Verified Software: Theories, Tools, Experiments, page 1603, 2007.
-
(2007)
Verified Software: Theories, Tools, Experiments
, pp. 1603
-
-
Balakrishnan, G.1
Reps, T.2
Melski, D.3
Teitelbaum, T.4
-
11
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Berkeley, CA, USA, USENIX Association
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In SSYM’05: Proceedings of the 14th conference on USENIX Security Symposium, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SSYM’05: Proceedings of the 14th conference on USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D. C.3
-
14
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In SSYM’05: Proceedings of the 14th conference on USENIX Security Symposium, 2005.
-
(2005)
SSYM’05: Proceedings of the 14th conference on USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
19
-
-
0004046658
-
-
Technical report, Department of Computer Sciences, The University of Auckland, Auckland, New Zealand
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical report, Department of Computer Sciences, The University of Auckland, Auckland, New Zealand, 1997.
-
(1997)
A taxonomy of obfuscating transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
21
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In 7th USENIX Security Symposium, 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
22
-
-
76749136584
-
Digging for data structures
-
San Diego, CA, December
-
A. Cozzie, F. Stratton, H. Xue, and S. T. King. Digging for data structures. In USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008, pages 255–266, San Diego, CA, December 2008.
-
(2008)
USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008
, pp. 255-266
-
-
Cozzie, A.1
Stratton, F.2
Xue, H.3
King, S. T.4
-
23
-
-
70349283250
-
Tupni: automatic reverse engineering of input formats
-
W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz. Tupni: automatic reverse engineering of input formats. In CCS’08: Proceedings of the 15th ACM conference on Computer and communications security, 2008.
-
(2008)
CCS’08: Proceedings of the 15th ACM conference on Computer and communications security
-
-
Cui, W.1
Peinado, M.2
Chen, K.3
Wang, H. J.4
Irun-Briz, L.5
-
25
-
-
70349288894
-
Advances in openbsd
-
April
-
T. DeRaadt. Advances in openbsd. CanSecWest, http://www.openbsd.org/papers/csw03/index.html, April 2003.
-
(2003)
CanSecWest
-
-
DeRaadt, T.1
-
26
-
-
33749664064
-
Generalising the array split obfuscation
-
S. Drape. Generalising the array split obfuscation. Information Sciences, 177:202–219, 2007.
-
(2007)
Information Sciences
, vol.177
, pp. 202-219
-
-
Drape, S.1
-
31
-
-
84873352596
-
Automatic reverse engineering of data structures from binary execution
-
San Diego, CA, March
-
Z. Lin, X. Zhang, and D. Xu. Automatic reverse engineering of data structures from binary execution. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS’10), San Diego, CA, March 2010.
-
(2010)
Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS’10)
-
-
Lin, Z.1
Zhang, X.2
Xu, D.3
-
32
-
-
34548027516
-
Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
-
K. Makris and K. D. Ryu. Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels. In EuroSys, pages 327–340, 2007.
-
(2007)
EuroSys
, pp. 327-340
-
-
Makris, K.1
Ryu, K. D.2
-
33
-
-
35348905267
-
Loopprof: Dynamic techniques for loop detection and profiling
-
T. Moseley, V. Tovinkere, R. Ramanujan, D. A. Connors, and D. Grunwald. Loopprof: Dynamic techniques for loop detection and profiling. In Proceedings of the Workshop on Binary Instrumentation and Applications (WBIA), 2006.
-
(2006)
Proceedings of the Workshop on Binary Instrumentation and Applications (WBIA)
-
-
Moseley, T.1
Tovinkere, V.2
Ramanujan, R.3
Connors, D. A.4
Grunwald, D.5
-
34
-
-
84882740544
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
San Diego, California, USA, February
-
J. Newsome, D. Brumley, and D. X. Song. Vulnerability-specific execution filtering for exploit prevention on commodity software. In Proceedings of the Network and Distributed System Security Symp osium, NDSS 2006, San Diego, California, USA, February 2006.
-
(2006)
Proceedings of the Network and Distributed System Security Symp osium, NDSS 2006
-
-
Newsome, J.1
Brumley, D.2
Song, D. X.3
-
35
-
-
79953672829
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Proceedings of the Network and Distributed Systems Security Symposium, 2005.
-
(2005)
Proceedings of the Network and Distributed Systems Security Symposium
-
-
Newsome, J.1
Song, D.2
-
36
-
-
0006100649
-
Smashing the stack for fun and profit
-
A. One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
37
-
-
74049111656
-
Detecting system emulators
-
T. Raffetseder, C. Krügel, and E. Kirda. Detecting system emulators. In Information Security, 10th International Conference, ISC 2007, 2007.
-
(2007)
Information Security, 10th International Conference, ISC 2007
-
-
Raffetseder, T.1
Krügel, C.2
Kirda, E.3
-
41
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security (CCS’04), 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security (CCS’04)
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
43
-
-
81855221759
-
Reformat: automatic reverse engineering of encrypted messages
-
Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. Reformat: automatic reverse engineering of encrypted messages. In ESORICS’09: Proceedings of the 14th European conference on Research in computer security, 2009.
-
(2009)
ESORICS’09: Proceedings of the 14th European conference on Research in computer security
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
45
-
-
77954495640
-
PAriCheck: an efficient pointer arithmetic checker for C programs
-
Y. Younan, P. Philippaerts, L. Cavallaro, R. Sekar, F. Piessens, and W. Joosen. PAriCheck: an efficient pointer arithmetic checker for C programs. In ASIACCS’10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010.
-
(2010)
ASIACCS’10: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
-
-
Younan, Y.1
Philippaerts, P.2
Cavallaro, L.3
Sekar, R.4
Piessens, F.5
Joosen, W.6
-
47
-
-
85056834982
-
Information hiding in software with mixed boolean-arithmetic transforms
-
Y. Zhou, A. Main, Y. X. Gu, and H. Johnson. Information hiding in software with mixed boolean-arithmetic transforms. In Proceedings of the 8th international conference on Information security applications, WISA’07, 2007.
-
(2007)
Proceedings of the 8th international conference on Information security applications, WISA’07
-
-
Zhou, Y.1
Main, A.2
Gu, Y. X.3
Johnson, H.4
|