-
1
-
-
84954178873
-
-
August
-
Intel Digital Random Generator (DRNG), August 2012. http://software.intel.com/sites/default/files/m/d/4/1/d/8/441-Intel-R-DRNG-Software-Implementation-Guide-final-Aug7.pdf.
-
(2012)
Intel Digital Random Generator (DRNG)
-
-
-
2
-
-
72449145808
-
Control-flow integrity: Principles, implementations, and applications
-
Nov
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. ACM Trans. Inf. Syst. Secur., 13(1):4:1-4:40, Nov. 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
, pp. 41-440
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
84954169732
-
BROP: Blind return oriented programming
-
Jun
-
A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh. BROP: Blind Return Oriented Programming. In Proc of IEEE Security Privacy 2014, Jun 2014.
-
(2014)
Proc of IEEE Security Privacy 2014
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazieres, D.4
Boneh, D.5
-
4
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
ACM Press, Oct.
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In Proceedings of CCS 2008, pages 27-38. ACM Press, Oct. 2008.
-
(2008)
Proceedings of CCS 2008
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
5
-
-
85076293126
-
ROP is still dangerous: Breaking modern defenses
-
San Diego, CA,. USENIX Association
-
N. Carlini and D. Wagner. ROP is Still Dangerous: Breaking Modern Defenses. In 23rd USENIX Security Symposium (USENIX Security 14), pages 385-399, San Diego, CA, 2014. USENIX Association.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
, pp. 385-399
-
-
Carlini, N.1
Wagner, D.2
-
8
-
-
85084160243
-
StackGuard: Automatic Adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proc. of Usenix Security, 1998.
-
(1998)
Proc. of Usenix Security
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
9
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
San Diego, CA, USENIX Association
-
L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium, San Diego, CA, 2014. USENIX Association.
-
(2014)
23rd USENIX Security Symposium
-
-
Davi, L.1
Sadeghi, A.-R.2
Lehmann, D.3
Monrose, F.4
-
13
-
-
85076902948
-
Code-pointer integrity
-
Broomfield, CO,. USENIX Association
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pages 147-163, Broomfield, CO, 2014. USENIX Association.
-
(2014)
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)
, pp. 147-163
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
18
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. On the Effectiveness of Address-Space Randomization. In Proc. of the 11'th ACM conference on Computer and Communications Security (CCS), pages 298-307, 2004.
-
(2004)
Proc. of the 11'th ACM Conference on Computer and Communications Security (CCS)
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
21
-
-
85021046176
-
Enforcing forward-edge control flow integrity in GCC & LLVM
-
USENIX Association
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, U. Erlingsson, L. Lozano, and G. Pike. Enforcing Forward-Edge Control Flow Integrity in GCC & LLVM. In 23rd USENIX Security Symposium. USENIX Association, 2014.
-
(2014)
23rd USENIX Security Symposium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
25
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical Control Flow Integrity and Randomization for Binary Executables. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, pages 559-573, 2013.
-
(2013)
Proceedings of the 2013 IEEE Symposium on Security and Privacy
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|