-
1
-
-
84970894949
-
-
Apache benchmark. http://httpd.apache.org/docs/2.0/programs/ab.html.
-
Apache Benchmark
-
-
-
4
-
-
84970901598
-
-
pyftpdlib. https://code.google.com/p/pyftpdlib.
-
Pyftpdlib
-
-
-
5
-
-
84970908588
-
-
SendEmail. http://caspian.dotconf.net/menu/Software/SendEmail.
-
SendEmail
-
-
-
8
-
-
72449145808
-
Control-flow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. ACM TISSEC, 13(1), 2009.
-
(2009)
ACM TISSEC
, vol.13
, pp. 1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
9
-
-
84863467535
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
10
-
-
80053209171
-
Anywhere, any-time binary instrumentation
-
A. R. Bernat and B. P. Miller. Anywhere, any-time binary instrumentation. In PASTE, 2011.
-
(2011)
PASTE
-
-
Bernat, A.R.1
Miller, B.P.2
-
11
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX SEC, 2005.
-
(2005)
USENIX SEC
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
12
-
-
84897489745
-
Mitigating code-reuse attacks with control-flow locking
-
T. Bletsch, X. Jiang, and V. Freeh. Mitigating code-reuse attacks with control-flow locking. In ACSAC, 2011.
-
(2011)
ACSAC
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
-
13
-
-
84970885912
-
Framing signals-A return to portable shellcode
-
E. Bosman and H. Bos. Framing signals-A return to portable shellcode. In IEEE S&P, 2014.
-
(2014)
IEEE S&P
-
-
Bosman, E.1
Bos, H.2
-
14
-
-
0034543798
-
An API for runtime code patching
-
B. Buck and J. K. Hollingsworth. An API for runtime code patching. IJHPCA, 14(4), 2000.
-
(2000)
IJHPCA
, vol.14
, pp. 4
-
-
Buck, B.1
Hollingsworth, J.K.2
-
15
-
-
85053935206
-
Control-flow bending: On the effectiveness of control-flow integrity
-
N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross. Control-flow bending: On the effectiveness of control-flow integrity. In USENIX SEC, 2015.
-
(2015)
USENIX SEC
-
-
Carlini, N.1
Barresi, A.2
Payer, M.3
Wagner, D.4
Gross, T.R.5
-
16
-
-
85076293126
-
ROP is still dangerous: Breaking modern defenses
-
N. Carlini and D. Wagner. ROP is still dangerous: Breaking modern defenses. In USENIX SEC, 2014.
-
(2014)
USENIX SEC
-
-
Carlini, N.1
Wagner, D.2
-
17
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In ACM CCS, 2010.
-
(2010)
ACM CCS
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
18
-
-
84977850020
-
StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries
-
X. Chen, A. Slowinska, D. Andriesse, H. Bos, and C. Giuffrida. StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries. In NDSS, 2015.
-
(2015)
NDSS
-
-
Chen, X.1
Slowinska, A.2
Andriesse, D.3
Bos, H.4
Giuffrida, C.5
-
19
-
-
84910672622
-
ROPecker: A generic and practical approach for defending against ROP attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. Deng. ROPecker: A generic and practical approach for defending against ROP attacks. In NDSS, 2014.
-
(2014)
NDSS
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R.5
-
20
-
-
0035017559
-
RAD: A compile-time solution to buffer overflow attacks
-
T.-C. Chiueh and F.-H. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS, 2001.
-
(2001)
ICDCS
-
-
Chiueh, T.-C.1
Hsu, F.-H.2
-
21
-
-
29144508720
-
Using DISE to protect return addresses from attack
-
M. L. Corliss, E. C. Lewis, and A. Roth. Using DISE to protect return addresses from attack. In ASSAV, 2004.
-
(2004)
ASSAV
-
-
Corliss, M.L.1
Lewis, E.C.2
Roth, A.3
-
22
-
-
84945222685
-
KCoFI: Complete control-flow integrity for commodity operating system kernels
-
J. Criswell, N. Dautenhahn, and V. Adve. KCoFI: Complete control-flow integrity for commodity operating system kernels. In IEEE S&P, 2014.
-
(2014)
IEEE S&P
-
-
Criswell, J.1
Dautenhahn, N.2
Adve, V.3
-
23
-
-
84942543728
-
The performance cost of shadow stacks and stack canaries
-
T. H. Dang, P. Maniatis, and D. Wagner. The performance cost of shadow stacks and stack canaries. In ASIACCS, 2015.
-
(2015)
ASIACCS
-
-
Dang, T.H.1
Maniatis, P.2
Wagner, D.3
-
24
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX SEC, 2014.
-
(2014)
USENIX SEC
-
-
Davi, L.1
Sadeghi, A.-R.2
Lehmann, D.3
Monrose, F.4
-
25
-
-
78651539599
-
XFI: Software guards for system address spaces
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, 2006.
-
(2006)
OSDI
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
28
-
-
84977858681
-
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
-
E. Goktaş, E. Athanasopoulos, M. Polychronakis, H. Bos, and G. Portokalidis. Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard. In USENIX SEC, 2014.
-
(2014)
USENIX SEC
-
-
Goktaş, E.1
Athanasopoulos, E.2
Polychronakis, M.3
Bos, H.4
Portokalidis, G.5
-
30
-
-
84970891960
-
Tackling the path explosion problem in symbolic execution-driven test generation for programs
-
S. Krishnamoorthy, M. Hsiao, and L. Lingappan. Tackling the path explosion problem in symbolic execution-driven test generation for programs. In IEEE ATS, 2010.
-
(2010)
IEEE ATS
-
-
Krishnamoorthy, S.1
Hsiao, M.2
Lingappan, L.3
-
31
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In OSDI, 2014.
-
(2014)
OSDI
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
32
-
-
35448971430
-
Making context-sensitive points-to analysis with heap cloning practical for the real world
-
C. Lattner, A. Lenharth, and V. Adve. Making context-sensitive points-to analysis with heap cloning practical for the real world. In PLDI, pages 278-289, 2007.
-
(2007)
PLDI
, pp. 278-289
-
-
Lattner, C.1
Lenharth, A.2
Adve, V.3
-
33
-
-
84889065012
-
Monitor integrity protection with space efficiency and separate compilation
-
B. Niu and G. Tan. Monitor integrity protection with space efficiency and separate compilation. In ACM CCS, 2013.
-
(2013)
ACM CCS
-
-
Niu, B.1
Tan, G.2
-
34
-
-
84901593819
-
Modular control-flow integrity
-
B. Niu and G. Tan. Modular control-flow integrity. In PLDI, 2014.
-
(2014)
PLDI
-
-
Niu, B.1
Tan, G.2
-
35
-
-
84910681910
-
RockJIT: Securing just-in-time compilation using modular control-flow integrity
-
B. Niu and G. Tan. RockJIT: Securing just-in-time compilation using modular control-flow integrity. In ACM CCS, 2014.
-
(2014)
ACM CCS
-
-
Niu, B.1
Tan, G.2
-
36
-
-
84977859802
-
Transparent ROP exploit mitigation using indirect branch tracing
-
V. Pappas, M. Polychronakis, and A. D. Keromytis. Transparent ROP exploit mitigation using indirect branch tracing. In USENIX SEC, 2013.
-
(2013)
USENIX SEC
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
37
-
-
84977835464
-
Fine-grained control-flow integrity through binary hardening
-
M. Payer, A. Barresi, and T. R. Gross. Fine-grained control-flow integrity through binary hardening. In DIMVA, 2015.
-
(2015)
DIMVA
-
-
Payer, M.1
Barresi, A.2
Gross, T.R.3
-
38
-
-
2642520196
-
A binary rewriting defense against stack-based buffer overflow attacks
-
M. Prasad and T. Cker Chiueh. A binary rewriting defense against stack-based buffer overflow attacks. In USENIX ATC, 2003.
-
(2003)
USENIX ATC
-
-
Prasad, M.1
Cker Chiueh, T.2
-
39
-
-
80455144708
-
Implicit buffer overflow protection using memory segregation
-
B. G. Roth and E. H. Spafford. Implicit buffer overflow protection using memory segregation. In ARES, 2011.
-
(2011)
ARES
-
-
Roth, B.G.1
Spafford, E.H.2
-
40
-
-
84994201123
-
Counterfeit object-oriented programming
-
F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz. Counterfeit object-oriented programming. In IEEE S&P, 2015.
-
(2015)
IEEE S&P
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
41
-
-
84906744655
-
Evaluating the effectiveness of current anti-ROP defenses
-
F. Schuster, T. Tendyck, J. Pewny, A. Maas, M. Steegmanns, M. Contag, and T. Holz. Evaluating the effectiveness of current anti-ROP defenses. In RAID, 2014.
-
(2014)
RAID
-
-
Schuster, F.1
Tendyck, T.2
Pewny, J.3
Maas, A.4
Steegmanns, M.5
Contag, M.6
Holz, T.7
-
42
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM CCS, 2007.
-
(2007)
ACM CCS
-
-
Shacham, H.1
-
44
-
-
84865304839
-
Howard: A dynamic excavator for reverse engineering data structures
-
A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engineering data structures. In NDSS, 2011.
-
(2011)
NDSS
-
-
Slowinska, A.1
Stancescu, T.2
Bos, H.3
-
45
-
-
84954177142
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
May
-
K. Z. Snow, L. Davi, A. Dmitrienko, C. Liebchen, F. Monrose, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE S&P, May 2013.
-
(2013)
IEEE S&P
-
-
Snow, K.Z.1
Davi, L.2
Dmitrienko, A.3
Liebchen, C.4
Monrose, F.5
Sadeghi, A.-R.6
-
46
-
-
79959884555
-
Exploiting hardware advances for software testing and debugging (nier track)
-
M. L. Soffa, K. R. Walcott, and J. Mars. Exploiting hardware advances for software testing and debugging (nier track). In ICSE, 2011.
-
(2011)
ICSE
-
-
Soffa, M.L.1
Walcott, K.R.2
Mars, J.3
-
47
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC and LLVM
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, Ulfar Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-flow integrity in GCC and LLVM. In USENIX SEC, 2014.
-
(2014)
USENIX SEC
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
48
-
-
35048812546
-
Intrusion detection via static analysis
-
D. Wagner and D. Dean. Intrusion detection via static analysis. In IEEE S&P, 2001.
-
(2001)
IEEE S&P
-
-
Wagner, D.1
Dean, D.2
-
49
-
-
84869420078
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE S&P, 2010.
-
(2010)
IEEE S&P
-
-
Wang, Z.1
Jiang, X.2
-
50
-
-
84970908791
-
CFIMon: Detecting violation of control flow integrity using performance counters
-
Y. Xia, Y. Liu, H. Chen, and B. Zang. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE DSN, 2012.
-
(2012)
IEEE DSN
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
51
-
-
39049133983
-
Extended protection against stack smashing attacks without performance loss
-
Y. Younan, D. Pozza, F. Piessens, and W. Joosen. Extended protection against stack smashing attacks without performance loss. In ACSAC, 2006.
-
(2006)
ACSAC
-
-
Younan, Y.1
Pozza, D.2
Piessens, F.3
Joosen, W.4
-
52
-
-
84901619881
-
Strato: A retargetable framework for low-level inlined-reference monitors
-
B. Zeng, G. Tan, and U. Erlingsson. Strato: A retargetable framework for low-level inlined-reference monitors. In USENIX SEC, 2013.
-
(2013)
USENIX SEC
-
-
Zeng, B.1
Tan, G.2
Erlingsson, U.3
-
53
-
-
84970902256
-
Practical control-flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control-flow integrity and randomization for binary executables. In IEEE S&P, 2013.
-
(2013)
IEEE S&P
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
54
-
-
84897515810
-
A platform for secure static binary instrumentation
-
M. Zhang, R. Qiao, N. Hasabnis, and R. Sekar. A platform for secure static binary instrumentation. In VEE, 2014.
-
(2014)
VEE
-
-
Zhang, M.1
Qiao, R.2
Hasabnis, N.3
Sekar, R.4
-
55
-
-
85041451135
-
Control flow integrity for COTS binaries
-
M. Zhang and R. Sekar. Control flow integrity for COTS binaries. In USENIX SEC, 2013.
-
(2013)
USENIX SEC
-
-
Zhang, M.1
Sekar, R.2
|