-
1
-
-
84964870657
-
The devil is in the constants: Bypassing defenses in browser jit engines
-
M. Athanasakis, E. Athanasopoulos, M. Polychronakis, G. Portokalidis, and S. Ioannidis. The devil is in the constants: Bypassing defenses in browser jit engines. In Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015), 2015.
-
(2015)
Proceedings of the 22nd Network and Distributed System Security Symposium (NDSS 2015)
-
-
Athanasakis, M.1
Athanasopoulos, E.2
Polychronakis, M.3
Portokalidis, G.4
Ioannidis, S.5
-
2
-
-
84910680268
-
You can run but you can't read: Preventing disclosure exploits in executable code
-
New York, NY, USA, ACM
-
M. Backes, T. Holz, B. Kollenda, P. Koppe, S. Nürnberger, and J. Pewny. You can run but you can't read: Preventing disclosure exploits in executable code. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pages 1342-1353, New York, NY, USA, 2014. ACM.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14
, pp. 1342-1353
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
3
-
-
85025171717
-
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
-
M. Backes and S. Nürnberger. Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. Proc. 23rd Usenix Security Sym, pages 433-447, 2014.
-
(2014)
Proc. 23rd Usenix Security Sym
, pp. 433-447
-
-
Backes, M.1
Nürnberger, S.2
-
4
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
ACM
-
T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang. Jump-oriented programming: a new class of code-reuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 30-40. ACM, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
5
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
May
-
S. Crane, C. Liebchen, A. Homescu, L. Davi, P. Larsen, A.-R. Sadeghi, S. Brunthaler, and M. Franz. Readactor: Practical code randomization resilient to memory disclosure. In 36th IEEE Symposium on Security and Privacy (Oakland), May 2015.
-
(2015)
36th IEEE Symposium on Security and Privacy (Oakland)
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.-R.6
Brunthaler, S.7
Franz, M.8
-
7
-
-
84893231124
-
Spider: Stealthy binary program instrumentation and debugging via hardware virtualization
-
New York, NY, USA, ACM
-
Z. Deng, X. Zhang, and D. Xu. Spider: Stealthy binary program instrumentation and debugging via hardware virtualization. In Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13, pages 289-298, New York, NY, USA, 2013. ACM.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13
, pp. 289-298
-
-
Deng, Z.1
Zhang, X.2
Xu, D.3
-
8
-
-
33745621075
-
Destructive-read in embedded dram, impact on power consumption
-
Apr.
-
H. Dybdahl, P. G. Kjeldsberg, M. Grannæs, and L. Natvig. Destructive-read in embedded dram, impact on power consumption. J. Embedded Comput., 2(2):249-260, Apr. 2006.
-
(2006)
J. Embedded Comput.
, vol.2
, Issue.2
, pp. 249-260
-
-
Dybdahl, H.1
Kjeldsberg, P.G.2
Grannæs, M.3
Natvig, L.4
-
9
-
-
84945192930
-
Missing the point(er): On the effectiveness of code pointer integrity
-
May
-
I. Evans, S. Fingeret, J. González, U. Otgonbaatar, T. Tang, H. Shrobe, S. Sidiroglou-Douskos, M. Rinard, and H. Okhravi. Missing the point(er): On the effectiveness of code pointer integrity. In 36th IEEE Symposium on Security and Privacy (Oakland), May 2015.
-
(2015)
36th IEEE Symposium on Security and Privacy (Oakland)
-
-
Evans, I.1
Fingeret, S.2
González, J.3
Otgonbaatar, U.4
Tang, T.5
Shrobe, H.6
Sidiroglou-Douskos, S.7
Rinard, M.8
Okhravi, H.9
-
10
-
-
84928142971
-
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
-
New York, NY, USA, ACM
-
J. Gionta, W. Enck, and P. Ning. Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15, pages 325-336, New York, NY, USA, 2015. ACM.
-
(2015)
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, CODASPY '15
, pp. 325-336
-
-
Gionta, J.1
Enck, W.2
Ning, P.3
-
12
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest we remember: cold-boot attacks on encryption keys. Communications of the ACM, 52(5):91-98, 2009.
-
(2009)
Communications of the ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
13
-
-
84889076199
-
Librando: Transparent code randomization for just-in-time compilers
-
ACM
-
A. Homescu, S. Brunthaler, P. Larsen, and M. Franz. Librando: transparent code randomization for just-in-time compilers. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, pages 993-1004. ACM, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security
, pp. 993-1004
-
-
Homescu, A.1
Brunthaler, S.2
Larsen, P.3
Franz, M.4
-
15
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
IEEE
-
C. Kil, J. Jim, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 339-348. IEEE, 2006.
-
(2006)
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual
, pp. 339-348
-
-
Kil, C.1
Jim, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
18
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
IEEE
-
V. Pappas, M. Polychronakis, and A. D. Keromytis. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 601-615. IEEE, 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 601-615
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
22
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
IEEE
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 574-588. IEEE, 2013.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 574-588
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
24
-
-
0039927533
-
Architectural support for copy and tamper resistant software
-
New York, NY, USA, ACM
-
D. L. C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS IX, pages 168-177, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS IX
, pp. 168-177
-
-
Thekkath, D.L.C.1
Mitchell, M.2
Lincoln, P.3
Boneh, D.4
Mitchell, J.5
Horowitz, M.6
-
26
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
April
-
P. Van Oorschot, A. Somayaji, and G. Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. Dependable and Secure Computing, IEEE Transactions on, 2(2):82-92, April 2005.
-
(2005)
Dependable and Secure Computing, IEEE Transactions on
, vol.2
, Issue.2
, pp. 82-92
-
-
Van Oorschot, P.1
Somayaji, A.2
Wurster, G.3
-
27
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
ACM
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 157-168. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
28
-
-
80052400545
-
Differentiating code from data in x86 binaries
-
Springer
-
R. Wartell, Y. Zhou, K. W. Hamlen, M. Kantarcioglu, and B. Thuraisingham. Differentiating code from data in x86 binaries. In Machine Learning and Knowledge Discovery in Databases, pages 522-536. Springer, 2011.
-
(2011)
Machine Learning and Knowledge Discovery in Databases
, pp. 522-536
-
-
Wartell, R.1
Zhou, Y.2
Hamlen, K.W.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
29
-
-
84945230261
-
Exploiting and protecting dynamic code generation
-
C. Song, C. Zhang, T. Wang, W. Lee, and D. Melski. Exploiting and protecting dynamic code generation. In Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium, 2015.
-
(2015)
Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium
-
-
Song, C.1
Zhang, C.2
Wang, T.3
Lee, W.4
Melski, D.5
|