-
2
-
-
78650616819
-
Dangling pointer: Smashing the pointer for fun and profit
-
J. Afek and A. Sharabani. Dangling pointer: Smashing the pointer for fun and profit. Black Hat USA, 2007.
-
(2007)
Black Hat USA
-
-
Afek, J.1
Sharabani, A.2
-
3
-
-
84954556400
-
Apple
-
Apple. Sunspider 1.0.2. https://www.webkit.org/perf/sunspider/sunspider.html, 2014.
-
(2014)
Sunspider 1.0.2
-
-
-
4
-
-
0034449842
-
Dynamo: A transparent dynamic optimization system
-
V. Bala, E. Duesterwald, and S. Banerjia. Dynamo: A transparent dynamic optimization system. ACM SIGPLAN Notices, 35(5):1-12, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.5
, pp. 1-12
-
-
Bala, V.1
Duesterwald, E.2
Banerjia, S.3
-
5
-
-
16644362894
-
Randomized instruction set emulation
-
Feb
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovíc. Randomized instruction set emulation. ACM Trans. Inf. Syst. Secur., 8(1):3-40, Feb. 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovíc, D.4
-
6
-
-
67650259451
-
Working draft, standard for programming language c++
-
P. Becker et al. Working draft, standard for programming language c++. Technical report, Technical Report, 2011.
-
(2011)
Technical Report, Technical Report
-
-
Becker, P.1
-
7
-
-
21144446241
-
A survey of empirical results on program slicing
-
D. Binkley and M. Harman. A Survey of Empirical Results on Program Slicing. Advances in Computing, 62:105-178, 2003.
-
(2003)
Advances in Computing
, vol.62
, pp. 105-178
-
-
Binkley, D.1
Harman, M.2
-
8
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang. Jump-oriented programming: A new class of code-reuse attack. In ACM Symposium on Information, Computer and Communications Security, 2011.
-
(2011)
ACM Symposium on Information, Computer and Communications Security
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
12
-
-
84914171884
-
Practical return-oriented programming
-
D. Dai Zovi. Practical return-oriented programming. SOURCE Boston, 2010.
-
(2010)
SOURCE Boston
-
-
Dai Zovi, D.1
-
14
-
-
0030259788
-
The direct cost of virtual function calls in c++
-
K. Driesen U. Hölzle The direct cost of virtual function calls in c++.. ACM Sigplan Notices 31( 10) 306-323 1996.
-
(1996)
ACM Sigplan Notices
, vol.31
, Issue.10
, pp. 306-323
-
-
Driesen, K.1
Hölzle, U.2
-
15
-
-
77955173824
-
REIL: A platform-independent intermediate representation of disassembled code for static code analysis
-
T. Dullien and S. Porst. REIL: A platform-independent intermediate representation of disassembled code for static code analysis. CanSecWest, 2009.
-
(2009)
CanSecWest
-
-
Dullien, T.1
Porst, S.2
-
16
-
-
84954468307
-
FireEye
-
FireEye. Operation SnowMan. http://goo.gl/NL0ZmV, 2014.
-
(2014)
Operation SnowMan
-
-
-
18
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security Symposium, 2012.
-
(2012)
USENIX Security Symposium
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
23
-
-
84893931163
-
Recovering c++ objects from binaries using inter-procedural data-flow analysis
-
ACM
-
W. Jin, C. Cohen, J. Genna ri, C. Hines, S. Chaki, A. Gurfinkel, J. Havrilla, and P. Narasimhan. Recovering c++ objects from binaries using inter-procedural data-flow analysis. In Proceedings of ACM SIGPLAN on Program Protection and Reverse Eng ineering Workshop 2014, page 1. ACM, 2014.
-
(2014)
Proceedings of ACM SIGPLAN on Program Protection and Reverse Eng Ineering Workshop 2014
, pp. 1
-
-
Jin, W.1
Cohen, C.2
Gennari, J.3
Hines, C.4
Chaki, S.5
Gurfinkel, A.6
Havrilla, J.7
Narasimhan, P.8
-
24
-
-
84954533785
-
Using virtual table protections to prevent the exploitation of object corruption vulnerabilities 2010
-
K. D. Johnson and M. R. Miller. Using virtual table protections to prevent the exploitation of object corruption vulnerabilities, 2010. US Patent App. 12/958,668.
-
-
-
Johnson, K.D.1
Miller, M.R.2
-
25
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jim, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Annual Computer Security Applicati ons Conference (ACSAC), 2006.
-
(2006)
Annual Computer Security Applicati Ons Conference (ACSAC
-
-
Kil, C.1
Jim, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
27
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. Acm Sigplan Notices, 40(6):190-200, 2005.
-
(2005)
Acm Sigplan Notices
, vol.40
, Issue.6
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
31
-
-
84979252604
-
Exec shield, new lin ux security feature
-
May
-
I. Molnar. Exec shield, new lin ux security feature. News-Forge, May, 2003.
-
(2003)
News-Forge
-
-
Molnar, I.1
-
33
-
-
84954498627
-
Mozilla
-
Moz illa. Kraken Benchmark Suite. http://krakenbenchmark.mozilla.org/, 2014.
-
(2014)
Kraken Benchmark Suite
-
-
-
34
-
-
79960860887
-
Retrofitting security in cots softw are with binary rewriting
-
Springer
-
P. O'Sullivan, K. Anand, A. Kotha, M. Smithson, R. Barua, and A. D. Keromytis. Retrofitting security in cots softw are with binary rewriting. In Future Challenges in Security and Privacy for Academia and Industry, pages 154-172. Springer, 2011.
-
(2011)
Future Challenges in Security and Privacy for Academia and Industry
, pp. 154-172
-
-
O'Sullivan, P.1
Anand, K.2
Kotha, A.3
Smithson, M.4
Barua, R.5
Keromytis, A.D.6
-
35
-
-
0034197208
-
Rose: Compiler support for object-oriented frameworks
-
D. Quinlan. ROSE: Compiler Support for Object-oriented Frameworks. Parallel Processing Letters, 10(02/03), 2000.
-
(2000)
Parallel Processing Letters
, vol.10
, Issue.2-3
-
-
Quinlan, D.1
-
37
-
-
84881254045
-
The info leak era on software exploitation
-
F. J. Serna. The info leak era on software exploitation. Black Hat USA, 2012.
-
(2012)
Black Hat USA
-
-
Serna, F.J.1
-
38
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS
-
-
Shacham, H.1
-
39
-
-
84863836286
-
A vocabulary of program slicing-based techniques
-
J. Silva. A vocabulary of program slicing-based techniques. ACM Computing Surveys (CSUR), 44(3):12, 2012.
-
(2012)
ACM Computing Surveys (CSUR
, vol.44
, Issue.3
, pp. 12
-
-
Silva, J.1
-
40
-
-
78649987048
-
Heap feng shui in javascript
-
A. Sotirov. Heap Feng Shui in JavaScript. Black Hat Europe, 2007.
-
(2007)
Black Hat Europe
-
-
Sotirov, A.1
-
41
-
-
0004349103
-
Vulcan: Binary transformation in a distributed environment
-
A. Srivastava, A. Edwards, and H. Vo. Vulcan: Binary transformation in a distributed environment. Technical report, technical report msr-tr-2001-50, microsoft research, 2001.
-
(2001)
Technical Report, Technical Report msr-tr-2001-50, Microsoft Research
-
-
Srivastava, A.1
Edwards, A.2
Vo, H.3
-
42
-
-
84954558278
-
-
John Wiley and Sons Ltd
-
B. Stroustrup. C++. John Wiley and Sons Ltd., 2003.
-
(2003)
C++
-
-
Stroustrup, B.1
-
44
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC & llvm
-
C. Tice, T. Roeder, P. Collin gbourne, S. Checkoway, U. Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-flow integrity in gcc & llvm. In USENIX Security Symposium, 2014.
-
(2014)
USENIX Security Symposium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
46
-
-
84954500767
-
Dep/aslr bypass witho ut rop/jit
-
Y. Yang. DEP/ASLR bypass witho ut ROP/JIT. CanSecWest, 2013.
-
(2013)
CanSecWest
-
-
Yang, Y.1
-
47
-
-
84881218812
-
Practical control flow integrity & randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical Control Flow Integrity & Randomization for Binary Executables. In IEEE Symposium on Security and Privacy, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|