-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC), 13(1):4, 2009.
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.1
, pp. 4
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
ACM
-
T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang. Jump-oriented programming: A new class of code-reuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 30-40. ACM, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
6
-
-
85180625962
-
Ropecker: A generic and practical approach for defending against rop attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng. Ropecker: A generic and practical approach for defending against rop attacks. In Symposium on Network and Distributed System Security (NDSS), 2014.
-
(2014)
Symposium on Network and Distributed System Security (NDSS)
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R.H.5
-
7
-
-
79956032720
-
Ropdefender: A detection tool to defend against return-oriented programming attacks
-
ACM
-
L. Davi, A.-R. Sadeghi, and M. Winandy. Ropdefender: A detection tool to defend against return-oriented programming attacks. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 40-51. ACM, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 40-51
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
8
-
-
78651539599
-
Xfi: Software guards for system address spaces
-
USENIX Association
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. Xfi: Software guards for system address spaces. In Proceedings of the 7th symposium on Operating systems design and implementation, pages 75-88. USENIX Association, 2006.
-
(2006)
Proceedings of the 7th Symposium on Operating Systems Design and Implementation
, pp. 75-88
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.C.5
-
9
-
-
84945192930
-
Missing the point (er): On the effectiveness of code pointer integrity1
-
I. Evans, S. Fingeret, J. Gonzalez, U. Otgonbaatar, T. Tang, H. Shrobe, S. Sidiroglou-Douskos, M. Rinard, and H. Okhravi. Missing the point (er): On the effectiveness of code pointer integrity1. In Security and Privacy (SP), 2015.
-
(2015)
Security and Privacy (SP)
-
-
Evans, I.1
Fingeret, S.2
Gonzalez, J.3
Otgonbaatar, U.4
Tang, T.5
Shrobe, H.6
Sidiroglou-Douskos, S.7
Rinard, M.8
Okhravi, H.9
-
10
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
IEEE
-
E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis. Out of control: Overcoming control-flow integrity. In Security and Privacy (SP), 2014 IEEE Symposium on, pages 575-589. IEEE, 2014.
-
(2014)
Security and Privacy (SP), 2014 IEEE Symposium on
, pp. 575-589
-
-
Goktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
12
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014.
-
(2014)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
13
-
-
85072935637
-
Evaluating sfi for a cisc architecture
-
S. McCamant and G. Morrisett. Evaluating sfi for a cisc architecture. In Usenix Security, page 15, 2006.
-
(2006)
Usenix Security
, pp. 15
-
-
McCamant, S.1
Morrisett, G.2
-
14
-
-
84959417310
-
Opaque control-flow integrity
-
V. Mohan, P. Larsen, S. Brunthaler, K. Hamlen, and M. Franz. Opaque control-flow integrity. In Symposium on Network and Distributed System Security (NDSS), 2015.
-
(2015)
Symposium on Network and Distributed System Security (NDSS)
-
-
Mohan, V.1
Larsen, P.2
Brunthaler, S.3
Hamlen, K.4
Franz, M.5
-
19
-
-
84877996319
-
Enforcing system-wide control flow integrity for exploit detection and diagnosis
-
ACM
-
A. Prakash, H. Yin, and Z. Liang. Enforcing system-wide control flow integrity for exploit detection and diagnosis. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 311-322. ACM, 2013.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 311-322
-
-
Prakash, A.1
Yin, H.2
Liang, Z.3
-
20
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information and System Security (TISSEC), 15(1):2, 2012.
-
(2012)
ACM Transactions on Information and System Security (TISSEC)
, vol.15
, Issue.1
, pp. 2
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
23
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC & llvm
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, U. Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-flow integrity in gcc & llvm. In USENIX Security Symposium, 2014.
-
(2014)
USENIX Security Symposium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
24
-
-
0027836576
-
Efficient software-based fault isolation
-
pages 203-216. ACM
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In ACM SIGOPS Operating Systems Review, volume 27, pages 203-216. ACM, 1994.
-
(1994)
ACM SIGOPS Operating Systems Review
, vol.27
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
25
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
IEEE
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In Security and Privacy, 2009 30th IEEE Symposium on, pages 79-93. IEEE, 2009.
-
(2009)
Security and Privacy, 2009 30th IEEE Symposium on
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
26
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
IEEE
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control flow integrity and randomization for binary executables. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 559-573. IEEE, 2013.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
27
-
-
85041451135
-
Control flow integrity for cots binaries
-
M. Zhang and R. Sekar. Control flow integrity for cots binaries. In Usenix Security, pages 337-352, 2013.
-
(2013)
Usenix Security
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
|