-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, “Control-flow integrity principles, implementations, and applications, ” ACM Trans. Information and System Security (TISSEC), vol. 13, no. 1, 2009.
-
(2009)
ACM Trans. Information and System Security (TISSEC)
, vol.13
, Issue.1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
2
-
-
85025171717
-
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
-
M. Backes and S. Nürnberger, “Oxymoron: Making fine-grained memory randomization practical by allowing code sharing, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 433-447.
-
(2014)
Proc. 23rd Usenix Security Sym
, pp. 433-447
-
-
Backes, M.1
Nürnberger, S.2
-
3
-
-
84910680268
-
You can run but you can't read: Preventing disclosure exploits in executable code
-
M. Backes, T. Holz, B. Kollenda, P. Koppe, S. Nürnberger, and J. Pewny, “You can run but you can't read: Preventing disclosure exploits in executable code, ” in Proc. 21st ACM Conf. Computer and Communications Security (CCS), 2014, pp. 1342-1353.
-
(2014)
Proc. 21st ACM Conf. Computer and Communications Security (CCS)
, pp. 1342-1353
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
4
-
-
84914132233
-
Hacking blind
-
A. Bittau, A. Belay, A. Mashtizadeh, D. Mazières, and D. Boneh, “Hacking blind, ” in Proc. 35th IEEE Sym. Security & Privacy (S&P), 2014, pp. 227-242.
-
(2014)
Proc. 35th IEEE Sym. Security & Privacy (S&P)
, pp. 227-242
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazières, D.4
Boneh, D.5
-
5
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. K. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang, “Jump-oriented programming: A new class of code-reuse attack, ” in Proc. 6th ACM Sym. Information, Computer and Communications Security (ASIACCS), 2011, pp. 30-40.
-
(2011)
Proc. 6th ACM Sym. Information, Computer and Communications Security (ASIACCS)
, pp. 30-40
-
-
Bletsch, T. K.1
Jiang, X.2
Freeh, V. W.3
Liang, Z.4
-
6
-
-
85076293126
-
ROP is still dangerous: Breaking modern defenses
-
N. Carlini and D. Wagner, “ROP is still dangerous: Breaking modern defenses, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 385-399.
-
(2014)
Proc. 23rd Usenix Security Sym
, pp. 385-399
-
-
Carlini, N.1
Wagner, D.2
-
7
-
-
85180625962
-
ROPecker: A generic and practical approach for defending against ROP attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng, “ROPecker: A generic and practical approach for defending against ROP attacks, ” in Proc. 21st Annual Network & Distributed System Security Sym. (NDSS), 2014.
-
(2014)
Proc. 21st Annual Network & Distributed System Security Sym. (NDSS)
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R. H.5
-
8
-
-
0027684663
-
Operating system protection through program evolution
-
F. Cohen, “Operating system protection through program evolution, ” Computers and Security, vol. 12, no. 6, pp. 565-584, 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
9
-
-
85180555739
-
-
Corelan Team, “Mona, ” 2014, https://github.com/corelan/mona.
-
(2014)
Mona
-
-
-
10
-
-
85080743214
-
Isomeron: Code randomization resilient to (just-in-time) return-oriented programming
-
L. Davi, C. Liebchen, A.-R. Sadeghi, K. Z. Snow, and F. Monrose, “Isomeron: Code randomization resilient to (just-in-time) return-oriented programming, ” in Proc. 22nd Network and Distributed Systems Security Sym. (NDSS), 2015.
-
(2015)
Proc. 22nd Network and Distributed Systems Security Sym. (NDSS)
-
-
Davi, L.1
Liebchen, C.2
Sadeghi, A.-R.3
Snow, K. Z.4
Monrose, F.5
-
11
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose, “Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 401-416.
-
(2014)
Proc. 23rd Usenix Security Sym
, pp. 401-416
-
-
Davi, L.1
Sadeghi, A.-R.2
Lehmann, D.3
Monrose, F.4
-
12
-
-
85180547518
-
Bypassing EMET 4.1
-
J. DeMott, “Bypassing EMET 4.1, ” Bromium Labs, 2014, http://labs.bromium.com/2014/02/24/bypassing-emet-4-1.
-
(2014)
Bromium Labs
-
-
DeMott, J.1
-
15
-
-
0030697765
-
Building diverse computer systems
-
S. Forrest, A. Somayaji, and D. H. Ackley, “Building diverse computer systems, ” in Proc. Workshop Hot Topics in Operating Systems, 1997, pp. 67-72.
-
(1997)
Proc. Workshop Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D. H.3
-
17
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, “Enhanced operating system security through efficient and fine-grained address space randomization, ” in Proc. 21st USENIX Security Sym., 2012, pp. 475-490.
-
(2012)
Proc. 21st USENIX Security Sym
, pp. 475-490
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A. S.3
-
18
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
E. Göktaş, E. Athanasopoulos, H. Bos, and G. Portokalidis, “Out of control: Overcoming control-flow integrity, ” in Proc. 35th IEEE Sym. Security & Privacy (S&P), 2014, pp. 575-589.
-
(2014)
Proc. 35th IEEE Sym. Security & Privacy (S&P)
, pp. 575-589
-
-
Göktaş, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
19
-
-
84977858681
-
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
-
E. Göktaş, E. Athanasopoulos, M. Polychronakis, H. Bos, and G. Portokalidis, “Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 417-432.
-
(2014)
Proc. 23rd Usenix Security Sym
, pp. 417-432
-
-
Göktaş, E.1
Athanasopoulos, E.2
Polychronakis, M.3
Bos, H.4
Portokalidis, G.5
-
20
-
-
85084161742
-
Microgadgets: Size does matter in Turing-complete return-oriented programming
-
A. Homescu, M. Stewart, P. Larsen, S. Brunthaler, and M. Franz, “Microgadgets: Size does matter in Turing-complete return-oriented programming, ” in Proc. 6th USENIX Workshop Offensive Technologies (WOOT), 2012, pp. 64-76.
-
(2012)
Proc. 6th USENIX Workshop Offensive Technologies (WOOT)
, pp. 64-76
-
-
Homescu, A.1
Stewart, M.2
Larsen, P.3
Brunthaler, S.4
Franz, M.5
-
21
-
-
84889076199
-
Librando: Transparent code randomization for just-in-time compilers
-
A. Homescu, S. Brunthaler, P. Larsen, and M. Franz, “Librando: Transparent code randomization for just-in-time compilers, ” in Proc. 20th ACM Conf. Computer and Communications Security (CCS), 2013, pp. 993-1004.
-
(2013)
Proc. 20th ACM Conf. Computer and Communications Security (CCS)
, pp. 993-1004
-
-
Homescu, A.1
Brunthaler, S.2
Larsen, P.3
Franz, M.4
-
22
-
-
84876901222
-
Profile-guided automated software diversity
-
A. Homescu, S. Neisius, P. Larsen, S. Brunthaler, and M. Franz, “Profile-guided automated software diversity, ” in Proc. 11th IEEE/ACM Int. Sym. Code Generation and Optimization (CGO), 2013, pp. 1-11.
-
(2013)
Proc. 11th IEEE/ACM Int. Sym. Code Generation and Optimization (CGO)
, pp. 1-11
-
-
Homescu, A.1
Neisius, S.2
Larsen, P.3
Brunthaler, S.4
Franz, M.5
-
23
-
-
0019049469
-
An approach to the problem of detranslation of computer programs
-
R. N. Horspool and N. Marovac, “An approach to the problem of detranslation of computer programs, ” The Computer J., vol. 23, no. 3, pp. 223-229, 1980.
-
(1980)
The Computer J
, vol.23
, Issue.3
, pp. 223-229
-
-
Horspool, R. N.1
Marovac, N.2
-
26
-
-
84914171887
-
Advanced exploitation of Internet Explorer 10/Windows 8 overflow (Pwn2Own 2013)
-
N. Joly, “Advanced exploitation of Internet Explorer 10/Windows 8 overflow (Pwn2Own 2013), ” VUPEN Vulnerability Research Team (VRT), 2013, http://www.vupen.com/blog/20130522.Advanced_Exploitation_of_IE10_Windows8_Pwn2Own_2013.php.
-
(2013)
VUPEN Vulnerability Research Team (VRT)
-
-
Joly, N.1
-
27
-
-
84914111191
-
SoK: Automated software diversity
-
P. Larsen, A. Homescu, S. Brunthaler, and M. Franz, “SoK: Automated software diversity, ” in Proc. 35th IEEE Sym. Security & Privacy (S&P), 2014, pp. 276-291.
-
(2014)
Proc. 35th IEEE Sym. Security & Privacy (S&P)
, pp. 276-291
-
-
Larsen, P.1
Homescu, A.2
Brunthaler, S.3
Franz, M.4
-
33
-
-
84977859802
-
Transparent ROP exploit mitigation using indirect branch tracing
-
V. Pappas, M. Polychronakis, and A. D. Keromytis, “Transparent ROP exploit mitigation using indirect branch tracing, ” in Proc. 22nd USENIX Security Sym., 2013, pp. 447-462.
-
(2013)
Proc. 22nd USENIX Security Sym
, pp. 447-462
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A. D.3
-
35
-
-
84910683130
-
Information leaks without memory disclosures: Remote side channel attacks on diversified code
-
J. Seibert, H. Okhravi, and E. Söderström, “Information leaks without memory disclosures: Remote side channel attacks on diversified code, ” in Proc. 21st ACM Conf. Computer and Communications Security (CCS), 2014, pp. 54-65.
-
(2014)
Proc. 21st ACM Conf. Computer and Communications Security (CCS)
, pp. 54-65
-
-
Seibert, J.1
Okhravi, H.2
Söderström, E.3
-
36
-
-
84937679667
-
The info leak era on software exploitation
-
F. J. Serna, “The info leak era on software exploitation, ” Black Hat USA, 2012.
-
(2012)
Black Hat USA
-
-
Serna, F. J.1
-
37
-
-
85180548416
-
CVE-2012-0769, the case of the perfect info leak
-
F. J. Serna, “CVE-2012-0769, the case of the perfect info leak, ” Google Security Team, 2012, http://zhodiac.hispahack.com/my-stuff/security/Flash_ASLR_bypass.pdf.
-
(2012)
Google Security Team
-
-
Serna, F. J.1
-
38
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), ” in Proc. 14th ACM Conf. Computer and Communications Security (CCS), 2007, pp. 552-561.
-
(2007)
Proc. 14th ACM Conf. Computer and Communications Security (CCS)
, pp. 552-561
-
-
Shacham, H.1
-
39
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, “On the effectiveness of address-space randomization, ” in Proc. 11th ACM Conf. Computer and Communications Security (CCS), 2004, pp. 298-307.
-
(2004)
Proc. 11th ACM Conf. Computer and Communications Security (CCS)
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
40
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
K. Z. Snow, F. Monrose, L. V. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi, “Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization, ” in Proc. 34th IEEE Sym. Security & Privacy (S&P), 2013, pp. 574-588.
-
(2013)
Proc. 34th IEEE Sym. Security & Privacy (S&P)
, pp. 574-588
-
-
Snow, K. Z.1
Monrose, F.2
Davi, L. V.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
41
-
-
78649987048
-
Heap feng shui in JavaScript
-
A. Sotirov, “Heap feng shui in JavaScript, ” Black Hat Europe, 2007, https://www.blackhat.com/presentations/bh-europe07/Sotirov/Presentation/bh-eu-07-sotirov-apr19.pdf.
-
(2007)
Black Hat Europe
-
-
Sotirov, A.1
-
42
-
-
70349100695
-
Breaking the memory secrecy assumption
-
R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and T. Walter, “Breaking the memory secrecy assumption, ” in Proc. 2nd European Workshop System Security (EUROSEC), 2009, pp. 1-8.
-
(2009)
Proc. 2nd European Workshop System Security (EUROSEC)
, pp. 1-8
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
43
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC & LLVM
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, Ú. Erlingsson, L. Lozano, and G. Pike, “Enforcing forward-edge control-flow integrity in GCC & LLVM, ” in Proc. 23rd USENIX Security Sym., 2014.
-
(2014)
Proc. 23rd USENIX Security Sym
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, Ú.5
Lozano, L.6
Pike, G.7
-
44
-
-
0012037951
-
-
University of Virginia Charlottesville, Tech. Rep
-
C. Wang, J. Hill, J. Knight, and J. Davidson, “Software tamper resistance: Obstructing static analysis of programs, ” University of Virginia Charlottesville, Tech. Rep., 2000.
-
(2000)
Software tamper resistance: Obstructing static analysis of programs
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
45
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, “Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code, ” in Proc. 19th ACM Conf. Computer and Communications Security (CCS), 2012, pp. 157-168.
-
(2012)
Proc. 19th ACM Conf. Computer and Communications Security (CCS)
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K. W.3
Lin, Z.4
-
46
-
-
84872114405
-
Securing untrusted code via compiler-agnostic binary rewriting
-
R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, “Securing untrusted code via compiler-agnostic binary rewriting, ” in Proc. 28th Annual Computer Security Applications Conf. (ACSAC), 2012, pp. 299-308.
-
(2012)
Proc. 28th Annual Computer Security Applications Conf. (ACSAC)
, pp. 299-308
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K. W.3
Lin, Z.4
-
47
-
-
84901275623
-
Shingled graph disassembly: Finding the undecidable path
-
R. Wartell, Y. Zhou, K. W. Hamlen, and M. Kantarcioglu, “Shingled graph disassembly: Finding the undecidable path, ” in Proc. 18th Pacific-Asia Conf. Knowledge Discovery and Data Mining (PAKDD), 2014, pp. 273-285.
-
(2014)
Proc. 18th Pacific-Asia Conf. Knowledge Discovery and Data Mining (PAKDD)
, pp. 273-285
-
-
Wartell, R.1
Zhou, Y.2
Hamlen, K. W.3
Kantarcioglu, M.4
-
48
-
-
69149106605
-
Native Client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, “Native Client: A sandbox for portable, untrusted x86 native code, ” in Proc. 30th IEEE Sym. Security & Privacy (S&P), 2009, pp. 79-93.
-
(2009)
Proc. 30th IEEE Sym. Security & Privacy (S&P)
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J. B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
49
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, “Practical control flow integrity and randomization for binary executables, ” in Proc. 34th IEEE Sym. Security & Privacy (S&P), 2013, pp. 559-573.
-
(2013)
Proc. 34th IEEE Sym. Security & Privacy (S&P)
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|