-
1
-
-
84881191238
-
On the feasibility of online malware detection with performance counters
-
ACM
-
J. Demme, M. Maycock, J. Schmitz, A. Tang, A. Waksman, S. Sethumadhavan, and S. Stolfo, "On the feasibility of online malware detection with performance counters, " in Proceedings of the 40th Annual International Symposium on Computer Architecture, ISCA '13, (New York, NY, USA), pp. 559-570, ACM, 2013.
-
(2013)
Proceedings of the 40th Annual International Symposium on Computer Architecture, ISCA '13, (New York, NY, USA)
, pp. 559-570
-
-
Demme, J.1
Maycock, M.2
Schmitz, J.3
Tang, A.4
Waksman, A.5
Sethumadhavan, S.6
Stolfo, S.7
-
2
-
-
84959915583
-
-
Gartner [online] 2013
-
Gartner [online], " 2013.
-
-
-
-
3
-
-
84961288130
-
Getting in control of your control ow with control-data isolation
-
Feb
-
W. Arthur, B. Mehne, R. Das, and T. Austin, "Getting in control of your control ow with control-data isolation, " in Code Generation and Optimization (CGO), 2015 IEEE/ACM International Symposium on, pp. 79-90, Feb 2015.
-
(2015)
Code Generation and Optimization (CGO), 2015 IEEE/ACM International Symposium on
, pp. 79-90
-
-
Arthur, W.1
Mehne, B.2
Das, R.3
Austin, T.4
-
4
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "Stackguard: Automatic adaptive detection and prevention of buffer-overow attacks, " in Proceedings of the 7th USENIX Security Symposium, (Berkeley, CA, USA), USENIX Association, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium, (Berkeley, CA, USA), USENIX Association
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
5
-
-
85009448253
-
Pointguardtm: Protecting pointers from buffer overow vulnerabilities
-
SSYM'03, (Berkeley, CA, USA), USENIX Association
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, "Pointguardtm: Protecting pointers from buffer overow vulnerabilities, " in Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12, SSYM'03, (Berkeley, CA, USA), pp. 7-7, USENIX Association, 2003.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
, pp. 7
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
6
-
-
85084162336
-
Secure execution via program shepherding
-
V. Kiriansky, D. Bruening, S. P. Amarasinghe, et al., "Secure execution via program shepherding., " in USENIX Security Symposium, vol. 92, 2002.
-
(2002)
USENIX Security Symposium
, vol.92
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
7
-
-
33646767376
-
Control-ow integrity
-
November MSR-TR-2005-18, (Alexandria, VA)
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-ow integrity, " in ACM Conference on Computer and Communication Security (CCS), no. MSR-TR-2005-18, (Alexandria, VA), pp. 340-353, November 2005.
-
(2005)
ACM Conference on Computer and Communication Security (Ccs)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
8
-
-
85180625962
-
A generic and practical approach for defending against rop attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng, "A generic and practical approach for defending against rop attacks, " in Symposium on Network and Distributed System Security (NDSS 2014), 2014.
-
(2014)
Symposium on Network and Distributed System Security (NDSS 2014)
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R.H.5
-
11
-
-
84977859802
-
Transparent rop exploit mitigation using indirect branch tracing
-
V. Pappas, M. Polychronakis, and A. D. Keromytis, "Transparent rop exploit mitigation using indirect branch tracing., " in USENIX Security, pp. 447-462, 2013.
-
(2013)
USENIX Security
, pp. 447-462
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
12
-
-
49749131966
-
Architectural support for run-time validation of control ow transfer
-
Oct
-
Y. Shi, S. Dempsey, and G. Lee, "Architectural support for run-time validation of control ow transfer, " in Computer Design, 2006. ICCD 2006. International Conference on, pp. 506-513, Oct 2006.
-
(2006)
Computer Design, 2006. ICCD 2006. International Conference on
, pp. 506-513
-
-
Shi, Y.1
Dempsey, S.2
Lee, G.3
-
13
-
-
84866672217
-
Cfimon: Detecting violation of control ow integrity using performance counters
-
June
-
Y. Xia, Y. Liu, H. Chen, and B. Zang, "Cfimon: Detecting violation of control ow integrity using performance counters, " in Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, pp. 1-12, June 2012.
-
(2012)
Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on
, pp. 1-12
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
14
-
-
84881218812
-
Practical control ow integrity and randomization for binary executables
-
May
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, "Practical control ow integrity and randomization for binary executables, " in Security and Privacy (SP), 2013 IEEE Symposium on, pp. 559-573, May 2013.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
15
-
-
84893209370
-
Control-ow restrictor: Compiler-based cfi for ios
-
ACM
-
J. Pewny and T. Holz, "Control-ow restrictor: Compiler-based cfi for ios, " in Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13, (New York, NY, USA), pp. 309-318, ACM, 2013.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference, ACSAC '13, (New York, NY, USA)
, pp. 309-318
-
-
Pewny, J.1
Holz, T.2
-
16
-
-
84880311233
-
Store-load-branch (slb) predictor: A compiler assisted branch prediction for data dependent branches
-
Feb
-
M. Farooq, K. Khubaib, and L. John, "Store-load-branch (slb) predictor: A compiler assisted branch prediction for data dependent branches, " in High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on, pp. 59-70, Feb 2013.
-
(2013)
High Performance Computer Architecture (HPCA2013), 2013 IEEE 19th International Symposium on
, pp. 59-70
-
-
Farooq, M.1
Khubaib, K.2
John, L.3
-
17
-
-
84961292085
-
Branch prediction and the performance of interpreters; Don't trust folklore
-
Feb
-
E. Rohou, B. Swamy, and A. Seznec, "Branch prediction and the performance of interpreters; don't trust folklore, " in Code Generation and Optimization (CGO), 2015 IEEE/ACM International Symposium on, pp. 103-114, Feb 2015.
-
(2015)
Code Generation and Optimization (CGO), 2015 IEEE/ACM International Symposium on
, pp. 103-114
-
-
Rohou, E.1
Swamy, B.2
Seznec, A.3
-
19
-
-
85062385228
-
Stitching the gadgets: On the ineffiective ness of coarse-grained control-ow integrity protection
-
USENIX Association, Aug., (San Diego, CA)
-
L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose, "Stitching the gadgets: On the ineffiective ness of coarse-grained control-ow integrity protection, " in 23rd USENIX Security Symposium (USENIX Security 14), (San Diego, CA), pp. 401-416, USENIX Association, Aug. 2014.
-
(2014)
23rd USENIX Security Symposium (USENIX Security 14)
, pp. 401-416
-
-
Davi, L.1
Sadeghi, A.-R.2
Lehmann, D.3
Monrose, F.4
-
20
-
-
85041451135
-
Control ow integrity for cots binaries
-
USENIX, (Washington, D. C.)
-
M. Zhang and R. Sekar, "Control ow integrity for cots binaries, " in Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), (Washington, D. C.), pp. 337-352, USENIX, 2013.
-
(2013)
Presented As Part of the 22nd USENIX Security Symposium (USENIX Security 13)
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
-
21
-
-
68949189664
-
Virtual program counter (vpc) prediction: Very low cost indirect branch prediction using conditional branch prediction hardware
-
Sept
-
H. Kim, J. Joao, O. Mutlu, C. J. Lee, Y. Patt, and R. Cohn, "Virtual program counter (vpc) prediction: Very low cost indirect branch prediction using conditional branch prediction hardware, " Computers, IEEE Transactions on, vol. 58, pp. 1153-1170, Sept 2009.
-
(2009)
Computers, IEEE Transactions on
, vol.58
, pp. 1153-1170
-
-
Kim, H.1
Joao, J.2
Mutlu, O.3
Lee, C.J.4
Patt, Y.5
Cohn, R.6
-
23
-
-
83455220188
-
Tap prediction: Reusing conditional branch predictor for indirect branches with target address pointers
-
Oct
-
Z. Xie, D. Tong, M. Huang, X. Wang, Q. Shi, and X. Cheng, "Tap prediction: Reusing conditional branch predictor for indirect branches with target address pointers, " in Computer Design (ICCD), 2011 IEEE 29th International Conference on, pp. 119-126, Oct 2011.
-
(2011)
Computer Design (ICCD), 2011 IEEE 29th International Conference on
, pp. 119-126
-
-
Xie, Z.1
Tong, D.2
Huang, M.3
Wang, X.4
Shi, Q.5
Cheng, X.6
-
24
-
-
84859464490
-
The gem5 simulator
-
Aug.
-
N. Binkert, B. Beckmann, G. Black, S. K. Reinhardt, A. Saidi, A. Basu, J. Hestness, D. R. Hower, T. Krishna, S. Sardashti, R. Sen, K. Sewell, M. Shoaib, N. Vaish, M. D. Hill, and D. A. Wood, "The gem5 simulator, " SIGARCH Comput. Archit. News, vol. 39, pp. 1-7, Aug. 2011.
-
(2011)
SIGARCH Comput. Archit. News
, vol.39
, pp. 1-7
-
-
Binkert, N.1
Beckmann, B.2
Black, G.3
Reinhardt, S.K.4
Saidi, A.5
Basu, A.6
Hestness, J.7
Hower, D.R.8
Krishna, T.9
Sardashti, S.10
Sen, R.11
Sewell, K.12
Shoaib, M.13
Vaish, N.14
Hill, M.D.15
Wood, D.A.16
-
25
-
-
85026955891
-
-
Standard performance evaluation corporation[online]
-
Standard performance evaluation corporation[online]. "
-
-
-
-
27
-
-
76749146060
-
Mcpat: An integrated power, area, and timing modeling framework for multicore and manycore architectures
-
Dec
-
S. Li, J. H. Ahn, R. Strong, J. Brockman, D. Tullsen, and N. Jouppi, "Mcpat: An integrated power, area, and timing modeling framework for multicore and manycore architectures, " in Microarchitecture, 2009. MICRO-42. 42nd Annual IEEE/ACM International Symposium on, pp. 469-480, Dec 2009.
-
(2009)
Microarchitecture, 2009. MICRO-42. 42nd Annual IEEE/ACM International Symposium on
, pp. 469-480
-
-
Li, S.1
Ahn, J.H.2
Strong, R.3
Brockman, J.4
Tullsen, D.5
Jouppi, N.6
-
28
-
-
67649661466
-
Cacti 5. 1
-
April
-
S. Thoziyoor, N. Muralimanohar, J. H. Ahn, and N. P. Jouppi, "Cacti 5. 1, " HP Laboratories, April, vol. 2, p. 24, 2008.
-
(2008)
HP Laboratories
, vol.2
, pp. 24
-
-
Thoziyoor, S.1
Muralimanohar, N.2
Ahn, J.H.3
Jouppi, N.P.4
-
29
-
-
84903161773
-
Hardware-assisted fine-grained control-ow integrity: Towards efficient protection of embedded systems against software exploitation
-
June
-
L. Davi, P. Koeberl, and A.-R. Sadeghi, "Hardware-assisted fine-grained control-ow integrity: Towards efficient protection of embedded systems against software exploitation, " in Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE, pp. 1-6, June 2014.
-
(2014)
Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE
, pp. 1-6
-
-
Davi, L.1
Koeberl, P.2
Sadeghi, A.-R.3
|