-
1
-
-
34250009730
-
Cyberinsurance in IT security management
-
May/Jun.
-
W. Baer and A. Parkinson, "Cyberinsurance in IT security management," IEEE Secur. Privacy, vol. 5, no. 3, pp. 50-56, May/Jun. 2007.
-
(2007)
IEEE Secur. Privacy
, vol.5
, Issue.3
, pp. 50-56
-
-
Baer, W.1
Parkinson, A.2
-
2
-
-
59449108823
-
-
National Institute of Standards and Technology [Online]. Available
-
National Institute of Standards and Technology. (2012). NIST National Vulnerability Database [Online]. Available: http://nvd.nist.gov.
-
(2012)
NIST National Vulnerability Database
-
-
-
3
-
-
34247170052
-
Backwards-compatible array bounds checking forCwith very low overhead
-
[Online]. Available
-
D. Dhurjati and V. Adve, "Backwards-compatible array bounds checking forCwith very low overhead," in Proc. Int. Conf. Softw. Eng. (ICSE), 2006, pp. 162-171 [Online]. Available: http://doi.acm.org/10.1145/1134285.1134309.
-
(2006)
Proc. Int. Conf. Softw. Eng. (ICSE)
, pp. 162-171
-
-
Dhurjati, D.1
Adve, V.2
-
4
-
-
77957796156
-
Hardbound: Architectural support for spatial safety of the C programming language
-
[Online]. Available
-
J. Devietti, C. Blundell, M. M. K. Martin, S. Zdancewic, "Hardbound: Architectural support for spatial safety of the C programming language," in Proc. Int. Conf. Archit. Support Program. Languages Oper. Syst. (ASPLOS), 2008, pp. 103-114 [Online]. Available: http://doi.acm.org/10.1145/1346281.1346295.
-
(2008)
Proc. Int. Conf. Archit. Support Program. Languages Oper. Syst. (ASPLOS)
, pp. 103-114
-
-
Devietti, J.1
Blundell, C.2
Martin, M.M.K.3
Zdancewic, S.4
-
5
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
[Online]. Available
-
G. E. Suh, J. W. Lee, D. Zhang, S. Devadas, "Secure program execution via dynamic information flow tracking," in Proc. Int. Conf. Archit. Support Program. Languages Oper. Syst. (ASPLOS), 2004, pp. 85-96 [Online]. Available: http://doi.acm.org/10.1145/1024393.1024404.
-
(2004)
Proc. Int. Conf. Archit. Support Program. Languages Oper. Syst. (ASPLOS)
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
6
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
[Online]. Available http://doi.acm.org/10.1145/1250662.1250722
-
M. Dalton, H. Kannan, C. Kozyrakis, "Raksha: A flexible information flow architecture for software security," in Proc. Ann. Int. Symp. Comput. Archit. (ISCA), 2007, pp. 482-493 [Online]. Available: http://doi.acm.org/10.1145/1024393.1024404http://doi.acm.org/10.1145/1250662.1250722.
-
(2007)
Proc. Ann. Int. Symp. Comput. Archit. (ISCA)
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
7
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov. [Online]. Available
-
Aleph One. (1996, Nov.) "Smashing the Stack for Fun and Profit," Phrack Magazine, vol. 7, no. 49, pp. 14-16 [Online]. Available: http://phrack.org/issues/49/14.html
-
(1996)
Phrack Magazine
, vol.7
, Issue.49
, pp. 14-16
-
-
One, A.1
-
8
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
Jul. [Online]. Available
-
J. Pincus and B. Baker, "Beyond stack smashing: Recent advances in exploiting buffer overruns," IEEE Secur. Privacy, vol. 2, no. 4, pp. 20-27, Jul. 2004 [Online]. Available: http://dl.acm.org/citation. cfm?id=1018027.1018271.
-
(2004)
IEEE Secur. Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
9
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. USENIX Secur., 1998, vol. 7, pp. 346-355.
-
(1998)
Proc. USENIX Secur.
, vol.7
, pp. 346-355
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
10
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
A. Baratloo, N. Singh, T. Tsai, "Transparent run-time defense against stack smashing attacks," in Proc. USENIX Ann. Tech. Conf., 2000, pp. 251-262.
-
(2000)
Proc. USENIX Ann. Tech. Conf.
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
12
-
-
2642520196
-
A binary rewriting defense against stack based overflow attacks
-
M. Prasad and T. cker Chiueh, "A binary rewriting defense against stack based overflow attacks," in Proc. USENIX Ann. Tech. Conf., 2003, pp. 211-224.
-
(2003)
Proc. USENIX Ann. Tech. Conf.
, pp. 211-224
-
-
Prasad, M.1
Cker Chiueh, T.2
-
14
-
-
84864849849
-
Part 3: Memory protection technologies
-
Microsoft Corp [Online]. Available
-
S. Andersen, "Part 3: Memory protection technologies," Changes to Functionality in Microsoft WindowsXPService Pack 2. Microsoft Corp., 2004 [Online]. Available: http://technet.microsoft.com/en-us/library/bb457155.aspx.
-
(2004)
Changes to Functionality in Microsoft Windows XP Service Pack 2
-
-
Andersen, S.1
-
15
-
-
77952351839
-
The geometry of innocent flesh on the bone: Returninto-libc without function calls (on the x86)
-
Oct.
-
H. Shacham, "The geometry of innocent flesh on the bone: Returninto-libc without function calls (on the x86)," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), Oct. 2007, pp. 552-561.
-
(2007)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 552-561
-
-
Shacham, H.1
-
16
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
[Online]. Available
-
E. Buchanan, R. Roemer, H. Shacham, S. Savage, "When good instructions go bad: Generalizing return-oriented programming to RISC," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2008, pp. 27-38 [Online]. Available: http://doi.acm.org/10.1145/1455770.1455776.
-
(2008)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
18
-
-
79956057382
-
Developments in Cisco IOs forensics
-
[Online] Available
-
F. Lindner. (2009). Developments in Cisco IOs forensics. Confidence 2.0. Presentation. [Online]. Available: http://www.recurity-labs.com/content/pub/FX-Router-Exploitation.pdf.
-
(2009)
Confidence 2.0. Presentation
-
-
Lindner, F.1
-
19
-
-
84861443711
-
Can DREs provide long-lasting security? the case of return-oriented programming and theAVCadvantage
-
Aug. [Online]. Available
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, H. Shacham, "Can DREs provide long-lasting security? The case of return-oriented programming and theAVCadvantage," in Proc. Conf. Electron. Voting Technol./Workshop Trustworthy Elections (EVT/WOTE), Aug. 2009 [Online]. Available: https://cs.ucsd.edu/~scheckow/papers/evt2009.html.
-
(2009)
Proc. Conf. Electron. Voting Technol./Workshop Trustworthy Elections (EVT/WOTE)
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Halderman, J.A.4
Felten, E.W.5
Shacham, H.6
-
20
-
-
78650024047
-
-
Syst. Secur. Lab, Ruhr University Bochum, Bochum, Germany, Tech. Rep. HGI-TR-2010-002 [Online]. Available
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, M. Winandy, "Returnoriented programming without returns on ARM," Syst. Secur. Lab, Ruhr University Bochum, Bochum, Germany, Tech. Rep. HGI-TR-2010-002, 2010 [Online]. Available: http://www.ei.rub.de/media/trust/veroeffentlichungen/2010/07/21/ROP-without-Returnson-ARM.pdf.
-
(2010)
Returnoriented Programming Without Returns on ARM
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
21
-
-
78650009627
-
-
Master's thesis, Univ. California, San Diego, CA,USA[Online]. Available
-
R. G. Roemer, "Finding the bad in good code: Automated returnoriented programming exploit discovery," Master's thesis, Univ. California, San Diego, CA,USA[Online]. Available: https://cseweb. ucsd.edu/~rroemer/doc/thesis.pdf, 2009.
-
(2009)
Finding the Bad in Good Code: Automated Returnoriented Programming Exploit Discovery
-
-
Roemer, R.G.1
-
22
-
-
85029681162
-
Returnoriented rootkits: Bypassing kernel code integrity protection mechanisms
-
R. Hund, T. Holz, F. C. Freiling, "Returnoriented rootkits: Bypassing kernel code integrity protection mechanisms," in Proc. USENIX Secur., 2009, pp. 383-398.
-
(2009)
Proc. USENIX Secur.
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
24
-
-
84968558644
-
Q: Exploit hardening made easy
-
T. Avgerinos, E. J. Schwartz, D. Brumle, "Q: Exploit hardening made easy," in Proc. USENIX Secur., 2011, pp. 379-394.
-
(2011)
Proc. USENIX Secur.
, pp. 379-394
-
-
Avgerinos, T.1
Schwartz, E.J.2
Brumle, D.3
-
25
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
[Online]. Available
-
L. Davi, A.-R. Sadeghi, M. Winandy, "Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks," in Proc. ACM Workshop Scalable Trusted Comput. (STC), 2009, pp. 49-54 [Online]. Available: http://doi. acm.org/10.1145/1655108.1655117.
-
(2009)
Proc. ACM Workshop Scalable Trusted Comput. (STC)
, pp. 49-54
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
26
-
-
71549162538
-
Drop: Detecting return-oriented programming malicious code
-
[Online]. Available
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, L. Xie, "Drop: Detecting return-oriented programming malicious code," in Proc. Int. Conf. Inf. Syst. Secur. (ICISS), 2009, pp. 163-177 [Online]. Available: http://dx.doi.org/10.1007/978-3-642-10772-6-13.
-
(2009)
Proc. Int. Conf. Inf. Syst. Secur. (ICISS)
, pp. 163-177
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
27
-
-
77954614533
-
Defeating returnoriented rootkits with 'return-less' kernels
-
[Online]. Available
-
J. Li, Z. Wang, X. Jiang, M. Grace, S. Bahram, "Defeating returnoriented rootkits with 'return-less' kernels," in Proc. EuroSys, 2010, pp. 195-208 [Online]. Available: http://doi.acm.org/10.1145/1755913.1755934.
-
(2010)
Proc. EuroSys
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
28
-
-
12344316966
-
Architecture support for defending against buffer overflow attacks
-
J. Xu, Z. Kalbarczyk, S. Patel, R. K. Iyer, "Architecture support for defending against buffer overflow attacks," in Proc. Workshop Eval. Archit. Syst. Dependability, 2002, pp. 52-62.
-
(2002)
Proc. Workshop Eval. Archit. Syst. Dependability
, pp. 52-62
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Iyer, R.K.4
-
29
-
-
50249180640
-
A processor architecture defense against buffer overflow attacks
-
Aug.
-
J. McGregor, D. Karig, Z. Shi, R. Lee, "A processor architecture defense against buffer overflow attacks," in Proc. Int. Conf. Inf. Technol. Res. Edu. (ITRE), Aug. 2003, pp. 243-250.
-
(2003)
Proc. Int. Conf. Inf. Technol. Res. Edu. (ITRE)
, pp. 243-250
-
-
McGregor, J.1
Karig, D.2
Shi, Z.3
Lee, R.4
-
30
-
-
84900988059
-
-
M.S. thesis, Dept. Comput. Sci., Nat. Univ. Singapore, Singapore
-
S. Sinnadurai, "Runtime binary analysis for security," M.S. thesis, Dept. Comput. Sci., Nat. Univ. Singapore, Singapore, 2007.
-
(2007)
Runtime Binary Analysis for Security
-
-
Sinnadurai, S.1
-
31
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
[Online]. Available
-
T. Bletsch, X. Jiang, V. W. Freeh, Z. Liang, "Jump-oriented programming: A new class of code-reuse attack," in Proc. ACM Symp. Inf. Comput. Commun. Secur. (ASIACCS), 2011, pp. 30-40 [Online]. Available: http://doi.acm.org/10.1145/1966913.1966919.
-
(2011)
Proc. ACM Symp. Inf. Comput. Commun. Secur. (ASIACCS)
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
32
-
-
78650032454
-
Return-oriented programming without returns
-
Oct.
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, M. Winandy, "Return-oriented programming without returns," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), Oct. 2010, pp. 559-72.
-
(2010)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
33
-
-
79956058308
-
Automatic construction of jump-oriented programming shellcode (on the x86)
-
[Online]. Available
-
P. Chen, X. Xing, B. Mao, L. Xie, X. Shen, X. Yin, "Automatic construction of jump-oriented programming shellcode (on the x86)," in Proc. ACM Symp. Inf. Comput. Commun. Secur. (ASIACCS), 2011, pp. 20-29 [Online]. Available: http://doi.acm.org/10.1145/1966913.1966918.
-
(2011)
Proc. ACM Symp. Inf. Comput. Commun. Secur. (ASIACCS)
, pp. 20-29
-
-
Chen, P.1
Xing, X.2
Mao, B.3
Xie, L.4
Shen, X.5
Yin, X.6
-
34
-
-
84871361154
-
-
Apple Inc [Online]. Available retrieved Oct. 2013
-
Apple Inc. (2012). iOS Security [Online]. Available: http://www. apple.com/ipad/business/docs/iOS-Security-Oct12.pdf, retrieved Oct. 2013.
-
(2012)
IOS Security
-
-
-
35
-
-
85019242830
-
-
SOGETI ESEC R&D Lab [Online]. Available retrieved Sept. 2012
-
SOGETI ESEC R&D Lab. (2012). Analysis of the Jailbreakme v3 Font Exploit [Online]. Available: http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit, retrieved Sept. 2012.
-
(2012)
Analysis of the Jailbreakme v3 Font Exploit
-
-
-
36
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, J. Ligatti, "Control-flow integrity," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2005, pp. 340-353.
-
(2005)
Proc. ACM Conf. Comput. Commun. Secur. (CCS)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
37
-
-
84855737396
-
Mitigating code-reuse attacks with control-flow locking
-
[Online]. Available
-
T. Bletsch, X. Jiang, V. Freeh, "Mitigating code-reuse attacks with control-flow locking," in Proc. 27th Ann. Comput. Secur. Appl. Conf. (ACSAC'11), 2011, pp. 353-362 [Online]. Available: http://doi. acm.org/10.1145/2076732.2076783.
-
(2011)
Proc. 27th Ann. Comput. Secur. Appl. Conf. (ACSAC'11)
, pp. 353-362
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
-
38
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, N. Fullagar, "Native client: A sandbox for portable, untrusted x86 native code," in Proc. 30th IEEE Symp. Secur. Privacy, 2009, pp. 79-93.
-
(2009)
Proc. 30th IEEE Symp. Secur. Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
39
-
-
84880319703
-
SCRAP: Architecture for signature-based protection from code reuse attacks
-
M. Kayaalp, T. Schmitt, J. Nomani, D. Ponomarev, N. Abu-Ghazaleh, "SCRAP: Architecture for signature-based protection from code reuse attacks," in Proc. Int. Symp. High-Perform. Comput. Archit. (HPCA), 2013, pp. 258-269.
-
(2013)
Proc. Int. Symp. High-Perform. Comput. Archit. (HPCA)
, pp. 258-269
-
-
Kayaalp, M.1
Schmitt, T.2
Nomani, J.3
Ponomarev, D.4
Abu-Ghazaleh, N.5
-
40
-
-
84960424279
-
-
The Open Group IEEE Std 10031 [Online]. Available
-
The Open Group. (2004). IEEE Std 10031 [Online]. Available: http://pubs.opengroup.org/onlinepubs/009695399/functions/setjmp.html.
-
(2004)
-
-
-
41
-
-
84864859967
-
Branch regulation: Low overhead mitigation of code reuse attacks
-
M. Kayaalp, M. Ozsoy, N. Abu-Ghazaleh, D. Ponomarev, "Branch regulation: Low overhead mitigation of code reuse attacks," in Proc. Ann. Int. Symp. Comput. Archit. (ISCA), 2012, pp. 94-105.
-
(2012)
Proc. Ann. Int. Symp. Comput. Archit. (ISCA)
, pp. 94-105
-
-
Kayaalp, M.1
Ozsoy, M.2
Abu-Ghazaleh, N.3
Ponomarev, D.4
-
42
-
-
36949014308
-
Ptlsim: A cycle accurate full system x86-64 microarchitectural simulator
-
M. T. Yourst, "Ptlsim: A cycle accurate full system x86-64 microarchitectural simulator," in Proc. Int. Symp. Perform. Anal. Syst. Softw. (ISPASS), 2007, pp. 23-34.
-
(2007)
Proc. Int. Symp. Perform. Anal. Syst. Softw. (ISPASS)
, pp. 23-34
-
-
Yourst, M.T.1
-
43
-
-
78149242271
-
Spec cpu2006 benchmark tools
-
C. D. Spradling, "Spec cpu2006 benchmark tools," SIGARCH Comput. Archit. News, vol. 35, no. 1, pp. 130-134, 2007.
-
(2007)
SIGARCH Comput. Archit. News
, vol.35
, Issue.1
, pp. 130-134
-
-
Spradling, C.D.1
-
44
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, K. Hazelwood, "Pin: Building customized program analysis tools with dynamic instrumentation," in Proc. ACM SIGPLAN Conf. Program. Language Des. Implementation (PLDI'05), 2005, pp. 190-200.
-
(2005)
Proc. ACM SIGPLAN Conf. Program. Language Des. Implementation (PLDI'05)
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
45
-
-
84962595439
-
-
[Online]. Available accessed Sep. 2012
-
J. Salwan. (2012). The Shell Storm Linux Shellcode Repository [Online]. Available: http://www.shell-storm.org/shellcode/shellcode-linux. php, accessed Sep. 2012.
-
(2012)
The Shell Storm Linux Shellcode Repository
-
-
Salwan, J.1
-
46
-
-
85009448253
-
Pointguardtm: Protecting pointers from buffer overflow vulnerabilities
-
[Online]. Available
-
C. Cowan, S. Beattie, J. Johansen, P. Wagle, "Pointguardtm: Protecting pointers from buffer overflow vulnerabilities," in Proc. USENIX Secur., 2003, p. 7 [Online]. Available: http://dl.acm.org/citation.cfm?id=1251353.1251360.
-
(2003)
Proc. USENIX Secur.
, pp. 7
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
47
-
-
14844332687
-
Propolice: Improved stack-smashing attack detection
-
Oct.
-
H. Etoh and K. Yoda, "Propolice: Improved stack-smashing attack detection," in Proc. IPSJ SIG Notes Comput. Secur., Oct. 2001, pp. 4034-4041.
-
(2001)
Proc. IPSJ SIG Notes Comput. Secur
, pp. 4034-4041
-
-
Etoh, H.1
Yoda, K.2
-
48
-
-
79960882939
-
-
Vendicator Jan. [Online]. Available
-
Vendicator. (2001, Jan.) Stack shield technical info file v0.7 [Online]. Available: http://www.angelfire.com/sk/stackshield/.
-
(2001)
Stack Shield Technical Info File v0.7
-
-
-
49
-
-
85084163372
-
StackGhost: Hardware facilitated stack protection
-
[Online]. Available
-
M. Frantzen and M. Shuey, "StackGhost: Hardware facilitated stack protection," in Proc. USENIX Secur., 2001, p. 5 [Online]. Available: http://dl.acm.org/citation.cfm?id=1251327.1251332.
-
(2001)
Proc. USENIX Secur.
, pp. 5
-
-
Frantzen, M.1
Shuey, M.2
-
50
-
-
70350057475
-
Architectural support for low overhead detection of memory violations
-
S. Ghose, L. Gilgeous, P. Dudnik, A. Aggarwal, C. Waxman, "Architectural support for low overhead detection of memory violations," in Proc. Conf. Des. Autom. Test Eur. (DATE), 2009, pp. 652-657.
-
(2009)
Proc. Conf. Des. Autom. Test Eur. (DATE)
, pp. 652-657
-
-
Ghose, S.1
Gilgeous, L.2
Dudnik, P.3
Aggarwal, A.4
Waxman, C.5
-
51
-
-
84864839734
-
Watchdog: Hardware for safe and secure manual memory management and full memory safety
-
S. Nagarakatte, M. Martin, S. Zdancewic, "Watchdog: Hardware for safe and secure manual memory management and full memory safety," in Proc. Ann. Int. Symp. Comput. Archit. (ISCA), 2012, pp. 189-200.
-
(2012)
Proc. Ann. Int. Symp. Comput. Archit. (ISCA)
, pp. 189-200
-
-
Nagarakatte, S.1
Martin, M.2
Zdancewic, S.3
-
52
-
-
80052525471
-
SIFT: A low-overhead dynamic information flow tracking architecture for SMT processors
-
May
-
M. Ozsoy, D. Ponomarev, N. Abu-Ghazaleh, T. Suri, "SIFT: A low-overhead dynamic information flow tracking architecture for SMT processors," in Proc. Conf. Comput. Frontiers (CF), May 2011.
-
(2011)
Proc. Conf. Comput. Frontiers (CF)
-
-
Ozsoy, M.1
Ponomarev, D.2
Abu-Ghazaleh, N.3
Suri, T.4
-
53
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, signature generation of exploits on commodity software
-
Feb.
-
J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, signature generation of exploits on commodity software," in Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS), Feb. 2005.
-
(2005)
Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS)
-
-
Newsome, J.1
Song, D.2
-
54
-
-
40349087553
-
Lift: A lowoverhead practical information flow tracking system for detecting security attacks
-
[Online]. Available
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, Y. Wu, "Lift: A lowoverhead practical information flow tracking system for detecting security attacks," in Proc. Ann. IEEE/ACM Int. Symp. Microarchit. (MICRO), 2006, pp. 135-148 [Online]. Available: http://dx.doi.org/10.1109/MICRO.2006.29.
-
(2006)
Proc. Ann IEEE/ACM Int. Symp. Microarchit. (MICRO)
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
55
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
[Online]. Available
-
M. Castro, M. Costa, T. Harris, "Securing software by enforcing data-flow integrity," in Proc. Symp. Oper. Syst. Des. Implementation (OSDI), 2006, pp. 147-160 [Online]. Available: http://dl.acm.org/citation.cfm?id=1298455.1298470.
-
(2006)
Proc. Symp. Oper. Syst. Des. Implementation (OSDI)
, pp. 147-160
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
56
-
-
77950832584
-
-
[Online]. Available
-
S. Designer. (1997). "Return-to-Libc" Attack [Online]. Available: http://insecure.org/sploits/linux.libc.return.lpr.sploit.html
-
(1997)
Return-to-Libc Attack
-
-
Designer, S.1
-
57
-
-
84960427928
-
-
Negral [Online]. Available retrieved Jun. 2012
-
Negral. (2001). The Advanced Return-Into-Lib(C) Attacks [Online]. Available: http://www.phrack.org/issues.html?issue=58 id=4, retrieved Jun. 2012.
-
(2001)
The Advanced Return-Into-Lib(C) Attacks
-
-
-
58
-
-
84857304973
-
On the expressiveness of return-into-libc attacks
-
Sep.
-
M. Tran, M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, P. Ning, "On the expressiveness of return-into-libc attacks," in Proc. Int. Conf. Recent Adv. Intrusion Detection (RAID), Sep. 2011, pp. 121-141.
-
(2011)
Proc. Int. Conf. Recent Adv. Intrusion Detection (RAID)
, pp. 121-141
-
-
Tran, M.1
Etheridge, M.2
Bletsch, T.3
Jiang, X.4
Freeh, V.5
Ning, P.6
-
59
-
-
78751484536
-
Gfree: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, E. Kirda, "Gfree: Defeating return-oriented programming through gadget-less binaries," in Proc. Ann. Comput. Secur. Appl. Conf. (ACSAC), 2010, pp. 49-58.
-
(2010)
Proc. Ann. Comput. Secur. Appl. Conf. (ACSAC)
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
60
-
-
34547545970
-
-
P. Team Mar. [Online] Available
-
P. Team. (2003, Mar.). Pax Address Space Layout Randomization (ASLR) [Online]. Available: http://pax.grsecurity.net/docs/aslr. txt.
-
(2003)
Pax Address Space Layout Randomization (ASLR)
-
-
-
61
-
-
33746101822
-
Diehard: Probabilistic memory safety for unsafe languages
-
[Online]. Available
-
E. D. Berger and B. G. Zorn, "Diehard: Probabilistic memory safety for unsafe languages," in Proc. Conf. Program. Language Des. Implementation (PLDI), 2006, pp. 158-168 [Online]. Available: http://doi. acm.org/10.1145/1133981.1134000.
-
(2006)
Proc. Conf. Program. Language Des. Implementation (PLDI)
, pp. 158-168
-
-
Berger, E.D.1
Zorn, B.G.2
-
62
-
-
78649988672
-
An analysis of address space layout randomization on windows vista
-
2007 [Online]. Available
-
O. Whitehouse. (2007). "An analysis of address space layout randomization on windows vista," Symantec Adv. Threat Res., pp. 1-14, 2007 [Online]. Available: http://www.symantec.com/avcenter/reference/Address-Space-Layout-Randomization.pdf
-
(2007)
Symantec Adv. Threat Res.
, pp. 1-14
-
-
Whitehouse, O.1
-
63
-
-
12344288334
-
-
Sep.) [Online] Available
-
T. Newsham. (2000, Sep.) Format String Attacks [Online]. Available: http://julianor.tripod.com/bc/tn-usfs.pdf.
-
(2000)
Format String Attacks
-
-
Newsham, T.1
|