-
1
-
-
80052007811
-
Control flow integrity, acm trans
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control Flow Integrity, ACM Trans. Inf. Syst. Secur., 2009, pp. 1-40.
-
(2009)
Inf Syst. Secur.
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
84877692058
-
A compiler-level intermediate representation based binary analysis and rewriting system
-
K. Anand et al., A compiler-level intermediate representation based binary analysis and rewriting system, Proc. of the 8th ACM European Conf. on Computer Systems, 2013, pp. 295-308.
-
(2013)
Proc. of the 8th ACM European Conf. on Computer Systems
, pp. 295-308
-
-
Anand, K.1
-
3
-
-
0030260329
-
Fast static analysis of c++ virtual function calls
-
D. Bacon and P. Sweeny, Fast Static Analysis of C++ Virtual function Calls, Proc. of theConf. on Object-Oriented Programming, Systems, Languages, an Applications, 1996, pp. 324-341.
-
(1996)
Proc. of TheConf. on Object-Oriented Programming, Systems, Languages, An Applications
, pp. 324-341
-
-
Bacon, D.1
Sweeny, P.2
-
6
-
-
84855737396
-
Mitigating code-reuse attacks with control-flow locking
-
T. Bletsch, X. Jiang, and V. Freeh, Mitigating code-reuse attacks with control-flow locking, Proc. of the 27th Annual Comp. Sec. App. Conf., 2011, pp. 353-362.
-
(2011)
Proc. of the 27th Annual Comp. Sec. App. Conf.
, pp. 353-362
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.3
-
7
-
-
34547172136
-
Architectural support for software-based protection
-
M., Erlingsson, U. Budiu and M. Abadi, Architectural support for software-based protection, Proceedings of the 1st workshop on Architectural and system support for improving software dependability, 2006, pp. 42-51.
-
(2006)
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability
, pp. 42-51
-
-
Erlingsson, E.1
Budiu, U.2
Abadi, M.3
-
8
-
-
84961376832
-
-
c0ntext. (2012, April) Bypassing non-executable stack during exploitation using return-to-libc
-
c0ntext. (2012, April) Bypassing non-executable stack during exploitation using return-to-libc. [Online]. http://css.csail.mit.edu/6.858/2012/readings/return-to-libc.pdf
-
-
-
-
9
-
-
84961374878
-
-
c0ntext. (2011) How to Hijack the Global Offset Table with pointers
-
c0ntext. (2011) How to Hijack the Global Offset Table with pointers. [Online]. http://www.exploit-db.com/papers/13203/
-
-
-
-
10
-
-
85009448253
-
Point-guard: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, Point-Guard: Protecting pointers from buffer overflow vulnerabilities, 12th USENIX Security Symposium, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
11
-
-
85008010113
-
Melissa virus creates a new type of threat
-
L. Garber, Melissa Virus Creates a New Type of Threat, Computer, vol. 32, no. 6, pp. 16-19, 1999.
-
(1999)
Computer
, vol.32
, Issue.6
, pp. 16-19
-
-
Garber, L.1
-
12
-
-
84961292425
-
-
Gartner
-
Gartner. (2013) Gartner. [Online]. http://www.gartner.com/technology/home.jsp
-
(2013)
-
-
Gartner1
-
14
-
-
0034448379
-
A study of devirtualization techniques for a java just-in-time compiler
-
K. Ishizaki, M. Kawahito, T. Yasue, H. Komatsu, and T. Nakatani, A Study of Devirtualization TEchniques for a Java Just-In-Time Compiler, Proc. of theConf. on Object-Oriented Programming, Systems, Languages, an Applications, 2000, pp. 294-310.
-
(2000)
Proc. of TheConf. on Object-Oriented Programming, Systems, Languages, An Applications
, pp. 294-310
-
-
Ishizaki, K.1
Kawahito, M.2
Yasue, T.3
Komatsu, H.4
Nakatani, T.5
-
16
-
-
35348819332
-
VPC prediction: Reducing the cost of indirect branches via hardware-based dynamic devirtualization
-
H. Kim et al., VPC prediction: reducing the cost of indirect branches via hardware-based dynamic devirtualization, Proceed. of the Interntl. Symp. on Computer Architecture, 2007, pp. 424-435.
-
(2007)
Proceed. of the Interntl. Symp. on Computer Architecture
, pp. 424-435
-
-
Kim, H.1
-
20
-
-
84961331206
-
-
(2014, February) musl-libc
-
(2014, February) musl-libc. [Online]. http://www.musl-libc.org/
-
-
-
-
21
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, G-Free: Defeating Return-Oriented Programming through Gadget-less Binaries, Proc. of the Annual Computer Security App. Conf., 2010, pp. 49-58.
-
(2010)
Proc. of the Annual Computer Security App. Conf.
, pp. 49-58
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
24
-
-
2642520196
-
A binary rewriting defense against stack based buffer overflow attacks
-
M. Prasad and T. Chiueh, A binary rewriting defense against stack based buffer overflow attacks, Proc. of Usenix Tech. Conf., 2003, pp. 211-224.
-
(2003)
Proc. of Usenix Tech. Conf.
, pp. 211-224
-
-
Prasad, M.1
Chiueh, T.2
-
26
-
-
49749131966
-
Architectural support for run-time validation of control flow transfer
-
Y. Shi, S. Dempsey, and G. Lee, Architectural Support for Run-Time Validation of Control Flow Transfer, International Conference on Computer Design (ICCD), 2006, pp. 506-513.
-
(2006)
International Conference on Computer Design (ICCD)
, pp. 506-513
-
-
Shi, Y.1
Dempsey, S.2
Lee, G.3
-
29
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in gcc & llvm
-
C. Tice et al., Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM, 23rd USENIX Security Symposium, 2014.
-
(2014)
23rd USENIX Security Symposium
-
-
Tice, C.1
-
30
-
-
84866672217
-
CFIMon: Detecting violation of control flow integrity using performance counters
-
Y. Xia, Y. Liu, H. Chen, and B. Zang, CFIMon: Detecting violation of control flow integrity using performance counters, 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2012, pp. 1-12.
-
(2012)
42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
, pp. 1-12
-
-
Xia, Y.1
Liu, Y.2
Chen, H.3
Zang, B.4
-
31
-
-
84862111617
-
-
University of California, Davis, Tech. Rep.
-
L. Xu, F. Sun, and Z. Su, Constructing precise control flow graphs from binaries, University of California, Davis, Tech. Rep. 2009.
-
(2009)
Constructing Precise Control Flow Graphs from Binaries
-
-
Xu, L.1
Sun, F.2
Su, Z.3
-
32
-
-
0029203079
-
A comparative analysis of schemes for correlated branch prediction
-
C. Young, N. Gloy, and M. Smith, A comparative analysis of schemes for correlated branch prediction, Proceedings of the Iinternational Symp. on Computer Architecture, 1995, pp. 276-286.
-
(1995)
Proceedings of the Iinternational Symp. on Computer Architecture
, pp. 276-286
-
-
Young, C.1
Gloy, N.2
Smith, M.3
-
33
-
-
85041451135
-
Control flow integrity for cots binaries
-
M. Zhang and R. Sekar, Control Flow Integrity for COTS Binaries, USENIX Security Symposium, 2013, pp. 337-352.
-
(2013)
USENIX Security Symposium
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
-
34
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang et al., Practical Control Flow Integrity and Randomization for Binary Executables, IEEE Symposium on Security and Privacy (S&P), 2013, pp. 559-573.
-
(2013)
IEEE Symposium on Security and Privacy (S&P)
, pp. 559-573
-
-
Zhang, C.1
|