-
3
-
-
33646767376
-
Control-flow integrity
-
ACM
-
Abadi, M., Budiu, M., Erlingsson, U., and Ligatti, J. Control-flow integrity. In Proceedings of the 12th ACM conference on Computer and communications security (2005), ACM, pp. 340-353.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
84914171886
-
Changes to functionality in microsoft windows xp service pack 2, part 3: Memory protection technologies, data execution prevention
-
September
-
Andersen, S., and Abella, V. Changes to functionality in microsoft windows xp service pack 2, part 3: Memory protection technologies, Data Execution Prevention. Microsoft TechNet Library, September 2004. http://technet.microsoft.com/en-us/library/bb457155.aspx.
-
(2004)
Microsoft TechNet Library
-
-
Andersen, S.1
Abella, V.2
-
6
-
-
84964870657
-
The devil is in the constants: Bypassing defenses in browser jit engines
-
The Internet Society
-
Athanasakis, M., Athanasopoulos, E., Polychronakis, M., Portokalidis, G., and Ioannidis, S. The devil is in the constants: Bypassing defenses in browser jit engines. In NDSS (2015), The Internet Society.
-
(2015)
NDSS
-
-
Athanasakis, M.1
Athanasopoulos, E.2
Polychronakis, M.3
Portokalidis, G.4
Ioannidis, S.5
-
7
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
ACM
-
Bletsch, T., Jiang, X., Freeh, V. W., and Liang, Z. Jump-oriented programming: a new class of code-reuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011), ACM, pp. 30-40.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
8
-
-
34547172136
-
Architectural support for software-based protection
-
ACM
-
Budiu, M., Erlingsson, U., and Abadi, M. Architectural support for software-based protection. In Proceedings of the 1st workshop on Architectural and system support for improving software dependability (2006), ACM, pp. 42-51.
-
(2006)
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability
, pp. 42-51
-
-
Budiu, M.1
Erlingsson, U.2
Abadi, M.3
-
9
-
-
84964812021
-
An interactive matrix multiplication benchmark
-
Burkardt, J., Puglielli, P., and Center, P. S. Matmul: An interactive matrix multiplication benchmark. degrees from BITS, Pilani. He is a Fellow of the Institution of Engineers (India), Fellow of National Academy of Engineering (FNAE), Fellow of National Academy of Sciences (FNASc), Life Member ISTE(LMISTE). Professor Kothari has published/presented 640 (1995).
-
(1995)
Degrees from BITS, Pilani. He Is a Fellow of the Institution of Engineers (India), Fellow of National Academy of Engineering (FNAE), Fellow of National Academy of Sciences (FNASc), Life Member ISTE(LMISTE). Professor Kothari has Published/presented 640
-
-
Burkardt, J.1
Puglielli, P.2
-
10
-
-
85053935206
-
Control-flow bending: On the effectiveness of control-flow integrity
-
Carlini, N., Barresi, A., Payer, M., Wagner, D., and Gross, T. R. Control-flow bending: On the effectiveness of control-flow integrity. In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015), USENIX Association, pp. 161-176.
-
24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015), USENIX Association
, pp. 161-176
-
-
Carlini, N.1
Barresi, A.2
Payer, M.3
Wagner, D.4
Gross, T.R.5
-
11
-
-
85076293126
-
Rop is still dangerous: Breaking modern defenses
-
Carlini, N., and Wagner, D. Rop is still dangerous: Breaking modern defenses. In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 385-399.
-
23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association
, pp. 385-399
-
-
Carlini, N.1
Wagner, D.2
-
13
-
-
85180625962
-
Ropecker: A generic and practical approach for defending against ROP attacks
-
USA, February 23-26, 2013
-
Cheng, Y., Zhou, Z., Yu, M., Ding, X., and Deng, R. H. Ropecker: A generic and practical approach for defending against ROP attacks. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2013 (2014).
-
(2014)
21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R.H.5
-
14
-
-
84942543728
-
The performance cost of shadow stacks and stack canaries
-
Dang, T. H., Maniatis, P., and Wagner, D. The performance cost of shadow stacks and stack canaries. In ACM Symposium on Information, Computer and Communications Security, ASIACCS (2015), Vol. 15.
-
(2015)
ACM Symposium on Information, Computer and Communications Security, ASIACCS
, vol.15
-
-
Dang, T.H.1
Maniatis, P.2
Wagner, D.3
-
15
-
-
84944080766
-
Hafix: Hardware-assisted flow integrity extension
-
ACM
-
Davi, L., Hanreich, M., Paul, D., Sadeghi, A.-R., Koeberl, P., Sullivan, D., Arias, O., and Jin, Y. Hafix: hardware-assisted flow integrity extension. In Proceedings of the 52nd Annual Design Automation Conference (2015), ACM, p. 74.
-
(2015)
Proceedings of the 52nd Annual Design Automation Conference
, pp. 74
-
-
Davi, L.1
Hanreich, M.2
Paul, D.3
Sadeghi, A.-R.4
Koeberl, P.5
Sullivan, D.6
Arias, O.7
Jin, Y.8
-
16
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
Davi, L., Sadeghi, A.-R., Lehmann, D., and Monrose, F. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 401-416.
-
23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association
, pp. 401-416
-
-
Davi, L.1
Sadeghi, A.-R.2
Lehmann, D.3
Monrose, F.4
-
17
-
-
84871946306
-
-
EEMBC. Coremark Benchmark. https://www.eembc.org/coremark/.
-
Coremark Benchmark
-
-
-
19
-
-
84954564343
-
Towards automated integrity protection of c++ virtual function tables in binary programs
-
(New York, NY, USA, 2014), ACSAC '14, ACM
-
Gawlik, R., and Holz, T. Towards automated integrity protection of c++ virtual function tables in binary programs. In Proceedings of the 30th Annual Computer Security Applications Conference (New York, NY, USA, 2014), ACSAC '14, ACM, pp. 396-405.
-
Proceedings of the 30th Annual Computer Security Applications Conference
, pp. 396-405
-
-
Gawlik, R.1
Holz, T.2
-
20
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
IEEE
-
Göktaş, E., Athanasopoulos, E., Bos, H., and Portokalidis, G. Out of control: Overcoming control-flow integrity. In Security and Privacy (SP), 2014 IEEE Symposium on (2014), IEEE, pp. 575-589.
-
(2014)
Security and Privacy (SP), 2014 IEEE Symposium On
, pp. 575-589
-
-
Göktaş, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
21
-
-
84977858681
-
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard
-
Göktaş, E., Athanasopoulos, E., Polychronakis, M., Bos, H., and Portokalidis, G. Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard. In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 417-432.
-
23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association
, pp. 417-432
-
-
Göktaş, E.1
Athanasopoulos, E.2
Polychronakis, M.3
Bos, H.4
Portokalidis, G.5
-
22
-
-
84959346014
-
Shrinkwrap: Vtable protection without loose ends
-
ACM
-
Göktaş, E., Athanasopoulos, E., Portokalidis, G., and Bos, H. Shrinkwrap: Vtable protection without loose ends. In ACSAC (2015), ACM, pp. 341-350.
-
(2015)
ACSAC
, pp. 341-350
-
-
Göktaş, E.1
Athanasopoulos, E.2
Portokalidis, G.3
Bos, H.4
-
23
-
-
84869381037
-
Ilr: Where'd my gadgets go?
-
Hiser, J., Nguyen-Tuong, A., Co, M., Hall, M., and Davidson, J. W. Ilr: Where'd my gadgets go? In Proceedings of the 2012 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2012), SP '12, IEEE Computer Society, pp. 571-585.
-
Proceedings of the 2012 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2012), SP '12, IEEE Computer Society
, pp. 571-585
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.W.5
-
25
-
-
84864859967
-
Branch regulation: Low-overhead protection from code reuse attacks
-
IEEE
-
Kayaalp, M., Ozsoy, M., Abu-Ghazaleh, N., and Ponomarev, D. Branch regulation: Low-overhead protection from code reuse attacks. In Computer Architecture (ISCA), 2012 39th Annual International Symposium on (2012), IEEE, pp. 94-105.
-
(2012)
Computer Architecture (ISCA), 2012 39th Annual International Symposium On
, pp. 94-105
-
-
Kayaalp, M.1
Ozsoy, M.2
Abu-Ghazaleh, N.3
Ponomarev, D.4
-
26
-
-
0006100649
-
Smashing the stack for fun and profit
-
One, A. Smashing the stack for fun and profit. Phrack magazine 7, 49 (1996), 365.
-
(1996)
Phrack Magazine 7
, vol.49
, pp. 365
-
-
One, A.1
-
27
-
-
33748501504
-
Smashguard: A hardware solution to prevent security attacks on the function return address
-
özdoganoglu, H., Vijaykumar, T., Brodley, C. E., Kuperman, B., Jalote, A., et al. Smashguard: A hardware solution to prevent security attacks on the function return address. Computers, IEEE Transactions on 55, 10 (2006), 1271-1285.
-
(2006)
Computers, IEEE Transactions on 55
, vol.10
, pp. 1271-1285
-
-
Özdoganoglu, H.1
Vijaykumar, T.2
Brodley, C.E.3
Kuperman, B.4
Jalote, A.5
-
28
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
Pappas, V., Polychronakis, M., and Keromytis, A. D. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Proceedings of the 2012 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2012), SP '12, IEEE Computer Society, pp. 601-615.
-
Proceedings of the 2012 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2012), SP '12, IEEE Computer Society
, pp. 601-615
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
29
-
-
84977859802
-
Transparent rop exploit mitigation using indirect branch tracing
-
Pappas, V., Polychronakis, M., and Keromytis, A. D. Transparent rop exploit mitigation using indirect branch tracing. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13) (Washington, D.C., 2013), USENIX, pp. 447-462.
-
Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13) (Washington, D.C., 2013), USENIX
, pp. 447-462
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
31
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Roemer, R., Buchanan, E., Shacham, H., and Savage, S. Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information and System Security (TISSEC) 15, 1 (2012), 2.
-
(2012)
ACM Transactions on Information and System Security (TISSEC) 15
, vol.1
, pp. 2
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
32
-
-
84945184526
-
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in c++ applications
-
(Oakland) (May 2015)
-
Schuster, F., Tendyck, T., Liebchen, C., Davi, L., Sadeghi, A.-R., and Holz, T. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in c++ applications. In 36th IEEE Symposium on Security and Privacy (Oakland) (May 2015).
-
36th IEEE Symposium on Security and Privacy
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
33
-
-
84906771499
-
Evaluating the effectiveness of current anti-rop defenses
-
Sweden, September 17-19, 2014. Proceedings
-
Schuster, F., Tendyck, T., Pewny, J., Maaß, A., Steegmanns, M., Contag, M., and Holz, T. Evaluating the effectiveness of current anti-rop defenses. In Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings (2014), pp. 88-108.
-
(2014)
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg
, pp. 88-108
-
-
Schuster, F.1
Tendyck, T.2
Pewny, J.3
Maaß, A.4
Steegmanns, M.5
Contag, M.6
Holz, T.7
-
34
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
(May 2013)
-
Snow, K. Z., Davi, L., Dmitrienko, A., Liebchen, C., Monrose, F., and Sadeghi, A.-R. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In Proceedings of the 34th IEEE Symposium on Security and Privacy (May 2013).
-
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Snow, K.Z.1
Davi, L.2
Dmitrienko, A.3
Liebchen, C.4
Monrose, F.5
Sadeghi, A.-R.6
-
35
-
-
84964825068
-
-
Standard Performance Evaluation Corporation (SPEC). SPEC CINT2000 Benchmarks. http://www.spec.org/cpu2000/CINT2000.
-
SPEC CINT2000 Benchmarks
-
-
-
36
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC and llvm
-
SEC'14, USENIX Association
-
Tice, C., Roeder, T., Collingbourne, P., Checkoway, S., Erlingsson, U., Lozano, L., and Pike, G. Enforcing forward-edge control-flow integrity in gcc and llvm. In Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association, pp. 941-955.
-
Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014)
, pp. 941-955
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
37
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
(New York, NY, USA, 2012), CCS '12, ACM
-
Wartell, R., Mohan, V., Hamlen, K. W., and Lin, Z. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (New York, NY, USA, 2012), CCS '12, ACM, pp. 157-168.
-
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
38
-
-
0021504618
-
Dhrystone: A synthetic systems programming benchmark
-
Weicker, R. P. Dhrystone: a synthetic systems programming benchmark. Communications of the ACM 27, 10 (1984), 1013-1030.
-
(1984)
Communications of the ACM 27
, vol.10
, pp. 1013-1030
-
-
Weicker, R.P.1
-
39
-
-
84888880788
-
-
Xilinx. ISE Simulator (ISim). http://www.xilinx.com/tools/isim.htm.
-
ISE Simulator (ISim)
-
-
-
41
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
IEEE
-
Zhang, C., Wei, T., Chen, Z., Duan, L., Szekeres, L., McCamant, S., Song, D., and Zou, W. Practical control flow integrity and randomization for binary executables. In Security and Privacy (SP), 2013 IEEE Symposium on (2013), IEEE, pp. 559-573.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium On
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
42
-
-
85041451135
-
Control flow integrity for COTS binaries
-
Zhang, M., and Sekar, R. Control flow integrity for COTS binaries. In Usenix Security (2013), pp. 337-352.
-
(2013)
Usenix Security
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
|