-
3
-
-
85076460853
-
-
Binary Analysis Platform (BAP)
-
Binary Analysis Platform (BAP). http://bap.ece. cmu.edu.
-
-
-
-
6
-
-
70349267779
-
When good instructions go bad: Generalizing returnoriented programming to RISC
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: Generalizing returnoriented programming to RISC. In Proceedings of the ACM Conference on Computer and Communications Security, pages 27-38, 2008.
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
8
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In Proceedings of the ACM Conference on Computer and Communications Security, 2010.
-
(2010)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
9
-
-
84861443711
-
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage
-
Aug.
-
S. Checkoway, J. A. Halderman, U. Michigan, A. J. Feldman, E.W. Felten, B. Kantor, and H. Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage. In Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, Aug. 2009.
-
(2009)
Proceedings of the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections
-
-
Checkoway, S.1
Halderman, J.A.2
Michigan, U.3
Feldman, A.J.4
Felten, E.W.5
Kantor, B.6
Shacham, H.7
-
10
-
-
79956023817
-
DROP: Detecting return-oriented programming malicious code
-
P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie. DROP: Detecting return-oriented programming malicious code. In Proceedings of the Information Systems Security Conference, 2009.
-
(2009)
Proceedings of the Information Systems Security Conference
-
-
Chen, P.1
Xiao, H.2
Shen, X.3
Yin, X.4
Mao, B.5
Xie, L.6
-
11
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
New York, NY, USA, ACM.
-
J. Clause, W. Li, and A. Orso. Dytan: A generic dynamic taint analysis framework. In International Symposium on Software Testing and Analysis, pages 196-206, New York, NY, USA, 2007. ACM.
-
(2007)
International Symposium on Software Testing and Analysis
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
13
-
-
79956032720
-
ROPdefender: A detection tool to defend against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy. ROPdefender: A detection tool to defend against return-oriented programming attacks. In Proceedings of the ACM Symposium on Information, Computer, and Communication Security, 2011.
-
(2011)
Proceedings of the ACM Symposium on Information, Computer, and Communication Security
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
14
-
-
85076464917
-
-
Debian Developers, Accessed: August 8th, 2010.
-
Debian Developers. Debian hardening. http: //wiki.debian.org/Hardening?action= recall&rev=34. Accessed: August 8th, 2010.
-
Debian Hardening
-
-
-
18
-
-
26944470937
-
Automatic discovery of api-level exploits
-
May
-
V. Ganapathy, S. A. Seshia, S. Jha, T. W. Reps, and R. E. Bryant. Automatic discovery of api-level exploits. In Proceedings of the International Conference on Software Engineering (ICSE), May 2005.
-
(2005)
Proceedings of the International Conference on Software Engineering (ICSE)
-
-
Ganapathy, V.1
Seshia, S.A.2
Jha, S.3
Reps, T.W.4
Bryant, R.E.5
-
21
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Proceedings of the USENIX Security Symposium, 2009.
-
(2009)
Proceedings of the USENIX Security
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
28
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
June
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Proceedings of the ACM Conference on Programming Language Design and Implementation, June 2005.
-
(2005)
Proceedings of the ACM Conference on Programming Language Design and Implementation
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
29
-
-
69149089945
-
-
Microsoft Software Developer Network
-
Microsoft Software Developer Network. Windows vista ISV security. http://msdn.microsoft.com/ en-us/library/bb430720.aspx.
-
Windows Vista ISV Security
-
-
-
32
-
-
80455133197
-
-
Technical report, RWTH-Aachen University
-
T. Müller. ASLR smack & laugh reference. Technical report, RWTH-Aachen University, 2008. http://www-users.rwth-aachen.de/Tilo. Mueller/ASLRpaper.pdf.
-
(2008)
ASLR Smack & Laugh Reference
-
-
Müller, T.1
-
33
-
-
27544444280
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb.
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
39
-
-
77950856300
-
Surgically returning to randomized lib(c)
-
G. F. Roglia, L. Martignoni, R. Paleari, and D. Bruschi. Surgically returning to randomized lib(c). In Proceedings of the Annual Computer Security Applications Conference, pages 60-69, 2009.
-
(2009)
Proceedings of the Annual Computer Security Applications Conference
, pp. 60-69
-
-
Roglia, G.F.1
Martignoni, L.2
Paleari, R.3
Bruschi, D.4
-
40
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
May
-
E. J. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proceedings of the IEEE Symposium on Security and Privacy, pages 317-331, May 2010.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 317-331
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
42
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the ACM Conference on Computer and Communications Security, pages 298-307, 2004.
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
44
-
-
84914126474
-
-
Ubuntu Developers, Accessed: August 8th, 2010.
-
Ubuntu Developers. Ubuntu security/features. https://wiki.ubuntu.com/Security/ Features?action=recall&rev=52. Accessed: August 8th, 2010.
-
Ubuntu Security/features
-
-
|