-
1
-
-
84977187267
-
-
SPARC International Inc. SPARC V8 processor. http://www.sparc.org
-
SPARC V8 Processor
-
-
-
3
-
-
33646767376
-
Control-ow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-ow integrity: Principles, implementations, and applications. In Proceedings of the 12th ACM Conference on Computer and Communications Secu-rity, CCS'05, 2005
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Secu-rity, CCS'05
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
84959886547
-
Locking down insecure indirection with hardware-based controldata isolation
-
ACM
-
W. Arthur, S. Madeka, R. Das, and T. Austin. Locking down insecure indirection with hardware-based controldata isolation. In Proceedings of the 48th International Symposium on Microarchitecture, pages 115-127. ACM, 2015
-
(2015)
Proceedings of the 48th International Symposium on Microarchitecture
, pp. 115-127
-
-
Arthur, W.1
Madeka, S.2
Das, R.3
Austin, T.4
-
5
-
-
34547172136
-
Architectural support for software-based protection
-
M. Budiu, U. Erlingsson, and M. Abadi. Architectural support for software-based protection. In Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID'06, pages 42-51, 2006
-
(2006)
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, ASID'06
, pp. 42-51
-
-
Budiu, M.1
Erlingsson, U.2
Abadi, M.3
-
6
-
-
85053935206
-
Control-ow bending: On the eéctiveness of control-ow integrity
-
N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross. Control-ow bending: On the eéctiveness of control-ow integrity. In Proceedings of the 24th USENIX Security Symposium, 2015
-
(2015)
Proceedings of the 24th USENIX Security Symposium
-
-
Carlini, N.1
Barresi, A.2
Payer, M.3
Wagner, D.4
Gross, T.R.5
-
8
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10, 2010
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS'10
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
9
-
-
85180625962
-
ROPecker: A generic and practical approach for defending against ROP attacks
-
Y. Cheng, Z. Zhou, Y. Miao, X. Ding, and R. H. Deng. ROPecker: A generic and practical approach for defending against ROP attacks. In Proceedings of the 21st Annual Network and Distributed System Security Sym-posium, NDSS'14, 2014
-
(2014)
Proceedings of the 21st Annual Network and Distributed System Security Sym-posium, NDSS'14
-
-
Cheng, Y.1
Zhou, Z.2
Miao, Y.3
Ding, X.4
Deng, R.H.5
-
10
-
-
84954171757
-
Losing control: On the eéctiveness of control-ow integrity under stack attacks
-
ACM
-
M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen, M. Negro, C. Liebchen, M. Qunaibit, and A.-R. Sadeghi. Losing control: On the eéctiveness of control-ow integrity under stack attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pages 952-963. ACM, 2015
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 952-963
-
-
Conti, M.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Negro, M.6
Liebchen, C.7
Qunaibit, M.8
Sadeghi, A.-R.9
-
11
-
-
84942543728
-
The performance cost of shadow stacks and stack canaries
-
ACM
-
T. H. Dang, P. Maniatis, and D. Wagner. The performance cost of shadow stacks and stack canaries. In Proceedings of the 10th ACM Symposium on Informa-tion, Computer and Communications Security, pages 555-566. ACM, 2015
-
(2015)
Proceedings of the 10th ACM Symposium on Informa-tion, Computer and Communications Security
, pp. 555-566
-
-
Dang, T.H.1
Maniatis, P.2
Wagner, D.3
-
12
-
-
84944080766
-
HAFIX: Hardware-assisted flow integrity extension
-
ACM
-
L. Davi, M. Hanreich, D. Paul, A.-R. Sadeghi, P. Koeberl, D. Sullivan, O. Arias, and Y. Jin. HAFIX: Hardware-Assisted Flow Integrity Extension. In Pro-ceedings of the 52nd Annual Design Automation Con-ference, page 74. ACM, 2015
-
(2015)
Pro-ceedings of the 52nd Annual Design Automation Con-ference
, pp. 74
-
-
Davi, L.1
Hanreich, M.2
Paul, D.3
Sadeghi, A.-R.4
Koeberl, P.5
Sullivan, D.6
Arias, O.7
Jin, Y.8
-
14
-
-
84914159903
-
Out of control: Overcoming control-ow integrity
-
E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis. Out of control: Overcoming control-ow integrity. In Proceedings of the 35th IEEE Symposium on Security and Privacy, SP'14, 2014
-
(2014)
Proceedings of the 35th IEEE Symposium on Security and Privacy, SP'14
-
-
Goktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
15
-
-
84960462471
-
Signature-based protection from code reuse attacks
-
M. Kayaalp, T. Schmitt, J. Nomani, D. Ponomarev, and N. Abu Ghazaleh. Signature-based protection from code reuse attacks. Computers, IEEE Transactions on, 64(2):533-546, 2015
-
(2015)
Computers, IEEE Transactions on
, vol.64
, Issue.2
, pp. 533-546
-
-
Kayaalp, M.1
Schmitt, T.2
Nomani, J.3
Ponomarev, D.4
Abu Ghazaleh, N.5
-
19
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Return-oriented programming: Systems, languages, and applications. ACM Trans. Inf. Syst. Secur., 15(1):2:1-2:34, 2012
-
(2012)
ACM Trans. Inf. Syst. Secur
, vol.15
, Issue.1
, pp. 21-234
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
20
-
-
84945184526
-
Counterfeit object-oriented programming: On the dificulty of preventing code reuse attacks in C++ applications
-
To appear
-
F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz. Counterfeit object-oriented programming: On the dificulty of preventing code reuse attacks in C++ applications. In Proceedings of the 36th IEEE Symposium on Security and Privacy, SP'15, 2015. To appear
-
(2015)
Proceedings of the 36th IEEE Symposium on Security and Privacy, SP'15
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
21
-
-
84881263793
-
Just-in-time code reuse: On the eéctiveness of fine-grained address space layout randomization
-
Received the Best Student Paper Award
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi. Just-in-time code reuse: On the eéctiveness of fine-grained address space layout randomization. In Proceedings of the 34th IEEE Symposium on Security and Privacy, SP'13, 2013. Received the Best Student Paper Award
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy, SP'13
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
22
-
-
85021046176
-
Enforcing forward-edge control-ow integrity in GCC &LLVM
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, U. Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-ow integrity in GCC &LLVM. In Proceedings of the 23rd USENIX Security Sympo-sium, 2014
-
(2014)
Proceedings of the 23rd USENIX Security Sympo-sium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
23
-
-
84857304973
-
On the expressiveness of return-intolibc attacks
-
M. Tran, M. Etheridge, T. Bletsch, X. Jiang, V. Freeh, and P. Ning. On the expressiveness of return-intolibc attacks. In Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, RAID'11, 2011
-
(2011)
Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, RAID'11
-
-
Tran, M.1
Etheridge, M.2
Bletsch, T.3
Jiang, X.4
Freeh, V.5
Ning, P.6
-
24
-
-
84892543260
-
Jop-alarm: Detecting jump-oriented programming-based anomalies in applications
-
IEEE
-
F. Yao, J. Chen, and G. Venkataramani. Jop-alarm: Detecting jump-oriented programming-based anomalies in applications. In Computer Design (ICCD), 2013 IEEE 31st International Conference on, pages 467-470. IEEE, 2013
-
(2013)
Computer Design (ICCD), 2013 IEEE 31st International Conference on
, pp. 467-470
-
-
Yao, F.1
Chen, J.2
Venkataramani, G.3
-
25
-
-
69149106605
-
Native Client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A sandbox for portable, untrusted x86 native code. In Proceedings of the 30th IEEE Sympo-sium on Security and Privacy, SP'09, 2009
-
(2009)
Proceedings of the 30th IEEE Sympo-sium on Security and Privacy, SP'09
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
26
-
-
84881218812
-
Practical control ow integrity &randomization for binary executables
-
C. Zhang, T.Wei, Z. Chen, L. Duan, L. Szekeres, S. Mc-Camant, D. Song, and W. Zou. Practical control ow integrity &randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy, SP'13, 2013
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy, SP'13
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
Mc-Camant, S.6
Song, D.7
Zou, W.8
|