-
3
-
-
84979240124
-
-
oct2012.pdf
-
Atmel, C.: Automotive compilation (2012). http://www.atmel.com/Images/atmelautocompilation vol9 oct2012.pdf
-
(2012)
Automotive Compilation
, vol.9
-
-
Atmel, C.1
-
4
-
-
85025171717
-
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
-
Backes, M., Nürnberger, S.: Oxymoron: making fine-grained memory randomization practical by allowing code sharing. In: USENIX Security Symposium (2014)
-
(2014)
USENIX Security Symposium
-
-
Backes, M.1
Nürnberger, S.2
-
5
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: USENIX Security (2003)
-
(2003)
USENIX Security
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
6
-
-
85031703244
-
Leakage-resilient layout randomization for mobile devices
-
Braden, K., Crane, S., Davi, L., Franz, M., Larsen, P., Liebchen, C., Sadeghi, A.R.: Leakage-resilient layout randomization for mobile devices. In: Network and Distributed Systems Security Symposium (NDSS) (2016)
-
(2016)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Braden, K.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Liebchen, C.6
Sadeghi, A.R.7
-
8
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, 2000, DISCEX 2000, vol. 2, pp. 119–129. IEEE (2000)
-
(2000)
DARPA Information Survivability Conference and Exposition, 2000, DISCEX 2000
, vol.2
, pp. 119-129
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
9
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
Crane, S., Liebchen, C., Homescu, A., Davi, L., Larsen, P., Sadeghi, A.R., Brunthaler, S., Franz, M.: Readactor: practical code randomization resilient to memory disclosure. In: IEEE Symposium on Security and Privacy, S&P, vol. 15 (2015)
-
(2015)
IEEE Symposium on Security and Privacy, S&P
, vol.15
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.R.6
Brunthaler, S.7
Franz, M.8
-
10
-
-
85080743214
-
Isomeron: Code randomization resilient to (just-in-time) return-oriented programming
-
Davi, L., Liebchen, C., Sadeghi, A.R., Snow, K.Z., Monrose, F.: Isomeron: code randomization resilient to (just-in-time) return-oriented programming. In: Proceedings of the 22nd Network and Distributed Systems Security Symposium (NDSS) (2015)
-
(2015)
Proceedings of the 22Nd Network and Distributed Systems Security Symposium (NDSS)
-
-
Davi, L.1
Liebchen, C.2
Sadeghi, A.R.3
Snow, K.Z.4
Monrose, F.5
-
13
-
-
74049104722
-
Defending embedded systems against control flow attacks
-
Francillon, A., Perito, D., Castelluccia, C.: Defending embedded systems against control flow attacks. In: Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, pp. 19–26. ACM (2009)
-
(2009)
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code
, pp. 19-26
-
-
Francillon, A.1
Perito, D.2
Castelluccia, C.3
-
15
-
-
84944326023
-
MAVR: Code reuse stealthy attacks and mitigation on unmanned aerial vehicles
-
IEEE
-
Habibi, J., Gupta, A., Carlsony, S., Panicker, A., Bertino, E.: MAVR: code reuse stealthy attacks and mitigation on unmanned aerial vehicles. In: Distributed Computing Systems (ICDCS), pp. 642–652. IEEE (2015)
-
(2015)
Distributed Computing Systems (ICDCS)
, pp. 642-652
-
-
Habibi, J.1
Gupta, A.2
Carlsony, S.3
Panicker, A.4
Bertino, E.5
-
18
-
-
84959417310
-
Opaque controlflow integrity
-
Mohan, V., Larsen, P., Brunthaler, S., Hamlen, K., Franz, M.: Opaque controlflow integrity. In: Network and Distributed Systems Security Symposium (NDSS) (2015)
-
(2015)
Network and Distributed Systems Security Symposium (NDSS)
-
-
Mohan, V.1
Larsen, P.2
Brunthaler, S.3
Hamlen, K.4
Franz, M.5
-
19
-
-
84979204153
-
-
GNU Project, Accessed Jan 2016
-
GNU Project: Avr libc home page (1999). http://www.nongnu.org/avr-libc/. Accessed Jan 2016
-
(1999)
Avr Libc Home Page
-
-
-
20
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Roemer, R., Buchanan, E., Shacham, H., Savage, S.: Return-oriented programming: systems, languages, and applications. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(1), 2 (2012)
-
(2012)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.15
, Issue.1
, pp. 2
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
22
-
-
84906771499
-
Evaluating the effectiveness of current Anti-ROP defenses
-
Stavrou, A., Bos, H., Portokalidis, G. (eds.), Springer, Heidelberg
-
Schuster, F., Tendyck, T., Pewny, J., Maaß, A., Steegmanns, M., Contag, M., Holz, T.: Evaluating the effectiveness of current Anti-ROP defenses. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 88–108. Springer, Heidelberg (2014)
-
(2014)
RAID 2014. LNCS
, vol.8688
, pp. 88-108
-
-
Schuster, F.1
Tendyck, T.2
Pewny, J.3
Maaß, A.4
Steegmanns, M.5
Contag, M.6
Holz, T.7
-
23
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
Snow, K.Z., Monrose, F., Davi, L., Dmitrienko, A., Liebchen, C., Sadeghi, A.R.: Just-in-time code reuse: on the effectiveness of fine-grained address space layout randomization. In: Security and Privacy (SP), pp. 574–588 (2013)
-
(2013)
Security and Privacy (SP)
, pp. 574-588
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.R.6
-
24
-
-
84881235941
-
SoK: Eternal war in memory
-
Szekeres, L., Payer, M., Wei, T., Song, D.: SoK: eternal war in memory. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 48–62. IEEE (2013)
-
(2013)
2013 IEEE Symposium on Security and Privacy (SP)
, pp. 48-62
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
25
-
-
84954181687
-
Heisenbyte: Thwarting memory disclosure attacks using destructive code reads
-
Tang, A., Sethumadhavan, S., Stolfo, S.: Heisenbyte: thwarting memory disclosure attacks using destructive code reads. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 256–267. ACM (2015)
-
(2015)
Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security
, pp. 256-267
-
-
Tang, A.1
Sethumadhavan, S.2
Stolfo, S.3
-
27
-
-
84969533662
-
The advanced return-into-lib (C) exploits: Pax case study
-
vol. 0x0b, Issue 0x3a, Phile# 0x04 of 0x0e
-
Wojtczuk, R.: The advanced return-into-lib (c) exploits: Pax case study. Phrack Magazine, vol. 0x0b, Issue 0x3a, Phile# 0x04 of 0x0e (2001)
-
(2001)
Phrack Magazine
-
-
Wojtczuk, R.1
|