-
2
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang, "Jump-Oriented Programming: A New Class of Code-reuse Attack," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
3
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, "Return-Oriented Programming Without Returns," in Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
5
-
-
84914132233
-
Hacking blind
-
A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh, "Hacking Blind," in Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014
-
(2014)
Proceedings of the 35th IEEE Symposium on Security and Privacy
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazieres, D.4
Boneh, D.5
-
6
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-Flow Integrity," in Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
7
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC &LLVM
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, U. Erlingsson, L. Lozano, and G. Pike, "Enforcing Forward-Edge Control-Flow Integrity in GCC &LLVM," in Proceedings of the 23rd USENIX Security Symposium, 2014
-
(2014)
Proceedings of the 23rd USENIX Security Symposium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
9
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, "Practical Control Flow Integrity and Randomization for Binary Executables," in Proceedings of the 34th IEEE Symposium on Security and Privacy, 2013
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
11
-
-
84954175453
-
Practical context-sensitive CFI
-
V. Veen, D. Andriesse, E. Goktas, B. Gras, L. Sambuc, A. Slowinska, H. Bos, and C. Giuffrida, "Practical Context-Sensitive CFI," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
-
-
Veen, V.1
Andriesse, D.2
Goktas, E.3
Gras, B.4
Sambuc, L.5
Slowinska, A.6
Bos, H.7
Giuffrida, C.8
-
12
-
-
84954161880
-
CCFI: Cryptographically enforced control flow integrity
-
A. J. Mashtizadeh, A. Bittau, D. Boneh, and D. Mazieres, "CCFI: Cryptographically Enforced Control Flow Integrity," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
-
-
Mashtizadeh, A.J.1
Bittau, A.2
Boneh, D.3
Mazieres, D.4
-
13
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song, "Code-pointer Integrity," in Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, 2014
-
(2014)
Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
14
-
-
84954119725
-
Timely rerandomization for mitigating memory disclosures
-
D. Bigelow, T. Hobson, R. Rudd, W. Streilein, and H. Okhravi, "Timely Rerandomization for Mitigating Memory Disclosures," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
-
-
Bigelow, D.1
Hobson, T.2
Rudd, R.3
Streilein, W.4
Okhravi, H.5
-
19
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, "Non-Control-Data Attacks Are Realistic Threats," in Proceedings of the 14th USENIX Security Symposium, 2005
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
20
-
-
84987599164
-
-
"The Heartbleed Bug," http://heartbleed.com
-
-
-
-
22
-
-
84987628667
-
Automatic generation of data-oriented exploits
-
H. Hu, Z. L. Chua, S. Adrian, P. Saxena, and Z. Liang, "Automatic Generation of Data-Oriented Exploits," in Proceedings of the 24th USENIX Security Symposium, 2015
-
(2015)
Proceedings of the 24th USENIX Security Symposium
-
-
Hu, H.1
Chua, Z.L.2
Adrian, S.3
Saxena, P.4
Liang, Z.5
-
23
-
-
85084161742
-
Microgadgets: Size does matter in turing-complete return-oriented programming
-
A. Homescu, M. Stewart, P. Larsen, S. Brunthaler, and M. Franz, "Microgadgets: Size Does Matter in Turing-complete Return-oriented Programming," in Proceedings of the 6th USENIX Conference on Offensive Technologies, 2012
-
(2012)
Proceedings of the 6th USENIX Conference on Offensive Technologies
-
-
Homescu, A.1
Stewart, M.2
Larsen, P.3
Brunthaler, S.4
Franz, M.5
-
25
-
-
85053935206
-
Control-flow bending: On the effectiveness of control-flow integrity
-
N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross, "Control-Flow Bending: On the Effectiveness of Control-Flow Integrity," in Proceedings of the 24th USENIX Security Symposium, 2015
-
(2015)
Proceedings of the 24th USENIX Security Symposium
-
-
Carlini, N.1
Barresi, A.2
Payer, M.3
Wagner, D.4
Gross, T.R.5
-
27
-
-
84987599188
-
-
Microsoft, " set printf count output," https://msdn.microsoft.com/enus/ library/ms175782.aspx
-
Set Printf Count Output
-
-
-
29
-
-
84987616271
-
-
"WU-FTPD Server," http://www.wu-ftpd.org
-
-
-
-
30
-
-
84987599182
-
-
"Nginx HTTP Server 1.3.9-1.4.0 Chunked Encoding Stack Buffer Overflow," http://mailman.nginx.org/pipermail/nginxannounce/ 2013/000112.html
-
-
-
-
32
-
-
84987650038
-
-
"SSH Communications Security," www.ssh.com
-
Www.ssh.com
-
-
-
33
-
-
84987650036
-
-
"Wireshark Go Deep." https://www.wireshark.org
-
-
-
-
34
-
-
84987632483
-
-
"Glibc-Gnu," https://www.gnu.org/s/libc
-
-
-
-
36
-
-
84987599190
-
-
"musl libc," http://www.musl-libc.org
-
-
-
-
38
-
-
84987632507
-
-
"Sudo Main Page," http://www.sudo.ws
-
-
-
-
49
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
S. Crane, C. Liebchen, A. Homescu, L. Davi, P. Larsen, A.-R. Sadeghi, S. Brunthaler, and M. Franz, "Readactor: Practical Code Randomization Resilient to Memory Disclosure," in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015
-
(2015)
Proceedings of the 36th IEEE Symposium on Security and Privacy
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.-R.6
Brunthaler, S.7
Franz, M.8
-
50
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, "Efficient Software-based Fault Isolation," in Proceedings of the 14th ACM Symposium on Operating Systems Principles, 1993
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
51
-
-
85084164164
-
Cyclone: A safe dialect of c
-
T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang, "Cyclone: A Safe Dialect of C," in Proceedings of the USENIX Annual Technical Conference, 2002
-
(2002)
Proceedings of the USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
53
-
-
70450237674
-
SoftBound: Highly compatible and complete spatial memory safety for c
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, "SoftBound: Highly Compatible and Complete Spatial Memory Safety for C," in Proceedings of the 30th ACM SIG-PLAN Conference on Programming Language Design and Implementation, 2009
-
(2009)
Proceedings of the 30th ACM SIG-PLAN Conference on Programming Language Design and Implementation
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
54
-
-
77954726241
-
CETS: Compiler enforced temporal safety for c
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, "CETS: Compiler Enforced Temporal Safety for C," in Proceedings of the 9th International Symposium on Memory Management, 2010
-
(2010)
Proceedings of the 9th International Symposium on Memory Management
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
56
-
-
84881235941
-
SoK: Eternal war in memory
-
L. Szekeres, M. Payer, T. Wei, and D. Song, "SoK: Eternal War in Memory," in Proceedings of the 34th IEEE Symposium on Security and Privacy, 2013
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
58
-
-
85135962401
-
Enforcing kernel security invariants with data flow integrity
-
C. Song, B. Lee, K. Lu, W. R. Harris, T. Kim, and W. Lee, "Enforcing Kernel Security Invariants with Data Flow Integrity," in Proceedings of the 23th Annual Network and Distributed System Security Symposium, 2016
-
(2016)
Proceedings of the 23th Annual Network and Distributed System Security Symposium
-
-
Song, C.1
Lee, B.2
Lu, K.3
Harris, W.R.4
Kim, T.5
Lee, W.6
-
60
-
-
84995420404
-
A practical approach for adaptive data structure layout randomization
-
P. Chen, J. Xu, Z. Lin, D. Xu, B. Mao, and P. Liu, "A Practical Approach for Adaptive Data Structure Layout Randomization," in Proceedings of the 20th European Symposium on Research in Computer Security, 2015
-
(2015)
Proceedings of the 20th European Symposium on Research in Computer Security
-
-
Chen, P.1
Xu, J.2
Lin, Z.3
Xu, D.4
Mao, B.5
Liu, P.6
-
61
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
ser. SP '13
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi, "Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization," in Proceedings of the 34th IEEE Symposium on Security and Privacy, ser. SP '13, 2013
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
62
-
-
84945184526
-
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in c++ applications
-
F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz, "Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications," in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015
-
(2015)
Proceedings of the 36th IEEE Symposium on Security and Privacy
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
64
-
-
85084162701
-
The page-fault weird machine: Lessons in instruction-less computation
-
J. Bangert, S. Bratus, R. Shapiro, and S. W. Smith, "The Page-fault Weird Machine: Lessons in Instruction-less Computation," in Proceedings of the 7th USENIX Conference on Offensive Technologies, 2013
-
(2013)
Proceedings of the 7th USENIX Conference on Offensive Technologies
-
-
Bangert, J.1
Bratus, S.2
Shapiro, R.3
Smith, S.W.4
|