-
1
-
-
85076294036
-
-
Endspent(3C). https://docs.oracle.com/cd/ E36784 01/html/E36874/endspent-3c.html.
-
Endspent(3C)
-
-
-
5
-
-
85076304300
-
-
OrzHTTPd. https://code.google.com/p/orzhttpd/.
-
-
-
-
10
-
-
33646767376
-
Control-flow Integrity
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security (2005).
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
12
-
-
84877964270
-
-
Microsoft TechNet Library, September
-
ANDERSEN, S., AND ABELLA, V. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory protection technologies, Data Execution Prevention. Microsoft TechNet Library, September 2004.
-
(2004)
Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, Data Execution Prevention
-
-
Andersen, S.1
Abella, V.2
-
13
-
-
85164205772
-
AEG: Automatic exploit generation
-
AVGERINOS, T., CHA, S. K., HAO, B. L. T., AND BRUMLEY, D. AEG: Automatic Exploit Generation. In Proceedings of the 18th Annual Network and Distributed System Security Symposium (2011).
-
(2011)
Proceedings of the 18th Annual Network and Distributed System Security Symposium
-
-
Avgerinos, T.1
Cha, S.K.2
Hao, B.L.T.3
Brumley, D.4
-
14
-
-
84910680268
-
You can run but you can’t read: Preventing disclosure exploits in executable code
-
BACKES, M., HOLZ, T., KOLLENDA, B., KOPPE, P., NÜRNBERGER, S., AND PEWNY, J. You Can Run but You Can’t Read: Preventing Disclosure Exploits in Executable Code. In Proceedings of the 21st ACM Conference on Computer and Communications Security (2014).
-
(2014)
Proceedings of the 21st ACM Conference on Computer and Communications Security
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
16
-
-
79960356314
-
BAP: A binary analysis platform
-
BRUMLEY, D., JAGER, I., AVGERINOS, T., AND SCHWARTZ, E. J. BAP: A Binary Analysis Platform. In Proceedings of the 23rd International Conference on Computer Aided Verification (2011).
-
(2011)
Proceedings of the 23rd International Conference on Computer Aided Verification
-
-
Brumley, D.1
Jager, I.2
Avgerinos, T.3
Schwartz, E.J.4
-
17
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
BRUMLEY, D., POOSANKAM, P., SONG, D., AND ZHENG, J. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. In Proceedings of the 29th IEEE Symposium on Security and Privacy (2008).
-
(2008)
Proceedings of the 29th IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Poosankam, P.2
Song, D.3
Zheng, J.4
-
19
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-Control-Data Attacks Are Realistic Threats. In Proceedings of the 14th USENIX Security Symposium (2005).
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
20
-
-
84889030419
-
Shredding your garbage: Reducing data lifetime through secure deallocation
-
CHOW, J., PFAFF, B., GARFINKEL, T., AND ROSENBLUM, M. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation. In Proceedings of the 14th USENIX Security Symposium (2005).
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Rosenblum, M.4
-
23
-
-
85076889619
-
TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones
-
ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (2010).
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
24
-
-
84894088425
-
Toward automated detection of logic vulnerabilities in web applications
-
FELMETSGER, V., CAVEDON, L., KRUEGEL, C., AND VIGNA, G. Toward Automated Detection of Logic Vulnerabilities in Web Applications. In Proceedings of the 19th USENIX Security Symposium (2010).
-
(2010)
Proceedings of the 19th USENIX Security Symposium
-
-
Felmetsger, V.1
Cavedon, L.2
Kruegel, C.3
Vigna, G.4
-
27
-
-
85084164164
-
Cyclone: A safe dialect of C
-
JIM, T., MORRISETT, J. G., GROSSMAN, D., HICKS, M. W., CHENEY, J., AND WANG, Y. Cyclone: A Safe Dialect of C. In Proceedings of the USENIX Annual Technical Conference (2002).
-
(2002)
Proceedings of the USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, J.G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
28
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
LUK, C.-K., COHN, R., MUTH, R., PATIL, H., KLAUSER, A., LOWNEY, G., WALLACE, S., REDDI, V. J., AND HAZELWOOD, K. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (2005).
-
(2005)
Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
29
-
-
67650812047
-
Softbound: Highly compatible and complete spatial memory safety for C
-
NAGARAKATTE, S., ZHAO, J., MARTIN, M. M., AND ZDANCEWIC, S. SoftBound: Highly Compatible and Complete Spatial Memory Safety for C. In Proceedings of the 30th ACM SIG-PLAN Conference on Programming Language Design and Implementation (2009).
-
(2009)
Proceedings of the 30th ACM SIG-PLAN Conference on Programming Language Design and Implementation
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
30
-
-
77954726241
-
CETS: Compiler enforced temporal safety for C
-
NAGARAKATTE, S., ZHAO, J., MARTIN, M. M., AND ZDANCEWIC, S. CETS: Compiler Enforced Temporal Safety for C. In Proceedings of the 9th International Symposium on Memory Management (2010).
-
(2010)
Proceedings of the 9th International Symposium on Memory Management
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
36
-
-
85021046176
-
Enforcing Forward-edge Control-flow Integrity in GCC & LLVM
-
TICE, C., ROEDER, T., COLLINGBOURNE, P., CHECKOWAY, S., ERLINGSSON, U., LOZANO, L., AND PIKE, G. Enforcing Forward-edge Control-flow Integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Security Symposium (2014).
-
(2014)
Proceedings of the 23rd USENIX Security Symposium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, U.5
Lozano, L.6
Pike, G.7
-
40
-
-
72249104474
-
Improving application security with data flow assertions
-
YIP, A., WANG, X., ZELDOVICH, N., AND KAASHOEK, M. F. Improving Application Security with Data Flow Assertions. In Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles (2009).
-
(2009)
Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles
-
-
Yip, A.1
Wang, X.2
Zeldovich, N.3
Kaashoek, M.F.4
-
43
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
ZHANG, C., WEI, T., CHEN, Z., DUAN, L., SZEKERES, L., MCCAMANT, S., SONG, D., AND ZOU, W. Practical Control Flow Integrity and Randomization for Binary Executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy (2013).
-
(2013)
Proceedings of the 34th IEEE Symposium on Security and Privacy
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|