-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One: Smashing the stack for fun and profit. Phrack49 (1996)
-
(1996)
Phrack
, pp. 49
-
-
-
2
-
-
38849147719
-
Code injection in C and C++: A survey of vulnerabilities and countermeasures
-
Departement Computerwetenschappen, Katholieke Universiteit Leuven
-
Younan, Y., Joosen, W., Piessens, F.: Code injection in C and C++: A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven (2004)
-
(2004)
Technical Report CW386
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
3
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
Austin, T.M., Breach, S.E., Sohi, G.S.: Efficient detection of all pointer and array access errors. In: Proc. of the ACM’94 Conf. on Programming Language Design and Implementation, Orlando, FL (1994)
-
(1994)
Proc. of the ACM’94 Conf. on Programming Language Design and Implementation, Orlando, FL
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
6
-
-
20344383014
-
An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs
-
Xu, W., DuVarney, D.C., Sekar, R.: An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs. In: Proc. of the 12th ACM Int. Symp. on Foundations of Software Engineering, Newport Beach, CA (2004)
-
(2004)
Proc. of the 12Th ACM Int. Symp. on Foundations of Software Engineering, Newport Beach, CA
-
-
Xu, W.1
Duvarney, D.C.2
Sekar, R.3
-
7
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. of the 7th USENIX Security Symp., San Antonio, TX (1998)
-
(1998)
Proc. of the 7Th USENIX Security Symp., San Antonio, TX
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
9
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
Technical Conf. Proc., San Diego, CA
-
Baratloo, A., Singh, N., Tsai, T.: Transparent run-time defense against stack smashing attacks. In: USENIX2000Technical Conf. Proc., San Diego, CA (2000)
-
(2000)
USENIX
, pp. 2000
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
10
-
-
12344316966
-
Architecture support for defending against buffer overflow attacks
-
10.Xu, J., Kalbarczyk, Z., Patel, S., Ravishankar, K.I.: Architecture support for defending against buffer overflow attacks. In: Second Workshop on Evaluating and Architecting System dependabilitY, San Jose, CA (2002)
-
(2002)
Second Workshop on Evaluating and Architecting System Dependability, San Jose, CA
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Ravishankar, K.I.4
-
11
-
-
39049133983
-
Extended protection against stack smashing attacks without performance loss
-
11.Younan, Y., Pozza, D., Joosen, W., Piessens, F.: Extended protection against stack smashing attacks without performance loss. In: Proc. of the Annual Computer Security Apps. Conf., Miami, FL (2006)
-
(2006)
Proc. of the Annual Computer Security Apps. Conf., Miami, FL
-
-
Younan, Y.1
Pozza, D.2
Joosen, W.3
Piessens, F.4
-
12
-
-
85094678188
-
Run-time detection of heap-based overflows
-
Robertson, W., Kruegel, C., Mutz, D., Valeur, F.: Run-time detection of heap-based overflows. In: Proc. of the 17th Large Installation Systems Administrators Conf., San Diego, CA (2003)
-
(2003)
Proc. of the 17Th Large Installation Systems Administrators Conf., San Diego, CA
-
-
Robertson, W.1
Kruegel, C.2
Mutz, D.3
Valeur, F.4
-
18
-
-
85025628062
-
Re: One of your c.l.c faq question
-
Summit, S.: Re: One of your c.l.c faq question. Comp.lang.C newsgroup (2001)
-
(2001)
Comp.Lang.C Newsgroup
-
-
Summit, S.1
-
19
-
-
17644393012
-
Bypassing Stackguard and stackshield
-
Bulba, Kil3r: Bypassing Stackguard and stackshield. Phrack56 (2000)
-
(2000)
Phrack
, pp. 56
-
-
-
20
-
-
79960594842
-
Once upon a free()
-
anonymous: Once upon a free(). Phrack57 (2001)
-
(2001)
Phrack
, pp. 57
-
-
-
21
-
-
84874468457
-
Vudo - An object superstitiously believed to embody magical powers
-
Kaempf, M.: Vudo - an object superstitiously believed to embody magical powers. Phrack57 (2001)
-
(2001)
Phrack
, pp. 57
-
-
Kaempf, M.1
-
26
-
-
47649101334
-
Advanced Programming in the UNIX env
-
26.Stevens, W.R.: Advanced Programming in the UNIX env. Addison-Wesley (1993)
-
(1993)
Addison-Wesley
-
-
Stevens, W.R.1
-
27
-
-
85025609750
-
-
The PaX Team: Documentation for PaX. http://pax.grsecurity.net (2000)
-
(2000)
Documentation for Pax
-
-
-
28
-
-
0034226001
-
Spec cpu2000: Measuring cpu performance in the new millennium
-
Henning, J.L.: Spec cpu2000: Measuring cpu performance in the new millennium. Computer33(7) (2000)
-
(2000)
Computer
, vol.33
, Issue.7
-
-
Henning, J.L.1
-
29
-
-
0027797652
-
Improving the cache locality of memory allocation
-
Conf. on Programming Language Design and Implementation, New York, NY
-
Grunwald, D., Zorn, B., Henderson, R.: Improving the cache locality of memory allocation. In: Proc. of the ACM1993Conf. on Programming Language Design and Implementation, New York, NY (1993)
-
(1993)
Proc. of the ACM
, pp. 1993
-
-
Grunwald, D.1
Zorn, B.2
Henderson, R.3
-
31
-
-
0034830634
-
Composing high-performance memory allocators
-
31.Berger, E.D., Zorn, B.G., McKinley, K.S.: Composing high-performance memory allocators. In: Proc. of the ACM Conf. on Programming Language Design and Implementation, Snowbird, UT (2001)
-
(2001)
Proc. of the ACM Conf. on Programming Language Design and Implementation, Snowbird, UT
-
-
Berger, E.D.1
Zorn, B.G.2
McKinley, K.S.3
-
32
-
-
0038147962
-
Reconsidering custom memory allocation
-
32.Berger, E.D., Zorn, B.G., McKinley, K.S.: Reconsidering custom memory allocation. In: Proc. of the ACM Conf. on Object-Oriented Programming Systems, Languages and Apps., Seattle, WA (2002)
-
(2002)
Proc. of the ACM Conf. on Object-Oriented Programming Systems, Languages and Apps., Seattle, WA
-
-
Berger, E.D.1
Zorn, B.G.2
McKinley, K.S.3
-
34
-
-
85025638584
-
Wu-ftpd 2.6.1 exploit
-
Zen-parse: Wu-ftpd 2.6.1 exploit. Vuln-dev mailinglist (2001)
-
(2001)
Vuln-Dev Mailinglist
-
-
-
37
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: protecting pointers from buffer overflow vulnerabilities. In: Proc. of the 12th USENIX Security Symp., Washington, DC (2003)
-
(2003)
Proc. of the 12Th USENIX Security Symp., Washington, DC
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
38
-
-
35348976981
-
Defeating compiler-level buffer overflow protection.;login
-
Alexander, S.: Defeating compiler-level buffer overflow protection.;login: The USENIX Magazine 30(3) (2005)
-
(2005)
The USENIX Magazine
, vol.30
, Issue.3
-
-
Alexander, S.1
-
40
-
-
21844444349
-
Defeating Solar Designer’s Non-executable Stack Patch
-
40.Wojtczuk, R.: Defeating Solar Designer’s Non-executable Stack Patch. Bugtraq mailinglist (1998)
-
(1998)
Bugtraq Mailinglist
-
-
Wojtczuk, R.1
-
41
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: Proc. of the 12th USENIX Security Symp., Washington, DC (2003)
-
(2003)
Proc. of the 12Th USENIX Security Symp., Washington, DC
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
42
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization
-
Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the Effectiveness of Address-Space Randomization. In: Proc. of the 11th ACM Conf. on Computer and communications security, Washington, DC (2004)
-
(2004)
Proc. of the 11Th ACM Conf. on Computer and Communications Security, Washington, DC
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.J.4
Modadugu, N.5
Boneh, D.6
-
43
-
-
85084159869
-
Tied, libsafeplus: Tools for runtime buffer overflow protection
-
Avijit, K., Gupta, P., Gupta, D.: Tied, libsafeplus: Tools for runtime buffer overflow protection. In: Proc. of the 13th USENIX Security Symp., San Diego, CA (2004)
-
(2004)
Proc. of the 13Th USENIX Security Symp., San Diego, CA
-
-
Avijit, K.1
Gupta, P.2
Gupta, D.3
-
44
-
-
85084162336
-
Secure execution via program shepherding
-
Kiriansky, V., Bruening, D., Amarasinghe, S.: Secure execution via program shepherding. In: Proc. of the 11th USENIX Security Symp., San Francisco, CA (2002)
-
(2002)
Proc. of the 11Th USENIX Security Symp., San Francisco, CA
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
45
-
-
33646767376
-
Control-flow integrity
-
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: Proc. of the 12th ACM Conf. on Computer and Communications Security, Alexandria, VA (2005)
-
(2005)
Proc. of the 12Th ACM Conf. on Computer and Communications Security, Alexandria, VA
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
|