-
1
-
-
72449145808
-
Control-flow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. ACM TISSEC, 13(1), 2009.
-
(2009)
ACM TISSEC
, vol.13
, Issue.1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
84988865114
-
-
CoRR, abs/1605.07763
-
T. Abera, N. Asokan, L. Davi, J. Ekberg, T. Nyman, A. Paverd, A. Sadeghi, and G. Tsudik. C-FLAT: control-flow attestation for embedded systems software. CoRR, abs/1605.07763, 2016.
-
(2016)
C-FLAT: Control-flow Attestation for Embedded Systems Software
-
-
Abera, T.1
Asokan, N.2
Davi, L.3
Ekberg, J.4
Nyman, T.5
Paverd, A.6
Sadeghi, A.7
Tsudik, G.8
-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 2000.
-
(2000)
Phrack Magazine
, vol.49
, Issue.14
-
-
Aleph One1
-
6
-
-
78650180973
-
Trusted virtual containers on demand
-
K. A. Bailey and S. W. Smith. Trusted virtual containers on demand. In ACM-CCS-STC, 2010.
-
(2010)
ACM-CCS-STC
-
-
Bailey, K.A.1
Smith, S.W.2
-
8
-
-
84944111596
-
TyTAN: Tiny trust anchor for tiny devices
-
F. Brasser, B. El Mahjoub, A.-R. Sadeghi, C. Wachsmann, and P. Koeberl. TyTAN: Tiny Trust Anchor for Tiny Devices. In ACM/IEEE Design Automation Conference, 2015.
-
(2015)
ACM/IEEE Design Automation Conference
-
-
Brasser, F.1
El Mahjoub, B.2
Sadeghi, A.-R.3
Wachsmann, C.4
Koeberl, P.5
-
9
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
10
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In ACM CCS, 2010.
-
(2010)
ACM CCS
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
11
-
-
84979698699
-
Towards automated dynamic analysis for Linux-based embedded firmware
-
D. D. Chen, M. Egele, M. Woo, and D. Brumley. Towards automated dynamic analysis for Linux-based embedded firmware. In ISOC NDSS, 2016.
-
(2016)
ISOC NDSS
-
-
Chen, D.D.1
Egele, M.2
Woo, M.3
Brumley, D.4
-
12
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In USENIX Security, 2005.
-
(2005)
USENIX Security
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
13
-
-
0027684663
-
Operating system protection through program evolution
-
F. B. Cohen. Operating system protection through program evolution. Computer & Security, 12(6), 1993.
-
(1993)
Computer & Security
, vol.12
, Issue.6
-
-
Cohen, F.B.1
-
15
-
-
84901629830
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nürnberger, and A.-R. Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In ISOC NDSS, 2012.
-
(2012)
ISOC NDSS
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.-R.8
-
16
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
L. Davi, D. Lehmann, A.-R. Sadeghi, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Davi, L.1
Lehmann, D.2
Sadeghi, A.-R.3
Monrose, F.4
-
17
-
-
74049136385
-
Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
-
L. Davi, A.-R. Sadeghi, and M. Winandy. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In ACM CCS-STC, 2009.
-
(2009)
ACM CCS-STC
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
18
-
-
84951316191
-
SMART: Secure and minimal architecture for (establishing dynamic) root of trust
-
K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito. SMART: secure and minimal architecture for (establishing dynamic) root of trust. In ISOC NDSS, 2012.
-
(2012)
ISOC NDSS
-
-
Eldefrawy, K.1
Tsudik, G.2
Francillon, A.3
Perito, D.4
-
19
-
-
70349278622
-
Code injection attacks on Harvard-architecture devices
-
A. Francillon and C. Castelluccia. Code injection attacks on Harvard-architecture devices. In ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Francillon, A.1
Castelluccia, C.2
-
21
-
-
84995401926
-
Data-oriented programming: On the effectiveness of non-control data attacks
-
H. Hu, S. Shinde, S. Adrian, Z. L. Chua, P. Saxena, and Z. Liang. Data-oriented programming: On the effectiveness of non-control data attacks. In IEEE S&P, 2016.
-
(2016)
IEEE S&P
-
-
Hu, H.1
Shinde, S.2
Adrian, S.3
Chua, Z.L.4
Saxena, P.5
Liang, Z.6
-
22
-
-
84903849094
-
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
-
C. Kil, E. Sezer, A. Azab, P. Ning, and X. Zhang. Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. In IEEE/IFIP DSN, 2009.
-
(2009)
IEEE/IFIP DSN
-
-
Kil, C.1
Sezer, E.2
Azab, A.3
Ning, P.4
Zhang, X.5
-
26
-
-
84942539024
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In USENIX OSDI, 2014.
-
(2014)
USENIX OSDI
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
28
-
-
80755144042
-
VIPER: Verifying the Integrity of PERipherals' Firmware
-
Y. Li, J. M. McCune, and A. Perrig. VIPER: Verifying the Integrity of PERipherals' Firmware. In ACM CCS, 2011.
-
(2011)
ACM CCS
-
-
Li, Y.1
McCune, J.M.2
Perrig, A.3
-
29
-
-
84863098629
-
TrustVisor: Efficient TCB reduction and attestation
-
J. M. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor, and A. Perrig. TrustVisor: Efficient TCB reduction and attestation. In IEEE S&P, 2010.
-
(2010)
IEEE S&P
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
30
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In ACM SIGOPS EuroSys, 2008.
-
(2008)
ACM SIGOPS EuroSys
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
32
-
-
85076321179
-
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
-
J. Noorman, P. Agten, W. Daniels, R. Strackx, A. V. Herrewege, C. Huygens, B. Preneel, I. Verbauwhede, and F. Piessens. Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Noorman, J.1
Agten, P.2
Daniels, W.3
Strackx, R.4
Herrewege, A.V.5
Huygens, C.6
Preneel, B.7
Verbauwhede, I.8
Piessens, F.9
-
33
-
-
84995371292
-
T-KVM: A trusted architecture for KVM ARM v7 and v8 virtual machines
-
M. Paolino, A. Rigo, A. Spyridakis, J. Fanguède, P. Lalov, and D. Raho. T-KVM: A trusted architecture for KVM ARM v7 and v8 virtual machines. In IARIA Cloud Computing, 2015.
-
(2015)
IARIA Cloud Computing
-
-
Paolino, M.1
Rigo, A.2
Spyridakis, A.3
Fanguède, J.4
Lalov, P.5
Raho, D.6
-
34
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Return-oriented programming: Systems, languages, and applications. ACM TISSEC, 15(1):2:1-2:34, 2012.
-
(2012)
ACM TISSEC
, vol.15
, Issue.1
, pp. 21-234
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
35
-
-
29244472125
-
Property-based attestation for computing platforms: Caring about properties, not mechanisms
-
A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In NSPW, 2004.
-
(2004)
NSPW
-
-
Sadeghi, A.-R.1
Stüble, C.2
-
36
-
-
84994201123
-
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
-
F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications. In IEEE S&P, 2015.
-
(2015)
IEEE S&P
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
37
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems. In ACM SIGOPS Operating Systems Review, 2005.
-
(2005)
ACM SIGOPS Operating Systems Review
-
-
Seshadri, A.1
Luk, M.2
Shi, E.3
Perrig, A.4
Van Doorn, L.5
Khosla, P.6
-
39
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM CCS, 2007.
-
(2007)
ACM CCS
-
-
Shacham, H.1
-
40
-
-
84954177142
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE S&P, 2013.
-
(2013)
IEEE S&P
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
43
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC & LLVM
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, Ú. Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-flow integrity in GCC & LLVM. In USENIX Security, 2014.
-
(2014)
USENIX Security
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, Ú.5
Lozano, L.6
Pike, G.7
-
45
-
-
84907200759
-
Open-source syringe pump library
-
Jan.
-
B. Wijnen, E. J. Hunt, G. C. Anzalone, and J. M. Pearce. Open-source syringe pump library. PloS one, 9(9):e107216, jan 2014.
-
(2014)
PloS One
, vol.9
, Issue.9
, pp. e107216
-
-
Wijnen, B.1
Hunt, E.J.2
Anzalone, G.C.3
Pearce, J.M.4
-
47
-
-
85041451135
-
Control flow integrity for COTS binaries
-
M. Zhang and R. Sekar. Control flow integrity for COTS binaries. In USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Zhang, M.1
Sekar, R.2
|