-
1
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
Martin Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. 2005a. Control-flow integrity: Principles, implementations, and applications. In ACM Conference on Computer and Communications Security (CCS'05).
-
(2005)
ACM Conference on Computer and Communications Security (CCS'05)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
3
-
-
84944080766
-
HAFIX: Hardware-assisted flow integrity extension
-
Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, and Dean Sullivan. 2015. HAFIX: Hardware-assisted flow integrity extension. In Annual Design Automation Conference (DAC'15).
-
(2015)
Annual Design Automation Conference (DAC'15)
-
-
Arias, O.1
Davi, L.2
Hanreich, M.3
Jin, Y.4
Koeberl, P.5
Paul, D.6
Sadeghi, A.-R.7
Sullivan, D.8
-
4
-
-
0345565890
-
A brief history of just-in-time
-
John Aycock. 2003. A brief history of just-in-time. Computing Surveys 35, 2, 97-113.
-
(2003)
Computing Surveys
, vol.35
, Issue.2
, pp. 97-113
-
-
Aycock, J.1
-
5
-
-
0030260329
-
Fast static analysis of C++ virtual function calls
-
David F. Bacon and Peter F. Sweeney. 1996. Fast static analysis of C++ virtual function calls. ACM SIGPLAN Notices 31, 10, 324-341.
-
(1996)
ACM SIGPLAN Notices
, vol.31
, Issue.10
, pp. 324-341
-
-
Bacon, D.F.1
Sweeney, P.F.2
-
6
-
-
84976797077
-
Threaded code
-
James R. Bell. 1973. Threaded code. Communications of the ACM 16, 6, 370-372.
-
(1973)
Communications of the ACM
, vol.16
, Issue.6
, pp. 370-372
-
-
Bell, J.R.1
-
9
-
-
85053935206
-
Control-flow bending: On the effectiveness of control-flow integrity
-
Washington, D.C., August 12-14, 2015
-
Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-flow bending: On the effectiveness of control-flow integrity. In 24th USENIX Security Symposium, USENIX Security 15. Washington, D.C., August 12-14, 2015.
-
(2015)
24th USENIX Security Symposium, USENIX Security 15
-
-
Carlini, N.1
Barresi, A.2
Payer, M.3
Wagner, D.4
Gross, T.R.5
-
11
-
-
78650032454
-
Return-oriented programming without returns
-
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. 2010. Return-oriented programming without returns. In ACM Conference on Computer and Communications Security (CCS).
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
14
-
-
85017180084
-
-
(2015) Retrieved March 1, 2017
-
Peter Collingbourne. 2015. LLVM - Control Flow Integrity. (2015). Retrieved March 1, 2017 from http://clang.llvm.org/docs/ControlFlowIntegrity.html.
-
(2015)
LLVM - Control Flow Integrity
-
-
Collingbourne, P.1
-
15
-
-
84954171757
-
Losing control: On the effectiveness of control-flow integrity under stack attacks
-
Mauro Conti, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, Marco Negro, Mohaned Qunaibit, and Ahmad-Reza Sadeghi. 2015. Losing control: On the effectiveness of control-flow integrity under stack attacks. In ACM Conference on Computer and Communications Security (CCS'15).
-
(2015)
ACM Conference on Computer and Communications Security (CCS'15)
-
-
Conti, M.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Liebchen, C.6
Negro, M.7
Qunaibit, M.8
Sadeghi, A.-R.9
-
19
-
-
85180792449
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan Nürnberger, and Ahmad-Reza Sadeghi. 2012. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Symposium on Network and Distributed System Security (NDSS'12).
-
(2012)
Symposium on Network and Distributed System Security (NDSS'12)
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.-R.8
-
20
-
-
84903161773
-
Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation
-
Lucas Davi, Patrick Koeberl, and Ahmad-Reza Sadeghi. 2014a. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation. In Annual Design Automation Conference (DAC'14).
-
(2014)
Annual Design Automation Conference (DAC'14)
-
-
Davi, L.1
Koeberl, P.2
Sadeghi, A.-R.3
-
21
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, and Fabian Monrose. 2014b. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security Symposium.
-
(2014)
USENIX Security Symposium
-
-
Davi, L.1
Lehmann, D.2
Sadeghi, A.-R.3
Monrose, F.4
-
24
-
-
84945192930
-
Missing the point: On the effectiveness of code pointer integrity
-
Isaac Evans, Samuel Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard Shrobe, Stelios Sidiroglou-Douskos, Martin Rinard, and Hamed Okhravi. 2015a. Missing the point: On the effectiveness of code pointer integrity. In IEEE Symposium on Security and Privacy (S&P'15).
-
(2015)
IEEE Symposium on Security and Privacy (S&P'15)
-
-
Evans, I.1
Fingeret, S.2
Gonzalez, J.3
Otgonbaatar, U.4
Tang, T.5
Shrobe, H.6
Sidiroglou-Douskos, S.7
Rinard, M.8
Okhravi, H.9
-
25
-
-
84954145711
-
Control jujutsu: On the weaknesses of fine-grained control flow integrity
-
Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard Shrobe, Martin Rinard, Hamed Okhravi, and Stelios Sidiroglou-Douskos. 2015b. Control jujutsu: On the weaknesses of fine-grained control flow integrity. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
-
(2015)
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
-
-
Evans, I.1
Long, F.2
Otgonbaatar, U.3
Shrobe, H.4
Rinard, M.5
Okhravi, H.6
Sidiroglou-Douskos, S.7
-
26
-
-
85017159271
-
Exploiting Adobe Flash Player in the era of Control Flow Guard
-
Retrieved March 1, 2017
-
Francisco Falcon. 2015. Exploiting Adobe Flash Player in the era of Control Flow Guard. BlackHat EU'15. Retrieved March 1, 2017 from https://www.blackhat.com/docs/eu-15/materials/eu-15-Falcon-Exploiting-Adobe-Flash-Player-In-The-Era-Of-Control-Flow-Guard.pdf.
-
(2015)
BlackHat EU'15
-
-
Falcon, F.1
-
32
-
-
35448946037
-
The ant and the grasshopper
-
ACM Press, New York, NY
-
Ben Hardekopf and Calvin Lin. 2007. The ant and the grasshopper. In Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'07), Vol. 42. ACM Press, New York, NY, 290. DOI:http://dx.doi.org/10.1145/1250734.1250767
-
(2007)
Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'07)
, vol.42
, pp. 290
-
-
Hardekopf, B.1
Lin, C.2
-
37
-
-
84888782524
-
Intel 64 and IA-32 Architectures
-
Intel Inc
-
Intel Inc. 2013. Intel 64 and IA-32 Architectures. Software Developer's Manual.
-
(2013)
Software Developer's Manual
-
-
-
41
-
-
0020101510
-
An architectural trail to threaded-code systems
-
Peter M. Kogge. 1982. An architectural trail to threaded-code systems. Computer 15, 3, 22-32. DOI:http://dx.doi.org/10.1109/MC.1982.1653970
-
(1982)
Computer
, vol.15
, Issue.3
, pp. 22-32
-
-
Kogge, P.M.1
-
43
-
-
33745794058
-
Context-sensitive points-to analysis: Is it worth it?
-
O. Lhoták and Laurie Hendren. 2006. Context-sensitive points-to analysis: Is it worth it? Compiler Construction 47-64.
-
(2006)
Compiler Construction
, pp. 47-64
-
-
Lhoták, O.1
Hendren, L.2
-
46
-
-
34548146785
-
-
Retrieved March 1, 2017
-
Microsoft. 2006. Data Execution Prevention (DEP). Retrieved March 1, 2017 from http://support.microsoft.com/kb/875352/EN-US/.
-
(2006)
Data Execution Prevention (DEP)
-
-
-
48
-
-
85017129583
-
-
Retrieved March 1, 2017
-
Microsoft. 2015b. SetProcessValidCallTargets function. Retrieved March 1, 2017 from https://msdn.microsoft.com/en-us/enus/library/windows/desktop/dn934202(v=vs.85).aspx. (2015).
-
(2015)
SetProcessValidCallTargets Function
-
-
-
49
-
-
0036986544
-
Parameterized object sensitivity for points-to and side-effect analyses for java
-
2002
-
Ana Milanova, Atanas Rountev, and Barbara G. Ryder. 2002. Parameterized object sensitivity for points-to and side-effect analyses for java. ACM SIGSOFT Software Engineering Notes 27, 4 (2002), 1.
-
(2002)
ACM SIGSOFT Software Engineering Notes
, vol.27
, Issue.4
, pp. 1
-
-
Milanova, A.1
Rountev, A.2
Ryder, B.G.3
-
58
-
-
85017171868
-
-
Retrieved March 1, 2017
-
Ben Niu and Gang Tan. 2015a. MCFI readme. Retrieved March 1, 2017 from https://github.com/mcfi/MCFI/blob/master/README.md.
-
(2015)
MCFI Readme
-
-
Niu, B.1
Tan, G.2
-
63
-
-
85017116970
-
-
Retrieved March 1, 2017
-
PaX-Team. 2003b. PaX Future. Retrieved March 1, 2017 from https://pax.grsecurity.net/docs/pax-future.txt.
-
(2003)
PaX Future
-
-
-
64
-
-
84977835464
-
Fine-grained control-flow integrity through binary hardening
-
Milan, Italy, July 9-10, 2015
-
Mathias Payer, Antonio Barresi, and Thomas R. Gross. 2015. Fine-grained control-flow integrity through binary hardening. In Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'15). Milan, Italy, July 9-10, 2015.
-
(2015)
Proceedings of the 12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'15)
-
-
Payer, M.1
Barresi, A.2
Gross, T.R.3
-
66
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage. 2012. Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information System Security 15.
-
(2012)
ACM Transactions on Information System Security
, vol.15
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
68
-
-
4544307575
-
Evaluating the imprecision of static analysis
-
ACM Press, New York, NY
-
Atanas Rountev, Scott Kagan, and Michael Gibas. 2004. Evaluating the imprecision of static analysis. In Proceedings of the ACM-SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE'04). ACM Press, New York, NY, 14. DOI:http://dx.doi.org/10.1145/996821.996829
-
(2004)
Proceedings of the ACM-SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering (PASTE'04)
, pp. 14
-
-
Rountev, A.1
Kagan, S.2
Gibas, M.3
-
70
-
-
84945184526
-
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
-
Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, and Thorsten Holz. 2015. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications. In IEEE Symposium on Security and Privacy (S&P'15).
-
(2015)
IEEE Symposium on Security and Privacy (S&P'15)
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
71
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Hovav Shacham. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In CCS'07.
-
(2007)
CCS'07
-
-
Shacham, H.1
-
72
-
-
0002823436
-
Two approaches to interprocedural data flow analysis
-
Steven S. Muchnick and Neil D. Jones (Eds.). Prentice Hall, Upper Saddle River, NJ
-
Micha Sharir and Amir Pnueli. 1981. Two approaches to interprocedural data flow analysis. In Program Flow Analysis, Steven S. Muchnick and Neil D. Jones (Eds.). Prentice Hall, Upper Saddle River, NJ.
-
(1981)
Program Flow Analysis
-
-
Sharir, M.1
Pnueli, A.2
-
74
-
-
79251564956
-
Pick your contexts well
-
Yannis Smaragdakis, Martin Bravenboer, and Ondrej Lhoták. 2011. Pick your contexts well. ACM SIGPLAN Notices 46, 1, 17.
-
(2011)
ACM SIGPLAN Notices
, vol.46
, Issue.1
, pp. 17
-
-
Smaragdakis, Y.1
Bravenboer, M.2
Lhoták, O.3
-
75
-
-
84977156835
-
Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity
-
Dean Sullivan, Orlando Arias, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, and Yier Jin. 2016. Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity. In Annual Design Automation Conference (DAC'16).
-
(2016)
Annual Design Automation Conference (DAC'16)
-
-
Sullivan, D.1
Arias, O.2
Davi, L.3
Larsen, P.4
Sadeghi, A.-R.5
Jin, Y.6
-
77
-
-
85021046176
-
Enforcing forward-edge control-flow integrity in GCC & LLVM
-
Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing forward-edge control-flow integrity in GCC & LLVM. In USENIX Security Symposium.
-
(2014)
USENIX Security Symposium
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, Ú.5
Lozano, L.6
Pike, G.7
-
78
-
-
17944376454
-
Scalable propagation-based call graph construction algorithms
-
Frank Tip and Jens Palsberg. 2000. Scalable propagation-based call graph construction algorithms. ACM SIGPLAN Notices 35, 10, 281-293.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.10
, pp. 281-293
-
-
Tip, F.1
Palsberg, J.2
-
79
-
-
84874182338
-
-
Retrieved March 1, 2017 (2004)
-
Arjan van de Ven and Ingo Molnar. 2004. Exec Shield. Retrieved March 1, 2017 from https://www.redhat.com/f/pdf/rhel/WHP0006US-Execshield.pdf. (2004).
-
(2004)
Exec Shield
-
-
Van De Ven, A.1
Molnar, I.2
-
80
-
-
85017138247
-
PathArmor: Practical ROP protection using context-sensitive CFI
-
Victor van der Veen, Dennis Andriesse, Enes Göktaş, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida. 2015. PathArmor: Practical ROP protection using context-sensitive CFI. In ACM Conference on Computer and Communications Security (CCS'15).
-
(2015)
ACM Conference on Computer and Communications Security (CCS'15)
-
-
Van Der Veen, V.1
Andriesse, D.2
Göktaş, E.3
Gras, B.4
Sambuc, L.5
Slowinska, A.6
Bos, H.7
Giuffrida, C.8
-
81
-
-
84869420078
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Zhi Wang and Xuxian Jiang. 2010. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE S&P'10.
-
(2010)
IEEE S&P'10
-
-
Wang, Z.1
Jiang, X.2
-
82
-
-
85017129115
-
Windows 10 Mitigation Improvements
-
Retrieved March 1, 2017
-
David Weston and Matt Miller. 2016. Windows 10 Mitigation Improvements. BlackHat'16. Retrieved March 1, 2017 from https://www.blackhat.com/docs/us-16/materials/us-16-Weston-Windows-10-Mitigation-Improvements.pdf.
-
(2016)
BlackHat'16
-
-
Weston, D.1
Miller, M.2
-
86
-
-
84881218812
-
Practical control flow integrity & randomization for binary executables
-
Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical control flow integrity & randomization for binary executables. In IEEE Symposium on Security and Privacy (S&P'13).
-
(2013)
IEEE Symposium on Security and Privacy (S&P'13)
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
|