-
1
-
-
85180744477
-
-
MITRE, CWE-ID CWE-122. [Online]. Available
-
“CWE-122.” Available from MITRE, CWE-ID CWE-122. [Online]. Available: https://cwe.mitre.org/data/definitions/122.html
-
CWE-122
-
-
-
2
-
-
85180783359
-
-
MITRE, CVE-ID CVE-2014-0160., [Online]. Available
-
“CVE-2012-0167.” Available from MITRE, CVE-ID CVE-2014-0160., 2011. [Online]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2012-0167
-
(2011)
CVE-2012-0167
-
-
-
3
-
-
80052007811
-
Control-flow integrity
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, “Control-flow integrity,” in CCS, 2005.
-
(2005)
CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
4
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro, “Preventing memory error exploits with WIT,” in S&P, 2008, pp. 263-277.
-
(2008)
S&P
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
5
-
-
85041434971
-
Losing control: On the effectiveness of control-flow integrity under stack attacks
-
M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen, M. Negro, M. Qunaibit, and A.-r. Sadeghi, “Losing control: On the effectiveness of control-flow integrity under stack attacks,” In CCS, 2015.
-
(2015)
CCS
-
-
Conti, M.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Negro, M.6
Qunaibit, M.7
Sadeghi, A.-r.8
-
6
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
A. D. Rubin, Ed
-
C. Cowan, “Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks,” in USENIX Security, A. D. Rubin, Ed., 1998.
-
(1998)
USENIX Security
-
-
Cowan, C.1
-
7
-
-
85009448253
-
PointguardTM: Protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, “PointguardTM: Protecting pointers from buffer overflow vulnerabilities,” in USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
8
-
-
84954159903
-
Its a trap: Table randomization and protection against function-reuse attacks
-
S. Crane, S. Volckaert, F. Schuster, C. Liebchen, P. Larsen, L. Davi, A.-R. Sadeghi, T. Holz, B. D. Sutter, and M. Franz, “Its a trap: Table randomization and protection against function-reuse attacks,” In CCS, 2015.
-
(2015)
CCS
-
-
Crane, S.1
Volckaert, S.2
Schuster, F.3
Liebchen, C.4
Larsen, P.5
Davi, L.6
Sadeghi, A.-R.7
Holz, T.8
Sutter, B. D.9
Franz, M.10
-
9
-
-
85180792449
-
Mocfi: A framework to mitigate control-flow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nürnberger, and A. Sadeghi, “Mocfi: A framework to mitigate control-flow attacks on smartphones,” in NDSS, 2012.
-
(2012)
NDSS
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.8
-
11
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
E. Göktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, “Out of control: Overcoming control-flow integrity,” in In S&P, 2014.
-
(2014)
S&P
-
-
Göktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
13
-
-
84959346014
-
Shrinkwrap: Vtable protection without loose ends
-
I. Haller, E. Göktas, E. Athanasopoulos, G. Portokalidis, and H. Bos, “Shrinkwrap: Vtable protection without loose ends,” in ACSAC, 2015, pp. 341-350.
-
(2015)
ACSAC
, pp. 341-350
-
-
Haller, I.1
Göktas, E.2
Athanasopoulos, E.3
Portokalidis, G.4
Bos, H.5
-
16
-
-
85180403748
-
SafeDispatch: Securing C++ virtual calls from memory corruption attacks
-
D. Jang, Z. Tatlock, and S. Lerner, “SafeDispatch: Securing C++ virtual calls from memory corruption attacks,” in NDSS, 2014.
-
(2014)
NDSS
-
-
Jang, D.1
Tatlock, Z.2
Lerner, S.3
-
17
-
-
85076902948
-
Code-pointer integrity
-
J. Flinn and H. Levy, Eds
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song, “Code-pointer integrity,” in OSDI, J. Flinn and H. Levy, Eds., 2014, pp. 147-163.
-
(2014)
OSDI
, pp. 147-163
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
18
-
-
85076313142
-
Type casting verification: Stopping an emerging attack vector
-
B. Lee, C. Song, T. Kim, and W. Lee, “Type casting verification: Stopping an emerging attack vector,” in USENIX Security, 2015.
-
(2015)
USENIX Security
-
-
Lee, B.1
Song, C.2
Kim, T.3
Lee, W.4
-
20
-
-
85180798431
-
-
http://clang.llvm.org docs/SafeStack.html
-
LLVM Team, “http://clang.llvm.org/docs/safestack.html,” http://clang.llvm.org/ docs/SafeStack.html, 2014.
-
(2014)
-
-
-
23
-
-
85072935637
-
Evaluating SFI for a CISC architecture
-
S. McCamant and G. Morrisett, “Evaluating SFI for a CISC architecture,” in In USENIX, 2006.
-
(2006)
USENIX
-
-
McCamant, S.1
Morrisett, G.2
-
25
-
-
84881252577
-
-
Microsoft Visual Studio, “Image has safe exception handlers,” http: //msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx, 2005.
-
(2005)
Image has safe exception handlers
-
-
-
26
-
-
84959417310
-
Opaque control-flow integrity
-
V. Mohan, P. Larsen, S. Brunthaler, K. W. Hamlen, and M. Franz, “Opaque control-flow integrity,” in NDSS, 2015.
-
(2015)
NDSS
-
-
Mohan, V.1
Larsen, P.2
Brunthaler, S.3
Hamlen, K. W.4
Franz, M.5
-
28
-
-
84901593819
-
Modular control-flow integrity
-
B. Niu and G. Tan, “Modular control-flow integrity,” in PLDI, 2014.
-
(2014)
PLDI
-
-
Niu, B.1
Tan, G.2
-
30
-
-
85119250464
-
vfguard: Strict protection for virtual function calls in COTS C++ binaries
-
A. Prakash, X. Hu, and H. Yin, “vfguard: Strict protection for virtual function calls in COTS C++ binaries,” in NDSS, 2015.
-
(2015)
NDSS
-
-
Prakash, A.1
Hu, X.2
Yin, H.3
-
32
-
-
84945184526
-
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
-
F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A. Sadeghi, and T. Holz, “Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications,” in S&P, 2015, pp. 745-762.
-
(2015)
S&P
, pp. 745-762
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.5
Holz, T.6
-
33
-
-
85094171206
-
Misfit: A tool for constructing safe extensible C++ systems
-
S. Vinoski, Ed
-
C. Small, “Misfit: A tool for constructing safe extensible C++ systems,” in USENIX Conference on Object-Oriented Technologies (COOTS), S. Vinoski, Ed., 1997, pp. 175-184.
-
(1997)
USENIX Conference on Object-Oriented Technologies (COOTS)
, pp. 175-184
-
-
Small, C.1
-
35
-
-
85180736719
-
Enforcing forward-edge control-flow integrity in GCC & LLVM
-
C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, Ú. Erlingsson, L. Lozano, and G. Pike, “Enforcing forward-edge control-flow integrity in GCC & LLVM,” in NDSS, 2014.
-
(2014)
NDSS
-
-
Tice, C.1
Roeder, T.2
Collingbourne, P.3
Checkoway, S.4
Erlingsson, Ú.5
Lozano, L.6
Pike, G.7
-
36
-
-
21644470294
-
Hardware and binary modification support for code pointer protection from buffer overflow
-
N. Tuck, B. Calder, and G. Varghese, “Hardware and binary modification support for code pointer protection from buffer overflow,” in 37th Annual International Symposium on Microarchitecture (MICRO- 37, 2004, pp. 209-220.
-
(2004)
37th Annual International Symposium on Microarchitecture (MICRO- 37
, pp. 209-220
-
-
Tuck, N.1
Calder, B.2
Varghese, G.3
-
38
-
-
85105238769
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, “Efficient software-based fault isolation,” in SOSP, 1993, pp. 203-216.
-
(1993)
SOSP
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T. E.3
Graham, S. L.4
-
39
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang, “Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity,” in S&P, 2010.
-
(2010)
S&P
-
-
Wang, Z.1
Jiang, X.2
-
40
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, “Native client: A sandbox for portable, untrusted x86 native code,” in S&P, 2009, pp. 79-93.
-
(2009)
S&P
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J. B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
41
-
-
80755144046
-
Combining control-flow integrity and static analysis for efficient and validated data sandboxing
-
B. Zeng, G. Tan, and G. Morrisett, “Combining control-flow integrity and static analysis for efficient and validated data sandboxing,” in CCS, 2011, pp. 29-40.
-
(2011)
CCS
, pp. 29-40
-
-
Zeng, B.1
Tan, G.2
Morrisett, G.3
-
42
-
-
85114493450
-
Vtint: Protecting virtual function tables’ integrity
-
C. Zhang, C. Song, K. Z. Chen, Z. Chen, and D. Song, “Vtint: Protecting virtual function tables’ integrity,” in NDSS, 2015.
-
(2015)
NDSS
-
-
Zhang, C.1
Song, C.2
Chen, K. Z.3
Chen, Z.4
Song, D.5
-
43
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, “Practical control flow integrity and randomization for binary executables,” in S&P, 2013, pp. 559-573.
-
(2013)
S&P
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
44
-
-
85041451135
-
Control flow integrity for COTS binaries
-
M. Zhang and R. Sekar, “Control flow integrity for COTS binaries,” in USENIX Security, 2013, pp. 337-352.
-
(2013)
USENIX Security
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
|