-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information System Security, 13, 2009.
-
(2009)
ACM Transactions on Information System Security
, vol.13
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
2
-
-
85015248195
-
-
ARM Ltd
-
ARM Ltd. ARM Compiler Software Development Guide v5.04, 2013. http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.dui0471k/ chr1368698593511.html.
-
(2013)
ARM Compiler Software Development Guide v5.04
-
-
-
3
-
-
85025171717
-
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
-
M. Backes and S. Nürnberger. Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. In 23rd USENIX Security Symposium, USENIX Sec, 2014.
-
(2014)
23rd USENIX Security Symposium, USENIX Sec
-
-
Backes, M.1
Nürnberger, S.2
-
4
-
-
84910680268
-
You can run but you can’t read: Preventing disclosure exploits in executable code
-
M. Backes, T. Holz, B. Kollenda, P. Koppe, S. Nürnberger, and J. Pewny. You can run but you can’t read: Preventing disclosure exploits in executable code. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2014.
-
(2014)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
6
-
-
84954119725
-
Timely rerandomization for mitigating memory disclosures
-
D. Bigelow, T. Hobson, R. Rudd, W. Streilein, and H. Okhravi. Timely rerandomization for mitigating memory disclosures. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Bigelow, D.1
Hobson, T.2
Rudd, R.3
Streilein, W.4
Okhravi, H.5
-
7
-
-
84910650640
-
Hacking blind
-
A. Bittau, A. Belay, A. J. Mashtizadeh, D. Mazières, and D. Boneh. Hacking blind. In 35th IEEE Symposium on Security and Privacy, S&P, 2014.
-
(2014)
35th IEEE Symposium on Security and Privacy, S&P
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A. J.3
Mazières, D.4
Boneh, D.5
-
8
-
-
80051871355
-
Address space randomization for mobile devices
-
H. Bojinov, D. Boneh, R. Cannings, and I. Malchev. Address space randomization for mobile devices. In ACM Conference on Wireless Network Security, WiSec, 2011.
-
(2011)
ACM Conference on Wireless Network Security, WiSec
-
-
Bojinov, H.1
Boneh, D.2
Cannings, R.3
Malchev, I.4
-
9
-
-
70350684106
-
-
Technical Report MSR-TR-2008-120, Microsoft Research, September
-
C. Cadar, P. Akritidis, M. Costa, J.-P. Martin, and M. Castro. Data randomization. Technical Report MSR-TR-2008-120, Microsoft Research, September 2008. URL http://research.microsoft.com/apps/pubs/default. aspx?id=70626.
-
(2008)
Data randomization
-
-
Cadar, C.1
Akritidis, P.2
Costa, M.3
Martin, J.-P.4
Castro, M.5
-
10
-
-
84939144389
-
Beyond the PDP- 11: Architectural support for a memory-safe C abstract machine
-
D. Chisnall, C. Rothwell, R. N. M. Watson, J. Woodruff, M. Vadera, S. W. Moore, M. Roe, B. Davis, and P. G. Neumann. Beyond the PDP- 11: Architectural support for a memory-safe C abstract machine. In 20th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, 2015.
-
(2015)
20th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS
-
-
Chisnall, D.1
Rothwell, C.2
Watson, R. N. M.3
Woodruff, J.4
Vadera, M.5
Moore, S. W.6
Roe, M.7
Davis, B.8
Neumann, P. G.9
-
11
-
-
84954171757
-
Losing control: On the effectiveness of control-flow integrity under stack attacks
-
M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen, C. Liebchen, M. Negro, M. Qunaibit, and A.-R. Sadeghi. Losing control: On the effectiveness of control-flow integrity under stack attacks. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Conti, M.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Liebchen, C.6
Negro, M.7
Qunaibit, M.8
Sadeghi, A.-R.9
-
13
-
-
85009448253
-
Pointguard: protecting pointers from buffer overflow vulnerabilities
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. Pointguard: protecting pointers from buffer overflow vulnerabilities. In 12th USENIX Security Symposium, USENIX Sec, 2003.
-
(2003)
12th USENIX Security Symposium, USENIX Sec
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
14
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
S. Crane, C. Liebchen, A. Homescu, L. Davi, P. Larsen, A.-R. Sadeghi, S. Brunthaler, and M. Franz. Readactor: Practical code randomization resilient to memory disclosure. In 36th IEEE Symposium on Security and Privacy, S&P, 2015.
-
(2015)
36th IEEE Symposium on Security and Privacy, S&P
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.-R.6
Brunthaler, S.7
Franz, M.8
-
15
-
-
84954159903
-
It’s a TRAP: Table randomization and protection against function reuse attacks
-
S. Crane, S. Volkaert, F. Schuster, C. Liebchen, P. Larsen, L. Davi, A.- R. Sadeghi, T. Holz, B. D. Sutter, and M. Franz. It’s a TRAP: Table randomization and protection against function reuse attacks. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Crane, S.1
Volkaert, S.2
Schuster, F.3
Liebchen, C.4
Larsen, P.5
Davi, L.6
Sadeghi, A.- R.7
Holz, T.8
Sutter, B. D.9
Franz, M.10
-
16
-
-
0024866680
-
An Efficient Method of Computing Static Single Assignment Form
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. An Efficient Method of Computing Static Single Assignment Form. In 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL, 1989.
-
(1989)
16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B. K.3
Wegman, M. N.4
Zadeck, F. K.5
-
17
-
-
85180792449
-
MoCFI: A framework to mitigate control-flow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nürnberger, and A.-R. Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In 19th Annual Network and Distributed System Security Symposium, NDSS, 2012.
-
(2012)
19th Annual Network and Distributed System Security Symposium, NDSS
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nürnberger, S.7
Sadeghi, A.-R.8
-
18
-
-
84877943121
-
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
-
L. Davi, A. Dmitrienko, S. Nürnberger, and A. Sadeghi. Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS, 2013.
-
(2013)
8th ACM Symposium on Information, Computer and Communications Security, ASIACCS
-
-
Davi, L.1
Dmitrienko, A.2
Nürnberger, S.3
Sadeghi, A.4
-
19
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In 23rd USENIX Security Symposium, USENIX Sec, 2014.
-
(2014)
23rd USENIX Security Symposium, USENIX Sec
-
-
Davi, L.1
Sadeghi, A.2
Lehmann, D.3
Monrose, F.4
-
20
-
-
85080743214
-
Isomeron: Code randomization resilient to (Just-In-Time) return-oriented programming
-
L. Davi, C. Liebchen, A.-R. Sadeghi, K. Z. Snow, and F. Monrose. Isomeron: Code randomization resilient to (Just-In-Time) return-oriented programming. In 22nd Annual Network and Distributed System Security Symposium, NDSS, 2015.
-
(2015)
22nd Annual Network and Distributed System Security Symposium, NDSS
-
-
Davi, L.1
Liebchen, C.2
Sadeghi, A.-R.3
Snow, K. Z.4
Monrose, F.5
-
24
-
-
84914159903
-
Out of control: Overcoming control-flow integrity
-
E. Göktas, E. Athanasopoulos, H. Bos, and G. Portokalidis. Out of control: Overcoming control-flow integrity. In 35th IEEE Symposium on Security and Privacy, S&P, 2014.
-
(2014)
35th IEEE Symposium on Security and Privacy, S&P
-
-
Göktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
25
-
-
84889076199
-
Librando: transparent code randomization for just-in-time compilers
-
A. Homescu, S. Brunthaler, P. Larsen, and M. Franz. Librando: transparent code randomization for just-in-time compilers. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2013.
-
(2013)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Homescu, A.1
Brunthaler, S.2
Larsen, P.3
Franz, M.4
-
26
-
-
79957469988
-
MAO - an extensible micro-architectural optimizer
-
R. Hundt, E. Raman, M. Thuresson, and N. Vachharajani. MAO - an extensible micro-architectural optimizer. In 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization, CGO, 2011.
-
(2011)
9th Annual IEEE/ACM International Symposium on Code Generation and Optimization, CGO
-
-
Hundt, R.1
Raman, E.2
Thuresson, M.3
Vachharajani, N.4
-
27
-
-
39049113465
-
Address space layout permutation (ASLP): towards fine-grained randomization of commodity software
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (ASLP): towards fine-grained randomization of commodity software. In 22nd Annual Computer Security Applications Conference, ACSAC, 2006.
-
(2006)
22nd Annual Computer Security Applications Conference, ACSAC
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
28
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI, 2014.
-
(2014)
11th USENIX Symposium on Operating Systems Design and Implementation, OSDI
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
29
-
-
84914111191
-
SoK: Automated software diversity
-
P. Larsen, A. Homescu, S. Brunthaler, and M. Franz. SoK: Automated software diversity. In 35th IEEE Symposium on Security and Privacy, S&P, 2014.
-
(2014)
35th IEEE Symposium on Security and Privacy, S&P
-
-
Larsen, P.1
Homescu, A.2
Brunthaler, S.3
Franz, M.4
-
30
-
-
84914118062
-
From zygote to morula: Fortifying weakened aslr on android
-
B. Lee, L. Lu, T. Wang, T. Kim, and W. Lee. From zygote to morula: Fortifying weakened aslr on android. In IEEE Symposium on Security and Privacy, S&P, 2014.
-
(2014)
IEEE Symposium on Security and Privacy, S&P
-
-
Lee, B.1
Lu, L.2
Wang, T.3
Kim, T.4
Lee, W.5
-
31
-
-
84954110587
-
ASLR-Guard: Stopping address space leakage for code reuse attacks
-
K. Lu, C. Song, B. Lee, S. P. Chung, T. Kim, and W. Lee. ASLR-Guard: Stopping address space leakage for code reuse attacks. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Lu, K.1
Song, C.2
Lee, B.3
Chung, S. P.4
Kim, T.5
Lee, W.6
-
32
-
-
84863012838
-
An evaluation of vectorizing compilers
-
S. Maleki, Y. Gao, M. J. Garzarán, T. Wong, and D. A. Padua. An evaluation of vectorizing compilers. In 2011 International Conference on Parallel Architectures and Compilation Techniques, PACT, 2011.
-
(2011)
2011 International Conference on Parallel Architectures and Compilation Techniques, PACT
-
-
Maleki, S.1
Gao, Y.2
Garzarán, M. J.3
Wong, T.4
Padua, D. A.5
-
33
-
-
84954161880
-
CCFI: cryptographically enforced control flow integrity
-
A. J. Mashtizadeh, A. Bittau, D. Boneh, and D. Mazières. CCFI: cryptographically enforced control flow integrity. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Mashtizadeh, A. J.1
Bittau, A.2
Boneh, D.3
Mazières, D.4
-
34
-
-
85180812331
-
-
M. Meissner. Tricks of a Spec master. https: / / gcc . gnu . org / wiki / summit2010 ? action = AttachFile&do = get&target=meissner2.pdf.
-
Tricks of a Spec master
-
-
Meissner, M.1
-
35
-
-
84959417310
-
Opaque control-flow integrity
-
V. Mohan, P. Larsen, S. Brunthaler, K. Hamlen, and M. Franz. Opaque control-flow integrity. In 22nd Annual Network and Distributed System Security Symposium, NDSS, 2015.
-
(2015)
22nd Annual Network and Distributed System Security Symposium, NDSS
-
-
Mohan, V.1
Larsen, P.2
Brunthaler, S.3
Hamlen, K.4
Franz, M.5
-
37
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
Nergal. The advanced return-into-lib(c) exploits: PaX case study. Phrack Magazine, 11, 2001.
-
(2001)
Phrack Magazine
, vol.11
-
-
-
38
-
-
78751484536
-
G-Free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-Free: Defeating return-oriented programming through gadget-less binaries. In 26th Annual Computer Security Applications Conference, ACSAC, 2010.
-
(2010)
26th Annual Computer Security Applications Conference, ACSAC
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
40
-
-
85084160316
-
One class to rule them all: 0-day deserialization vulnerabilities in android
-
O. Peles and R. Hay. One class to rule them all: 0-day deserialization vulnerabilities in android. In Workshop on Offensive Technologies, WOOT, 2015.
-
(2015)
Workshop on Offensive Technologies, WOOT
-
-
Peles, O.1
Hay, R.2
-
43
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information System Security, 15, 2012.
-
(2012)
ACM Transactions on Information System Security
, vol.15
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
44
-
-
84897768729
-
Using ARM TrustZone to build a trusted language runtime for mobile applications
-
N. Santos, H. Raj, S. Saroiu, and A. Wolman. Using ARM TrustZone to build a trusted language runtime for mobile applications. In Architectural Support for Programming Languages and Operating Systems, ASPLOS, 2014.
-
(2014)
Architectural Support for Programming Languages and Operating Systems, ASPLOS
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
46
-
-
84945184526
-
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
-
F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications. In 36th IEEE Symposium on Security and Privacy, S&P, 2015.
-
(2015)
36th IEEE Symposium on Security and Privacy, S&P
-
-
Schuster, F.1
Tendyck, T.2
Liebchen, C.3
Davi, L.4
Sadeghi, A.-R.5
Holz, T.6
-
47
-
-
85072933898
-
Adapting software fault isolation to contemporary cpu architectures
-
D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko, K. Schimpf, B. Yee, and B. Chen. Adapting software fault isolation to contemporary cpu architectures. In 18th USENIX Security Symposium, USENIX Sec, 2010.
-
(2010)
18th USENIX Security Symposium, USENIX Sec
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
49
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2004.
-
(2004)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
50
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of finegrained address space layout randomization
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A. Sadeghi. Just-in-time code reuse: On the effectiveness of finegrained address space layout randomization. In 34th IEEE Symposium on Security and Privacy, S&P, 2013.
-
(2013)
34th IEEE Symposium on Security and Privacy, S&P
-
-
Snow, K. Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.6
-
51
-
-
84945230261
-
Exploiting and protecting dynamic code generation
-
C. Song, C. Zhang, T. Wang, W. Lee, and D. Melski. Exploiting and protecting dynamic code generation. In 22nd Annual Network and Distributed System Security Symposium, NDSS, 2015.
-
(2015)
22nd Annual Network and Distributed System Security Symposium, NDSS
-
-
Song, C.1
Zhang, C.2
Wang, T.3
Lee, W.4
Melski, D.5
-
52
-
-
70349100695
-
Breaking the memory secrecy assumption
-
R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and T. Walter. Breaking the memory secrecy assumption. In 2nd European Workshop on System Security, EUROSEC, 2009.
-
(2009)
2nd European Workshop on System Security, EUROSEC
-
-
Strackx, R.1
Younan, Y.2
Philippaerts, P.3
Piessens, F.4
Lachmund, S.5
Walter, T.6
-
53
-
-
85105238769
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In 14th ACM Symposium on Operating System Principles, SOSP, 1993.
-
(1993)
14th ACM Symposium on Operating System Principles, SOSP
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T. E.3
Graham, S. L.4
-
54
-
-
80455129085
-
Armor: Fully verified software fault isolation
-
L. Zhao, G. Li, B. De Sutter, and J. Regehr. Armor: Fully verified software fault isolation. In 9th ACM International Conference on Embedded Software, EMSOFT, 2011.
-
(2011)
9th ACM International Conference on Embedded Software, EMSOFT
-
-
Zhao, L.1
Li, G.2
De Sutter, B.3
Regehr, J.4
-
55
-
-
84910635238
-
Armlock: Hardware-based fault isolation for arm
-
Y. Zhou, X. Wang, Y. Chen, and Z. Wang. Armlock: Hardware-based fault isolation for arm. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2014.
-
(2014)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Zhou, Y.1
Wang, X.2
Chen, Y.3
Wang, Z.4
|