-
2
-
-
33646767376
-
Control-Flow integrity
-
CCS'05
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-Flow integrity. In Proc. of the 12th ACM conference on Computer and communications security (2005), CCS'05.
-
(2005)
Proc. Of the 12th ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
50249149602
-
Preventing memory error exploits with WIT
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., AND CASTRO, M. Preventing memory error exploits with WIT. In Proc. of the IEEE Symposium on Security and Privacy, S&P'08.
-
Proc. Of the IEEE Symposium on Security and Privacy, S&P'08.
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
85049220056
-
Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
-
USENIX-SS'09
-
AKRITIDIS, P., COSTA, M., CASTRO, M., AND HAND, S. Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors. In Proc. of the 18th Usenix Security Symposium (2009), USENIX-SS'09.
-
(2009)
Proc. Of the 18th Usenix Security Symposium
-
-
Akritidis, P.1
Costa, M.2
Castro, M.3
Hand, S.4
-
5
-
-
33244470892
-
Improving software security with a C pointer analysis
-
AVOTS, D., DALTON, M., LIVSHITS, V. B., AND LAM, M. S. Improving software security with a C pointer analysis. In Proc. of the 27th Intern. Conf. on Software Engineering (ICSE) (2005).
-
(2005)
Proc. Of the 27th Intern. Conf. Of Software Engineering (ICSE)
-
-
Avots, D.1
Dalton, M.2
Livshits, V.B.3
Lam, M.S.4
-
8
-
-
84858782697
-
Minemu: The worlds fastest taint tracker
-
2011), RAID
-
BOSMAN, E., SLOWINSKA, A., AND BOS, H. Minemu: The Worlds Fastest Taint Tracker. In Proc. of 14th International Symposium on Recent Advances in Intrusion Detection (2011), RAID 2011.
-
(2011)
Proc. Of 14th International Symposium on Recent Advances in Intrusion Detection
-
-
Bosman, E.1
Slowinska, A.2
Bos, H.3
-
11
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
DSN'05
-
CHEN, S., XU, J., NAKKA, N., KALBARCZYK, Z., AND IYER, R. K. Defeating memory corruption attacks via pointer taintedness detection. In Proc. of the 2005 International Conference on Dependable Systems and Networks (2005), DSN'05.
-
(2005)
Proc. Of the 2005 International Conference on Dependable Systems and Networks
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
12
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
SSYM'05
-
CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-control-data attacks are realistic threats. In Proc. of 14th USENIX Security Symposium (2005), SSYM'05.
-
Proc. Of 14th USENIX Security Symposium (2005)
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
14
-
-
0038716438
-
CCured in the real world
-
CONDIT, J., HARREN, M., MCPEAK, S., NECULA, G. C., AND WEIMER, W. CCured in the real world. In Proc of the 2003 Conf. on Programming languages design and implementation, POPL'03.
-
Proc of the 2003 Conf. On Programming Languages Design and Implementation, POPL'03
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
15
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
SOSP'05
-
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: end-to-end containment of internet worms. In Proc. of the 20th ACM Symposium on Operating Systems Principles (2005), SOSP'05.
-
(2005)
Proc. Of the 20th ACM Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
16
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
SSYM'98
-
COWAN, C., PU, C., MAIER, D., HINTONY, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proc. of the 7th USENIX Security Symposium (1998), SSYM'98.
-
Proc. Of the 7th USENIX Security Symposium (1998)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
18
-
-
0006100649
-
Smashing the stack for fun and profit
-
ELIAS LEVY (ALEPH ONE). Smashing the stack for fun and profit. Phrack 7, 49 (1996).
-
(1996)
Phrack
, vol.7
, pp. 49
-
-
Levy, E.1
-
19
-
-
78651539599
-
XFI: Software guards for system address spaces
-
OSDI'06
-
ERLINGSSON, U., VALLEY, S., ABADI, M., VRABLE, M., BUDIU, M., AND NECULA, G. C. XFI: software guards for system address spaces. In Proc. of the 7th USENIX Symp. on Operating Systems Design and Implementation (2006), OSDI'06.
-
(2006)
Proc. Of the 7th USENIX Symp. Of Operating Systems Design and Implementation
-
-
Erlingsson, U.1
Valley, S.2
Abadi, M.3
Vrable, M.4
Budiu, M.5
Necula, G.C.6
-
20
-
-
85084164164
-
Cyclone: A safe dialect of C
-
JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX 2002 Annual Technical Conference, ATEC'02.
-
USENIX 2002 Annual Technical Conference, ATEC'02
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
21
-
-
77952564111
-
Pebil: Efficient static binary instrumentation for Linux
-
LAURENZANO, M., TIKIR, M. M., CARRINGTON, L., AND SNAVELY, A. PEBIL: Efficient static binary instrumentation for Linux. In Proc. of the IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS-2010.
-
Proc. Of the IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS-2010
-
-
Laurenzano, M.1
Tikir, M.M.2
Carrington, L.3
Snavely, A.4
-
22
-
-
36549014520
-
BugBench: Benchmarks for evaluating bug detection tools
-
LU, S., LI, Z., QIN, F., TAN, L., ZHOU, P., AND ZHOU, Y. Bugbench: Benchmarks for evaluating bug detection tools. In Workshop on the Evaluation of Software Defect Detection Tools (2005).
-
(2005)
Workshop on the Evaluation of Software Defect Detection Tools
-
-
Lu, S.1
Li, Z.2
Qin, F.3
Tan, L.4
Zhou, P.5
Zhou, Y.6
-
23
-
-
85077134530
-
Softbound: Highly compatible and complete spatial memory safety for C
-
NAGARAKATTE, S., ZHAO, J., MARTIN, M. M., AND ZDANCEWIC, S. SoftBound: highly compatible and complete spatial memory safety for C. In Proc. of PLDI'09.
-
Proc. Of PLDI'09.
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M.M.3
Zdancewic, S.4
-
25
-
-
33750325871
-
Argos: An emulator for fingerprinting zero-day attacks
-
PORTOKALIDIS, G., SLOWINSKA, A., AND BOS, H. Argos: an Emulator for Fingerprinting Zero-Day Attacks. In Proc. of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (2006), EuroSys'06.
-
Proc. Of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (2006), EuroSys'06
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
29
-
-
84951736831
-
Howard: A dynamic excavator for reverse engineering data structures
-
SLOWINSKA, A., STANCESCU, T., AND BOS, H. Howard: a dynamic excavator for reverse engineering data structures. In Proceedings of NDSS (2011).
-
(2011)
Proceedings of NDSS
-
-
Slowinska, A.1
Stancescu, T.2
Bos, H.3
-
30
-
-
85077126800
-
Modern exploitation and memory protection bypasses
-
August
-
SOTIROV, A. Modern exploitation and memory protection bypasses. USENIX Security invited talk, www.usenix.org/events/sec09/tech/slides/sotirov.pdf, August 2009.
-
(2009)
USENIX Security Invited Talk
-
-
Sotirov, A.1
-
31
-
-
33745963754
-
HDTrans: An open source, low-level dynamic instrumentation system
-
SRIDHAR, S., SHAPIRO, J. S., AND NORTHUP, E. HDTrans: An open source, low-level dynamic instrumentation system. In Proc. of the 2nd Intern. Conf. on Virtual Execution Environ. (2006).
-
(2006)
Proc. Of the 2nd Intern. Conf. Of Virtual Execution Environ.
-
-
Sridhar, S.1
Shapiro, J.S.2
Northup, E.3
|