-
1
-
-
72449145808
-
Control-flow integrity: Principles, implementations, and applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. ACM Trans. Inf. Syst. Secur., 13(1), 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur
, vol.13
, Issue.1
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack magazine, 7(49):365, 1996.
-
(1996)
Phrack magazine
, vol.7
, Issue.49
, pp. 365
-
-
One, Aleph1
-
3
-
-
85025171717
-
Oxymoron - making fine-grained memory randomization practical by allowing code sharing
-
M. Backes and S. Nürnberger. Oxymoron - making fine-grained memory randomization practical by allowing code sharing. In USENIX Security Symposium, 2014.
-
(2014)
USENIX Security Symposium
-
-
Backes, M.1
Nürnberger, S.2
-
4
-
-
84910680268
-
You can run but you can't read: Preventing disclosure exploits in executable code
-
M. Backes, T. Holz, B. Kollenda, P. Koppe, S. Nürnberger, and J. Pewny. You can run but you can't read: Preventing disclosure exploits in executable code. In ACM Conference on Computer and Communications Security (CCS), 2014.
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Backes, M.1
Holz, T.2
Kollenda, B.3
Koppe, P.4
Nürnberger, S.5
Pewny, J.6
-
5
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D. C.3
-
8
-
-
78650032454
-
Return-oriented programming without returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented programming without returns. In ACM Conference on Computer and Communications Security (CCS), 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
10
-
-
85180625962
-
Ropecker: A generic and practical approach for defending against rop attacks
-
Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng. Ropecker: A generic and practical approach for defending against rop attacks. In Symposium on Network and Distributed System Security (NDSS), 2014.
-
(2014)
Symposium on Network and Distributed System Security (NDSS)
-
-
Cheng, Y.1
Zhou, Z.2
Yu, M.3
Ding, X.4
Deng, R. H.5
-
12
-
-
85180547504
-
-
and w00w00 Security Team
-
M. Conover and w00w00 Security Team. w00w00 on heap overflows. http://www.cgsecurity.org/exploit/heaptut.txt, 1999.
-
(1999)
w00w00 on heap overflows
-
-
Conover, M.1
-
15
-
-
85062385228
-
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
-
L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security Symposium, 2014.
-
(2014)
USENIX Security Symposium
-
-
Davi, L.1
Sadeghi, A.-R.2
Lehmann, D.3
Monrose, F.4
-
16
-
-
14844288825
-
Bypassing PaX ASLR protection
-
T. Durden. Bypassing PaX ASLR protection. Phrack magazine, 11(59), 2002.
-
(2002)
Phrack magazine
, vol.11
, Issue.59
-
-
Durden, T.1
-
18
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security Symposium, 2012.
-
(2012)
USENIX Security Symposium
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A. S.3
-
20
-
-
85180551174
-
Size does matter
-
E. Göktas, E. Athanasopoulos, C. Heraklion, G. M. Polychronakis, H. Bos, and G. Portokalidis. Size does matter. In USENIX Security Symposium, 2014.
-
(2014)
USENIX Security Symposium
-
-
Göktas, E.1
Athanasopoulos, E.2
Heraklion, C.3
Polychronakis, G. M.4
Bos, H.5
Portokalidis, G.6
-
21
-
-
84869381037
-
ILR: Where'd my gadgets go?
-
J. Hiser, A. Nguyen-Tuong, M. Co, M. Hall, and J. W. Davidson. ILR: Where'd my gadgets go? In IEEE Symposium on Security and Privacy, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J. W.5
-
26
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
Annual Computer Security Applications Conference (ACSAC)
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
27
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014.
-
(2014)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
29
-
-
77954614533
-
Defeating return-oriented rootkits with”return-less” kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram. Defeating return-oriented rootkits with”return-less” kernels. In Proceedings of the 5th European Conference on Computer Systems, 2010.
-
(2010)
Proceedings of the 5th European Conference on Computer Systems
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
30
-
-
85180554872
-
-
libdasm. libdasm
-
libdasm. libdasm. https://code.google.com/p/libdasm/, 2014.
-
(2014)
-
-
-
31
-
-
33745304805
-
Pin: building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. ACM Sigplan Notices, 40(6):190-200, 2005.
-
(2005)
ACM Sigplan Notices
, vol.40
, Issue.6
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V. J.8
Hazelwood, K.9
-
33
-
-
85180545707
-
-
Accessed: 2014-07-14
-
Metasploit. Metasploit. http://www.metasploit.com/. Accessed: 2014-07-14.
-
Metasploit
-
-
-
34
-
-
84959417310
-
Opaque control-flow integrity
-
V. Mohan, P. Larsen, S. Brunthaler, K. Hamlen, and M. Franz. Opaque control-flow integrity. In Symposium on Network and Distributed System Security (NDSS), 2015.
-
(2015)
Symposium on Network and Distributed System Security (NDSS)
-
-
Mohan, V.1
Larsen, P.2
Brunthaler, S.3
Hamlen, K.4
Franz, M.5
-
35
-
-
84893320590
-
Dynamic test generation to find integer bugs in x86 binary linux programs
-
D. Molnar, X. C. Li, and D. A. Wagner. Dynamic test generation to find integer bugs in x86 binary linux programs. In USENIX Security Symposium, 2009.
-
(2009)
USENIX Security Symposium
-
-
Molnar, D.1
Li, X. C.2
Wagner, D. A.3
-
38
-
-
78751484536
-
G-free: Defeating return-oriented programming through gadget-less binaries
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-free: Defeating return-oriented programming through gadget-less binaries. In Annual Computer Security Applications Conference (ACSAC), 2010.
-
(2010)
Annual Computer Security Applications Conference (ACSAC)
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
44
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
-
45
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In ACM Conference on Computer and Communications Security (CCS), 2004.
-
(2004)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
47
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE Symposium on Security and Privacy, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Snow, K. Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
49
-
-
78649987048
-
Heap Feng Shui in JavaScript
-
A. Sotirov. Heap Feng Shui in JavaScript. In Black Hat Europe, 2007.
-
(2007)
Black Hat Europe
-
-
Sotirov, A.1
-
54
-
-
77955183968
-
Taintscope: A checksumaware directed fuzzing tool for automatic software vulnerability detection
-
T. Wang, T. Wei, G. Gu, and W. Zou. Taintscope: A checksumaware directed fuzzing tool for automatic software vulnerability detection. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Wang, T.1
Wei, T.2
Gu, G.3
Zou, W.4
|