-
1
-
-
85080590980
-
-
Metasploit Project, 2010. http://www.metasploit.com/ April 2011
-
Metasploit Project, 2010. http://www.metasploit.com/ (April 2011).
-
-
-
-
2
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
New York, NY, USA, ASIACCS’11, ACM
-
BLETSCH, T., JIANG, X., FREEH, V. W., AND LIANG, Z. Jump-oriented programming: a new class of code-reuse attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (New York, NY, USA, 2011), ASIACCS’11, ACM, pp. 30–40.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
3
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
ACM
-
BUCHANAN, E., ROEMER, R., SHACHAM, H., AND SAVAGE, S. When good instructions go bad: generalizing return-oriented programming to RISC. In Proceedings of the 15th ACM Conference on Computer and Communications Security (2008), ACM, pp. 27–38.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
4
-
-
78650032454
-
Return-oriented programming without returns
-
ACM Press
-
CHECKOWAY, S., DAVI, L., DMITRIENKO, A., SADEGHI, A., SHACHAM, H., AND WINANDY, M. Return-oriented programming without returns. In Proceedings of the 17th ACM Conference on Computer and Communications Security (2010), ACM Press, pp. 559–72.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.4
Shacham, H.5
Winandy, M.6
-
5
-
-
78650024047
-
-
Tech. rep., System Security Lab, Ruhr University Bochum, Germany
-
DAVI, L., DMITRIENKO, A., SADEGHI, A., AND WINANDY, M. Return-oriented programming without returns on ARM. Tech. rep., System Security Lab, Ruhr University Bochum, Germany, 2010.
-
(2010)
Return-Oriented Programming without Returns on ARM
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.3
Winandy, M.4
-
6
-
-
85095128397
-
A framework for automated architecture-independent gadget search
-
Berkeley, CA, USA, WOOT’10, USENIX Association,. –
-
DULLIEN, T., KORNAU, T., AND WEINMANN, R. A framework for automated architecture-independent gadget search. In Proceedings of the 4th USENIX conference on Offensive technologies (Berkeley, CA, USA, 2010), WOOT’10, USENIX Association, pp. 1–.
-
(2010)
Proceedings of the 4th USENIX Conference on Offensive Technologies
, pp. 1
-
-
Dullien, T.1
Kornau, T.2
Weinmann, R.3
-
7
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Berkeley, CA, USA, USENIX Association
-
HUND, R., HOLZ, T., AND FREILING, F. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th USENIX Security Symposium (Berkeley, CA, USA, 2009), USENIX Association, pp. 383–398.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.3
-
10
-
-
77954614533
-
Defeating return-oriented rootkits with”Return-Less” kernels
-
New York, NY, USA, EuroSys’10, ACM
-
LI, J., WANG, Z., JIANG, X., GRACE, M., AND BAHRAM, S. Defeating Return-oriented Rootkits with”Return-Less” Kernels. In Proceedings of the 5th European Conference on Computer Systems (New York, NY, USA, 2010), EuroSys’10, ACM, pp. 195–208.
-
(2010)
Proceedings of the 5th European Conference on Computer Systems
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
15
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
ACM Press
-
SHACHAM, H. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security (2007), ACM Press, pp. 552–561.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
16
-
-
76949101487
-
-
SOLAR DESIGNER. Bugtraq mailing list, April 2011
-
SOLAR DESIGNER. Getting around non-executable stack (and fix), 1997. Bugtraq mailing list, http://www.securityfocus.com/archive/1/7480 (April 2011).
-
(1997)
Getting around Non-Executable Stack (and Fix)
-
-
-
17
-
-
85080576390
-
Hanging on a rope
-
SOLE, P. Hanging on a ROPe. In ekoParty Security Conference (2010). http://www.immunitysec.com/downloads/DEPLIB20_ekoparty.pdf.
-
(2010)
ekoParty Security Conference
-
-
Sole, P.1
-
18
-
-
84945216592
-
On the expressiveness of return-into-libc attacks
-
To appear
-
TRAN, M., ETHERIDGE, M., BLETSCH, T., JIANG, X., FREEH, V. W., AND NING, P. On the Expressiveness of Return-into-libc Attacks. In Proceedings of the 14th Interntional Symposium on Recent Advances in Intrusion Detection (2011). To appear.
-
(2011)
Proceedings of the 14th Interntional Symposium on Recent Advances in Intrusion Detection
-
-
Tran, M.1
Etheridge, M.2
Bletsch, T.3
Jiang, X.4
Freeh, V.W.5
Ning, P.6
-
19
-
-
85080561479
-
-
ZOVI, D. Practical ROP, 2010. http://www.trailofbits.com/resources/practical_rop_ slides.pdf.
-
(2010)
Practical ROP
-
-
Zovi, D.1
|