-
1
-
-
85080614622
-
-
Brainfuck. http://esolangs.org/wiki/brainfuck
-
Brainfuck. http://esolangs.org/wiki/brainfuck.
-
-
-
-
2
-
-
85080586842
-
-
ERESI Project. http://www.eresi-project.org
-
ERESI Project. http://www.eresi-project.org.
-
-
-
-
4
-
-
85077797416
-
Once upon a free()
-
ANONYMOUS AUTHOR
-
ANONYMOUS AUTHOR. Once upon a free(). Phrack 57:9. http://phrack.org/issues.html?issue=57&id=9.
-
Phrack
, vol.57
, pp. 9
-
-
-
5
-
-
85080515929
-
Heap exploitation. Abstraction by example
-
ARGYROUDIS, P., AND KARAMITAS, C. Heap Exploitation. Abstraction by Example. OWASP AppSecResearch, 2012. http://census- labs.com/media/ heap- owasp- appsec- 2012.pdf.
-
(2012)
OWASP AppSecResearch
-
-
Argyroudis, P.1
Karamitas, C.2
-
6
-
-
85080602519
-
Hackers and computer science: What hacker research taught me
-
December
-
BRATUS, S. Hackers and Computer Science: What Hacker Research Taught Me. 27th Chaos Communications Congress, December 2010. http://events.ccc.de/congress/2010/Fahrplan/events/3983.en.html.
-
(2010)
27th Chaos Communications Congress
-
-
Bratus, S.1
-
7
-
-
85080477921
-
Composition patterns of hacking
-
July
-
BRATUS, S., BANGERT, J., GABROVSKY, A., SHUBINA, A., BILAR, D., AND LOCASTO, M. E. Composition Patterns of Hacking. The First International Workshop on Cyberpatterns Unifying Design Patterns with Security, Attack and Forensic Patterns, July 2012.
-
(2012)
The First International Workshop on Cyberpatterns Unifying Design Patterns with Security, Attack and Forensic Patterns
-
-
Bratus, S.1
Bangert, J.2
Gabrovsky, A.3
Shubina, A.4
Bilar, D.5
Locasto, M.E.6
-
8
-
-
84889728202
-
-
login: December
-
BRATUS, S., LOCASTO, M. E., PATTERSON, M. L., SASSAMAN, L., AND SHUBINA, A. Exploit Programming: from Buffer Overflows to “Weird Machines” and Theory of Computation. ;login: (December 2011).
-
(2011)
Exploit Programming: From Buffer Overflows to “Weird Machines” and Theory of Computation
-
-
Bratus, S.1
Locasto, M.E.2
Patterson, M.L.3
Sassaman, L.4
Shubina, A.5
-
11
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-control-data attacks are realistic threats. In In USENIX Security Symposium (2005), pp. 177–192.
-
(2005)
USENIX Security Symposium
, pp. 177-192
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
13
-
-
85080529588
-
-
CODE FOX
-
CODE FOX. SignElf. http://sourceforge.net/projects/signelf/.
-
SignElf
-
-
-
14
-
-
84914110148
-
Exploitation and state machines: Programming the”weird machine”, revisited
-
Apr
-
DULLIEN, T. Exploitation and state machines: Programming the”weird machine”, revisited. In Infiltrate Conference (Apr 2011).
-
(2011)
Infiltrate Conference
-
-
Dullien, T.1
-
15
-
-
85095128397
-
A framework for automated architecture-independent gadget search
-
August
-
DULLIEN, T., KORNAU, T., AND WEINMANN, R.-P. A Framework for Automated Architecture-Independent Gadget Search. In USENIX WOOT (August 2010).
-
(2010)
USENIX WOOT
-
-
Dullien, T.1
Kornau, T.2
Weinmann, R.-P.3
-
16
-
-
85080565125
-
Ripples in the gene pool - creating genetic: Mutations to survive the vulerability window
-
August
-
EAGLE, C. Ripples in the Gene Pool - Creating Genetic: Mutations to Survive the Vulerability Window. Defcon 14, August 2006.
-
(2006)
Defcon
, vol.14
-
-
Eagle, C.1
-
17
-
-
85080574543
-
-
ELITHEELI
-
ELITHEELI. “stupid machines”. https://github.com/elitheeli/stupid-machines.
-
Stupid Machines
-
-
-
18
-
-
0030697765
-
Building diverse computer systems
-
Washington, DC, USA, HOTOS’97, IEEE Computer Society,. –
-
FORREST, S., SOMAYAJI, A., AND ACKLEY, D. Building diverse computer systems. In Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI) (Washington, DC, USA, 1997), HOTOS’97, IEEE Computer Society, pp. 67–.
-
(1997)
Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
, pp. 67
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
20
-
-
85080577311
-
Injecting custom payload into signed windows executables analysis of the CVE-2012-0151 vulnerability
-
June
-
GLÜCKSMANN, I. Injecting custom payload into signed Windows executables Analysis of the CVE-2012-0151 vulnerability. ReCON, June 2012. http://recon.cx/2012/schedule/events/246.en.html.
-
(2012)
ReCON
-
-
Glücksmann, I.1
-
21
-
-
85080478370
-
Armouring the ELF: Binary encryption on the UNIX platform
-
GRUGQ, AND SCUT
-
GRUGQ, AND SCUT. Armouring the ELF: Binary encryption on the UNIX platform. Phrack 58:5. http://phrack.org/issues.html?issue=58&id=5.
-
Phrack
, vol.58
, pp. 5
-
-
-
22
-
-
85080492188
-
The art of exploitation: Exploiting VLC, a jemalloc case stud y
-
HUKU, AND ARGP. Apr
-
HUKU, AND ARGP. The Art of Exploitation: Exploiting VLC, a jemalloc Case Stud y. Phrack Magazine 68, 13 (Apr 2012).
-
(2012)
Phrack Magazine
, vol.68
, pp. 13
-
-
-
23
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
USENIX Association
-
HUND, R., HOLZ, T., AND FREILING, F. C. Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th USENIX Security Symposium (2009), USENIX Association, pp. 383–398.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.C.3
-
24
-
-
84954487367
-
Advanced doug lea’s malloc exploits
-
JP
-
JP. Advanced Doug Lea’s malloc Exploits. Phrack 61:6. http://phrack.org/issues.html?issue=61&id=6.
-
Phrack
, vol.61
, pp. 6
-
-
-
25
-
-
85080538873
-
Backdooring binary objects
-
KLOG
-
KLOG. Backdooring Binary Objects. Phrack 56:9. http://phrack.org/issues.html?issue=56&id=9.
-
Phrack
, vol.56
, pp. 9
-
-
-
28
-
-
84921371035
-
-
June
-
MATZ, M., HUBICKA, J., JAEGER, A., AND MITCHELL, M. System V Application Binary Interface AMD64 Architecture Processor Supplement Draft Version 0.96, June 2005. http://www.uclibc.org/docs/psABI-x86_64.pdf.
-
(2005)
System V Application Binary Interface AMD64 Architecture Processor Supplement Draft Version 0.96
-
-
Matz, M.1
Hubicka, J.2
Jaeger, A.3
Mitchell, M.4
-
29
-
-
85077789359
-
Vudo malloc tricks
-
MAXX
-
MAXX. Vudo malloc Tricks. Phrack 57:8. http://phrack.org/issues.html?issue=57&id=8.
-
Phrack
, vol.57
, pp. 8
-
-
-
30
-
-
85080497502
-
The cerberus ELF interface
-
MAYHEM
-
MAYHEM. The Cerberus ELF Interface. Phrack 61:8. http://phrack.org/issues.html?issue=61&id=8.
-
Phrack
, vol.61
, pp. 8
-
-
-
32
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PAX case study
-
NERGAL. Dec
-
NERGAL. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 58, 4 (Dec 2001).
-
(2001)
Phrack Magazine
, vol.58
, pp. 4
-
-
-
33
-
-
85084161804
-
Exploiting the hard-working dwarf: Trojan and exploit techniques with no native executable code
-
OAKLEY, J., AND BRATUS, S. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code. In USENIX WOOT (2011), pp. 91–102.
-
(2011)
USENIX WOOT
, pp. 91-102
-
-
Oakley, J.1
Bratus, S.2
-
34
-
-
0006100649
-
Smashing the stack for fun and profit
-
ONE, A. Smashing the Stack for Fun and Profit. Phrack 49:14. http://phrack.org/issues.html?issue=49&id=14.
-
Phrack
, vol.49
, pp. 14
-
-
One, A.1
-
36
-
-
84930441153
-
The art of exploitation: MS IIS 7.5 remote heap overflow
-
REDPANTZ. Apr
-
REDPANTZ. The Art of Exploitation: MS IIS 7.5 Remote Heap Overflow. Phrack Magazine 68, 12 (Apr 2012).
-
(2012)
Phrack Magazine
, vol.68
, pp. 12
-
-
-
38
-
-
84859457954
-
Return-oriented programming: Systems, languages, and applications
-
Mar
-
ROEMER, R., BUCHANAN, E., SHACHAM, H., AND SAVAGE, S. Return-oriented programming: Systems, languages, and applications. ACM Trans. Inf. Syst. Secur. 15, 1 (Mar. 2012), 2:1–2:34.
-
(2012)
ACM Trans. Inf. Syst. Secur.
, vol.15
, Issue.1
, pp. 21-234
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
40
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls
-
SHACHAM, H. The Geometry of Innocent Flesh on the Bone: return-into-libc without Function Calls. In ACM Conference on Computer and Communications Security (2007), pp. 552–561.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
41
-
-
85080563744
-
Embedded ELF debugging: The middle head of cerberus
-
T. E
-
SHELL CREW, T. E. Embedded ELF Debugging: the middle head of Cerberus. Phrack 63:9. http://phrack.org/issues.html?issue=63&id=9.
-
Phrack
, vol.63
, pp. 9
-
-
Crew, S.1
-
42
-
-
85080534756
-
-
SKAPE. January
-
SKAPE. ELF binary signing and verification. ttp://www.hick.org/code/skape/papers/elfsign.txt, January 2003.
-
(2003)
ELF Binary Signing and Verification
-
-
-
43
-
-
84878374701
-
Locreate: An anagram for relocate
-
SKAPE. Jan
-
SKAPE. Locreate: an Anagram for Relocate. Uninformed 6 (Jan 2007).
-
(2007)
Uninformed
, vol.6
-
-
-
45
-
-
18144415290
-
-
Indiana University Computer Science
-
VELDHUIZEN, T. L. C++ Templates are Turing Complete. http://ubietylab.net/ubigraph/content/Papers/pdf/CppTuring.pdf. Indiana University Computer Science.
-
C++ Templates Are Turing Complete
-
-
Veldhuizen, T.L.1
|