-
2
-
-
85077797416
-
Once upon a free()
-
anonymous author
-
anonymous author. Once upon a free(). Phrack 57:9. http://phrack.org/issues.html?issue=57&id=9.
-
Phrack
, vol.57
, pp. 9
-
-
-
3
-
-
85080323197
-
What hacker research taught me
-
Sergey Bratus. What Hacker Research Taught Me. In RSS, 2009. http://www.cs.dartmouth.edu/~sergey/hc/rss-hacker-research.pdf.
-
(2009)
RSS
-
-
Bratus, S.1
-
4
-
-
84889728202
-
Exploit programming: From buffer overflows to weird machines and theory of computation
-
Sergey Bratus, Michael E Locasto, Meredith L Patterson, Len Sassaman, and Anna Shubina. Exploit Programming: From Buffer Overflows to Weird Machines and Theory of Computation. USENIX; login, pages 13–21, 2011.
-
(2011)
USENIX; Login
, pp. 13-21
-
-
Bratus, S.1
Locasto, M.E.2
Patterson, M.L.3
Sassaman, L.4
Shubina, A.5
-
5
-
-
84914110148
-
Exploitation and state machines: Programming the weird machine, revisited
-
April
-
Thomas Dullien. Exploitation and State Machines: Programming the Weird Machine, Revisited. In Infiltrate, April 2011. http://www.immunityinc.com/infiltrate/2011/presentations/Fundamentals_of_exploitation_revisited.pdf.
-
(2011)
Infiltrate
-
-
Dullien, T.1
-
6
-
-
85095128397
-
A framework for automated architecture-independent gadget search
-
Berkeley, CA, USA, USENIX Association
-
Thomas Dullien, Tim Kornau, and Ralf-Philipp Weinmann. A Framework for Automated Architecture-Independent Gadget Search. In Proceedings of the 4th USENIX Conference on Offensive Technologies, WOOT’10, pages 1–, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 4th USENIX Conference on Offensive Technologies, WOOT’10
, pp. 1
-
-
Dullien, T.1
Kornau, T.2
Weinmann, R.-P.3
-
7
-
-
77958576748
-
-
chapter 6, Kluwer Academic Publishers, Nor-well, MA, USA
-
William F. Gilreath and Phillip A. Laplante. Computer Architecture: A Minimalist Approach, chapter 6, page 41. Kluwer Academic Publishers, Nor-well, MA, USA, 2003.
-
(2003)
Computer Architecture: A Minimalist Approach
, pp. 41
-
-
Gilreath, W.F.1
Laplante, P.A.2
-
8
-
-
85080416599
-
The innerHTML apocalypse - how mXSS attacks change everything we believed we knew so far
-
Mario Heiderich. The innerHTML Apocalypse - How mXSS attacks change everything we believed we knew so far. In SysCan conference, 2013.
-
(2013)
SysCan Conference
-
-
Heiderich, M.1
-
9
-
-
84869439440
-
Script-less attacks: Stealing the pie without touching the sill
-
ACM
-
Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, and Jörg Schwenk. Script-less Attacks: Stealing the Pie without Touching the Sill. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 760–771. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 760-771
-
-
Heiderich, M.1
Niemietz, M.2
Schuster, F.3
Holz, T.4
Schwenk, J.5
-
10
-
-
84954487367
-
Advanced Doug Lea’s malloc exploits
-
jp
-
jp. Advanced Doug Lea’s malloc Exploits. Phrack 61:6. http://phrack.org/issues.html?issue=61&id=6.
-
Phrack
, vol.61
, pp. 6
-
-
-
11
-
-
85077789359
-
Vudo malloc tricks
-
MaXX
-
MaXX. Vudo malloc Tricks. Phrack 57:8. http://phrack.org/issues.html?issue=57&id=8.
-
Phrack
, vol.57
, pp. 8
-
-
-
13
-
-
84863454556
-
RockSalt: Better, faster, atronger SFI for the x86
-
Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-Baptiste Tristan, and Edward Gan. RockSalt: Better, Faster, Atronger SFI for the x86. In PLDI, pages 395–404, 2012.
-
(2012)
PLDI
, pp. 395-404
-
-
Morrisett, G.1
Tan, G.2
Tassarotti, J.3
Tristan, J.-B.4
Gan, E.5
-
14
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PAX case study
-
Dec
-
Nergal. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 58(4), Dec 2001.
-
(2001)
Phrack Magazine
, vol.58
, Issue.4
-
-
Nergal1
-
15
-
-
85084161804
-
Exploiting the ward-working DWARF: Trojan and exploit techniques with no native executable code
-
Berkeley, CA, USA, USENIX Association
-
James Oakley and Sergey Bratus. Exploiting the Ward-working DWARF: Trojan and Exploit Techniques with no Native Executable Code. In Proceedings of the 5th USENIX conference on Offensive technologies, WOOT’11, pages 11–11, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT’11
, pp. 11
-
-
Oakley, J.1
Bratus, S.2
-
16
-
-
85084163236
-
A fistful of red pills: How to automatically generate procedures to detect CPU emulators
-
USENIX Association
-
Roberto Paleari, Lorenzo Martignoni, Giampaolo Fresi Roglia, and Danilo Bruschi. A Fistful of Red Pills: How to Automatically Generate Procedures to Detect CPU Emulators. In Proceedings of the 3rd USENIX conference on Offensive technologies, pages 2–2. USENIX Association, 2009.
-
(2009)
Proceedings of the 3rd USENIX Conference on Offensive Technologies
, pp. 2
-
-
Paleari, R.1
Martignoni, L.2
Roglia, G.F.3
Bruschi, D.4
-
17
-
-
85077789287
-
-
PaX Team, http://pax.grsecurity.net/docs/pageexec.old.txt. PAGEEXEC, 2003.
-
(2003)
PAGEEXEC
-
-
-
18
-
-
85080432318
-
-
PaxTeam, http://pax.grsecurity.net/docs/pageexec.old.txt. PAGEEXEC implementation, 2000.
-
(2000)
PAGEEXEC Implementation
-
-
-
19
-
-
85080442352
-
Programming weird machines with ELF metadata
-
Rebecca Shapiro. Programming Weird Machines with ELF Metadata. In DEFCON 20, 2012.
-
(2012)
DEFCON
, vol.20
-
-
Shapiro, R.1
-
21
-
-
84930431842
-
About exploits writing
-
Title as indicated
-
Gerardo Richarte. About Exploits Writing. Technical report, Core Security Technologies, http://corelabs.coresecurity.com/index.php?module=Wiki&action=attachment&type=researcher&page=Gerardo_Richarte&file=publication%2FAbout_Exploits_Writing%2F2002.gera.About_Exploits_Writing.pdf, 2002. [Title as indicated.].
-
(2002)
Technical Report, Core Security Technologies
-
-
Richarte, G.1
-
22
-
-
71549168416
-
-
Ryan Roemer, Erik Buchanan, Hovav Shacham, and Stefan Savage. Return-Oriented Programming: Systems, Languages, and Applications, 2009.
-
(2009)
Return-Oriented Programming: Systems, Languages, and Applications
-
-
Roemer, R.1
Buchanan, E.2
Shacham, H.3
Savage, S.4
-
23
-
-
85080340641
-
Towards a theory of computer insecurity: A formal language-theoretic approach
-
Len Sassaman, Meredith L. Patterson, Sergey Bratus, and Michael E. Locasto. Towards a Theory of Computer Insecurity: a Formal Language-Theoretic Approach. IEEE Systems Journal, special issue Security and Privacy in Complex Systems, 2011.
-
(2011)
IEEE Systems Journal, Special Issue Security and Privacy in Complex Systems
-
-
Sassaman, L.1
Patterson, M.L.2
Bratus, S.3
Locasto, M.E.4
-
24
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls
-
Hovav Shacham. The Geometry of Innocent Flesh on the Bone: return-into-libc without Function Calls. In ACM Conference on Computer and Communications Security, pages 552–561, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 552-561
-
-
Shacham, H.1
-
25
-
-
84878374701
-
LOCREATE: An anagram for relocate
-
Skape
-
Skape. LOCREATE: an Anagram for Relocate. Uninformed, 6, 2007. http://uninformed.org/?v=6&a=3&t=pdf.
-
(2007)
Uninformed
, vol.6
-
-
-
26
-
-
57349167955
-
ShadowWalker: Raising the bar for rootkit detection
-
Sherri Sparks and Jamie Butler. ShadowWalker: Raising the Bar for Rootkit detection. In DEFCON 13, 2005.
-
(2005)
DEFCON
, vol.13
-
-
Sparks, S.1
Butler, J.2
-
27
-
-
80053624333
-
OllyBone: Semi-automatic unpacking on IA-32
-
Joe Stewart. OllyBone: Semi-Automatic Unpacking on IA-32. In DEFCON 14, 2006.
-
(2006)
DEFCON
, vol.14
-
-
Stewart, J.1
|