-
1
-
-
49949115783
-
Data space randomization
-
Springer-Verlag
-
BHATKAR, S., AND SEKAR, R. Data space randomization. DIMVA’08, Springer-Verlag, pp. 1–22.
-
DIMVA’08
, pp. 1-22
-
-
Bhatkar, S.1
Sekar, R.2
-
2
-
-
79955994779
-
Jump-oriented programming: A new class of code-reuse attack
-
ACM
-
BLETSCH, T., JIANG, X., FREEH, V. W., AND LIANG, Z. Jump-oriented programming: a new class of code-reuse attack. ASIACCS’11, ACM, pp. 30–40.
-
ASIACCS’11
, pp. 30-40
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V.W.3
Liang, Z.4
-
3
-
-
84976685912
-
Space efficient conservative garbage collection
-
ACM
-
BOEHM, H.-J. Space efficient conservative garbage collection. PLDI’93, ACM, pp. 197–206.
-
PLDI’93
, pp. 197-206
-
-
Boehm, H.-J.1
-
5
-
-
78650032454
-
Return-oriented programming without returns
-
ACM
-
CHECKOWAY, S., DAVI, L., DMITRIENKO, A., SADEGHI, A.-R., SHACHAM, H., AND WINANDY, M. Return-oriented programming without returns. CCS’10, ACM, pp. 559–572.
-
CCS’10
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
6
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
of
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., ZHANG, Q., ET AL. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. vol. 81 of USENIX Security’98, pp. 346–355.
-
USENIX Security’98
, vol.81
, pp. 346-355
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
8
-
-
78751539789
-
Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks
-
ACM
-
DING, Y., WEI, T., WANG, T., LIANG, Z., AND ZOU, W. Heap taichi: exploiting memory allocation granularity in heap-spraying attacks. ACSAC’10, ACM, pp. 327–336.
-
ACSAC’10
, pp. 327-336
-
-
Ding, Y.1
Wei, T.2
Wang, T.3
Liang, Z.4
Zou, W.5
-
9
-
-
14844332687
-
Propolice: Improved stacksmashing attack detection
-
ETOH, H., AND YODA, K. Propolice: Improved stacksmashing attack detection. IPSJ SIG Notes 75 (2001), 181–188.
-
(2001)
IPSJ SIG Notes
, vol.75
, pp. 181-188
-
-
Etoh, H.1
Yoda, K.2
-
10
-
-
84964862930
-
Enhanced operating system security through efficient and fine-grained address space randomization
-
GIUFFRIDA, C., KUIJSTEN, A., AND TANENBAUM, A. S. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security’12.
-
USENIX Security’12
-
-
Giuffrida, C.1
Kuijsten, A.2
Tanenbaum, A.S.3
-
11
-
-
84869381037
-
ILR: Where’d my gadgets go?
-
HISER, J., NGUYEN-TUONG, A., CO, M., HALL, M., AND DAVIDSON, J. Ilr: Where’d my gadgets go? In IEEE S&P’12, pp. 571–585.
-
IEEE S&P’12
, pp. 571-585
-
-
Hiser, J.1
Nguyen-Tuong, A.2
Co, M.3
Hall, M.4
Davidson, J.5
-
12
-
-
84910617265
-
Diversifying the software stack using randomized nop insertion
-
JACKSON, T., HOMESCU, A., CRANE, S., LARSEN, P., BRUNTHALER, S., AND FRANZ, M. Diversifying the software stack using randomized nop insertion. In Moving Target Defense. 2013, pp. 151–173.
-
(2013)
Moving Target Defense
, pp. 151-173
-
-
Jackson, T.1
Homescu, A.2
Crane, S.3
Larsen, P.4
Brunthaler, S.5
Franz, M.6
-
13
-
-
14844317200
-
-
ACM
-
KC, G. S., KEROMYTIS, A. D., AND PREVELAKIS, V. Countering code-injection attacks with instruction-set randomization. CCS’03, ACM, pp. 272–280.
-
Countering Code-Injection Attacks with Instruction-Set Randomization. CCS’03
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
14
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
KIL, C., JIM, J., BOOKHOLT, C., XU, J., AND NING, P. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. ACSAC’06, pp. 339–348.
-
ACSAC’06
, pp. 339-348
-
-
Kil, C.1
Jim, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
15
-
-
84878363772
-
Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
-
PAPPAS, V., POLYCHRONAKIS, M., AND KEROMYTIS, A. D. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In IEEE S&P’12, pp. 601–615.
-
IEEE S&P’12
, pp. 601-615
-
-
Pappas, V.1
Polychronakis, M.2
Keromytis, A.D.3
-
16
-
-
84859459117
-
Q: Exploit hardening made easy
-
SCHWARTZ, E. J., AVGERINOS, T., AND BRUMLEY, D. Q: exploit hardening made easy. USENIX Security’11, pp. 25–25.
-
USENIX Security’11
, pp. 25
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
17
-
-
84937679667
-
The info leak era on software exploitation
-
SERNA, F. J. The info leak era on software exploitation. In Black Hat USA (2012).
-
(2012)
Black Hat USA
-
-
Serna, F.J.1
-
18
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
ACM
-
SHACHAM, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). CCS’07, ACM, pp. 552–561.
-
CCS’07
, pp. 552-561
-
-
Shacham, H.1
-
19
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-J., MODADUGU, N., AND BONEH, D. On the effectiveness of address-space randomization. CCS’04, ACM, pp. 298–307.
-
CCS’04
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
20
-
-
84881263793
-
-
SNOW, K. Z., MONROSE, F., DAVI, L., DMITRIENKO, A., LIEBCHEN, C., AND SADEGHI, A.-R. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. 574–588.
-
Just-in-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
, pp. 574-588
-
-
Snow, K.Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.-R.6
-
21
-
-
78650018752
-
Bypassing browser memory protections in windows vista
-
SOTIROV, A., AND DOWD, M. Bypassing browser memory protections in windows vista. Blackhat USA (2008).
-
(2008)
Blackhat USA
-
-
Sotirov, A.1
Dowd, M.2
-
22
-
-
84881235941
-
Sok: Eternal war in memory
-
SZEKERES, L., PAYER, M., WEI, T., AND SONG, D. Sok: Eternal war in memory. In IEEE S&P’13, pp. 48–62.
-
IEEE S&P’13
, pp. 48-62
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
23
-
-
85080628271
-
Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
-
WANG, T., WEI, T., LIN, Z., AND ZOU, W. Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In NDSS’09.
-
NDSS’09
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
-
24
-
-
84869451043
-
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
-
ACM
-
WARTELL, R., MOHAN, V., HAMLEN, K. W., AND LIN, Z. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. CCS’12, ACM, pp. 157–168.
-
CCS’12
, pp. 157-168
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
25
-
-
3042642332
-
The advanced return-into-lib (c) exploits: Pax case study
-
Phile# 0x04 of 0x0e
-
WOJTCZUK, R. The advanced return-into-lib (c) exploits: Pax case study. Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile# 0x04 of 0x0e (2001).
-
(2001)
Phrack Magazine
, vol.x0b
, Issue.x3a
-
-
Wojtczuk, R.1
|