-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
August Online
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), August 1996. Online: http://www.phrack.org/issues.html?issue=49&id=14.
-
(1996)
Phrack Magazine
, vol.49
, Issue.14
-
-
One, A.1
-
2
-
-
85077796489
-
-
ARM, July Online
-
CoreLinkTM DMA Controller DMA-330. ARM, July 2010. Online: http://infocenter.arm.com/help/topic/com.arm.doc. ddi0424c/DDI0424C_dma330_r1p1_trm. pdf.
-
(2010)
CoreLinkTM DMA Controller DMA-330
-
-
-
3
-
-
0001402143
-
The object-oriented database system manifesto
-
Won Kim, Jean-Marie Nicolas, and Shojiro Nishio, editors, Elsevier, December Online
-
Malcolm Atkinson, Franǫis Bancilhon, David DeWitt, Klaus Dittrich, David Maier, and Stanley Zdonik. The object-oriented database system manifesto. In Won Kim, Jean-Marie Nicolas, and Shojiro Nishio, editors, Proceedings of DOOD 1989, pages 223–40. Elsevier, December 1989. Online: https://www.cs.cmu.edu/~clamen/OODBMS/Manifesto/Manifesto.PS.gz.
-
(1989)
Proceedings of DOOD 1989
, pp. 223-240
-
-
Atkinson, M.1
Bancilhon, F.2
DeWitt, D.3
Dittrich, K.4
Maier, D.5
Zdonik, S.6
-
4
-
-
85084162701
-
Page-fault weird machine: Lessons in instruction-less computation
-
USENIX, August Online
-
Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W. Smith. Page-fault weird machine: Lessons in instruction-less computation. In Proceedings of WOOT 2013. USENIX, August 2013. Online: https://www.usenix. org/conference/woot13/workshopprogram/presentation/Bangert.
-
(2013)
Proceedings of WOOT 2013
-
-
Bangert, J.1
Bratus, S.2
Shapiro, R.3
Smith, S.W.4
-
5
-
-
34447541281
-
Firewire: All your memory are belong to us
-
May Online
-
Michael Becher, Maximillian Dornseif, and Christian N. Klein. FireWire: all your memory are belong to us. Presented at CanSecWest 2005, May 2005. Online: https://cansecwest.com/core05/2005-firewire-cansecwest.pdf.
-
(2005)
CanSecWest 2005
-
-
Becher, M.1
Dornseif, M.2
Klein, C.N.3
-
6
-
-
84914132233
-
Hacking blind
-
May 2014
-
Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. Hacking blind. In Proceedings of IEEE Security and Privacy (“Oakland”) 2014, pages 227–42, May 2014.
-
Proceedings of IEEE Security and Privacy (“Oakland”) 2014
, pp. 227-242
-
-
Bittau, A.1
Belay, A.2
Mashtizadeh, A.3
Mazieres, D.4
Boneh, D.5
-
7
-
-
62649168081
-
On a family of turing machines and the related programming language
-
July
-
Corrado Böhm. On a family of Turing machines and the related programming language. International Computation Centre Bulletin, 3:187–94, July 1964.
-
(1964)
International Computation Centre Bulletin
, vol.3
, pp. 187-194
-
-
Böhm, C.1
-
8
-
-
84897710145
-
Flow diagrams, turing machines and languages with only two formation rules
-
May
-
Corrado Böhm and Giuseppe Jacopini. Flow diagrams, Turing machines and languages with only two formation rules. Communications of the ACM, 9(5):366–71, May 1966.
-
(1966)
Communications of the ACM
, vol.9
, Issue.5
, pp. 366-371
-
-
Böhm, C.1
Jacopini, G.2
-
10
-
-
84898417979
-
Beyond planted bugs in “trusting trust”: The input-processing frontier
-
January
-
Sergey Bratus, Trey Darley, Michael Locasto, Meredith L. Patterson, Rebecca Shapiro, and Anna Shubina. Beyond planted bugs in “trusting trust”: The input-processing frontier. Security Privacy, IEEE, 12(1):83–87, January 2014.
-
(2014)
Security Privacy, IEEE
, vol.12
, Issue.1
, pp. 83-87
-
-
Bratus, S.1
Darley, T.2
Locasto, M.3
Patterson, M.L.4
Shapiro, R.5
Shubina, A.6
-
11
-
-
84971276679
-
-
Broadcom Corporation, February Online
-
BCM2835 ARM Peripherals. Broadcom Corporation, February 2012. Online: https://www.raspberrypi.org/wpcontent/uploads/2012/02/BCM2835-ARM-Peripherals.pdf.
-
(2012)
BCM2835 ARM Peripherals
-
-
-
12
-
-
84938984232
-
Iseeyou: Disabling the MacBook web-cam indicator LED
-
USENIX Association, August Online
-
Matthew Brocker and Stephen Checkoway. iSeeYou: Disabling the MacBook web-cam indicator LED. In Proceedings of USENIX Security 2014), pages 337–52. USENIX Association, August 2014. Online: https://www.usenix.org/conference/usenixsecurity14/technicalsessions/presentation/brocker.
-
(2014)
Proceedings of USENIX Security 2014)
, pp. 337-352
-
-
Brocker, M.1
Checkoway, S.2
-
13
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
Paul Syverson and Somesh Jha, editors, ACM Press, October
-
Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In Paul Syverson and Somesh Jha, editors, Proceedings of CCS 2008, pages 27–38. ACM Press, October 2008.
-
(2008)
Proceedings of CCS 2008
, pp. 27-38
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
14
-
-
84861443711
-
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage
-
David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, USENIX/ACCURATE/IAVoSS, August
-
Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS, August 2009.
-
(2009)
Proceedings of EVT/WOTE 2009
-
-
Checkoway, S.1
Feldman, A.J.2
Kantor, B.3
Alex Halderman, J.4
Felten, E.W.5
Shacham, H.6
-
15
-
-
78650032454
-
Return-oriented programming without returns
-
Angelos Keromytis and Vitaly Shmatikov, editors, ACM Press, October Online
-
Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. Return-oriented programming without returns. In Angelos Keromytis and Vitaly Shmatikov, editors, Proceedings of CCS 2010, pages 559–72. ACM Press, October 2010. Online: https://www.cs.jhu.edu/~s/papers/noret_ccs2010.html.
-
(2010)
Proceedings of CCS 2010
, pp. 559-572
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
16
-
-
85019675961
-
-
July Online
-
Stephen Dolan. mov is Turing-complete. July 2013. Online: http://www.cl.cam.ac.uk/~sd601/papers/mov.pdf.
-
(2013)
Mov Is Turing-Complete
-
-
Dolan, S.1
-
17
-
-
78651389795
-
Can you still trust your network card?
-
March Online
-
Loïc Duflot and Yves-Alexis Perez. Can you still trust your network card? Presented at CanSecWest 2010, March 2010. Online: http://www.ssi.gouv.fr/IMG/pdf/cswtrustnetworkcard.pdf.
-
(2010)
CanSecWest 2010
-
-
Duflot, L.1
Perez, Y.-A.2
-
18
-
-
84857292785
-
What if you can’t trust your network card?
-
Robin Sommer, Davide Balzarotti, and Gregor Maier, editors, Springer, September Online
-
Loïc Duflot, Yves-Alexis Perez, and Benjamin Morin. What if you can’t trust your network card? In Robin Sommer, Davide Balzarotti, and Gregor Maier, editors, Proceedings of RAID 2011, pages 378–397. Springer, September 2011. Online: http://www.ssi.gouv.fr/IMG/pdf/paper.pdf.
-
(2011)
Proceedings of RAID 2011
, pp. 378-397
-
-
Duflot, L.1
Perez, Y.-A.2
Morin, B.3
-
20
-
-
70349278622
-
Code injection attacks on harvard-architecture devices
-
Paul Syverson and Somesh Jha, editors, ACM Press, October
-
Aurélien Francillon and Claude Castelluccia. Code injection attacks on Harvard-architecture devices. In Paul Syverson and Somesh Jha, editors, Proceedings of CCS 2008, pages 15–26. ACM Press, October 2008.
-
(2008)
Proceedings of CCS 2008
, pp. 15-26
-
-
Francillon, A.1
Castelluccia, C.2
-
22
-
-
6344291533
-
Turing machines, transition systems, and interaction
-
November Online
-
Dina Q. Goldin, Scott A. Smolka, Paul C. Attie, and Elaine L. Sonderegger. Turing machines, transition systems, and interaction. Information and Computation, 194(2): 101–28, November 2004. Online: http: //www.sciencedirect.com/science/ article/pii/S0890540104001257.
-
(2004)
Information and Computation
, vol.194
, Issue.2
, pp. 101-128
-
-
Goldin, D.Q.1
Smolka, S.A.2
Attie, P.C.3
Sonderegger, E.L.4
-
23
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Fabian Mon-rose, editor, USENIX, August
-
Ralf Hund, Thorsten Holz, and Felix Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Fabian Mon-rose, editor, Proceedings of USENIX Security 2009, pages 383–98. USENIX, August 2009.
-
(2009)
Proceedings of USENIX Security 2009
, pp. 383-398
-
-
Hund, R.1
Holz, T.2
Freiling, F.3
-
24
-
-
85077800250
-
-
July Online
-
Intel Platform Controller Hub EG20T: Datasheet. Intel, July 2012. Online: http://www.intel.com/content/www/us/en/intelligent-systems/queensbay/platform-controller-hub-eg20tdatasheet.html.
-
(2012)
Intel Platform Controller Hub EG20T: Datasheet
-
-
-
25
-
-
84857343850
-
-
May Online
-
Intel Server Platform Group. Intel QuickData technology software guide for Linux, May 2008. Online: http://www.intel.com/content/dam/doc/white-paper/quickdatatechnology-software-guide-forlinux-paper.pdf.
-
(2008)
Intel QuickData Technology Software Guide for Linux
-
-
-
26
-
-
85077790102
-
Thunderbolts and lightning, very very frightening
-
May Online
-
Loukas Kalenderidis and Sam Collinson. Thunderbolts and lightning, very very frightening. Presented at SyScan 2014, May 2014. Online: https://www.youtube.com/watch?v=0FoVmBOdbhg.
-
(2014)
SyScan 2014
-
-
Kalenderidis, L.1
Collinson, S.2
-
29
-
-
84914129819
-
You can type, but you can’t hide: A stealthy GPU-based keylogger
-
Thorsten Holz and Sotiris Ioannidis, editors, ACM, April Online
-
Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. You can type, but you can’t hide: A stealthy GPU-based keylogger. In Thorsten Holz and Sotiris Ioannidis, editors, Proceedings of EuroSec 2013. ACM, April 2013. Online: http://www.cs.columbia.edu/~mikepo/ papers/gpukeylogger.eurosec13.pdf.
-
(2013)
Proceedings of EuroSec 2013
-
-
Ladakis, E.1
Koromilas, L.2
Vasiliadis, G.3
Polychronakis, M.4
Ioannidis, S.5
-
30
-
-
79956057382
-
Developments in cisco IOS forensics
-
November
-
Felix Lidner. Developments in Cisco IOS forensics. CONFidence 2.0. http://www.recuritylabs.com/content/pub/FX_Router_ Exploitation.pdf, November 2009.
-
(2009)
CONFidence 2.0
-
-
Lidner, F.1
-
31
-
-
84910621255
-
Battery firmware hacking: Inside the innards of a smart battery
-
August Online
-
Charlie Miller. Battery firmware hacking: Inside the innards of a smart battery. Presented at Black Hat Briefings, August 2011. Online: http://media.blackhat.com/bh- us-11/Miller/BH_US_11_Miller_Battery_ Firmware_Public_WP.pdf.
-
(2011)
Black Hat Briefings
-
-
Miller, C.1
-
32
-
-
84977072287
-
-
July Online
-
HD Moore. A penetration tester’s guide to IPMI and BMCs. July 2013. Online: https://community.rapid7.com/community/ metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi.
-
(2013)
A Penetration Tester’s Guide to IPMI and BMCs
-
-
-
33
-
-
85084161804
-
Exploiting the hard-working DWARF: Trojan and exploit techniques with no native executable code
-
USENIX Association, August Online
-
James Oakley and Sergey Bratus. Exploiting the hard-working DWARF: Trojan and exploit techniques with no native executable code. In Proceedings WOOT 2011. USENIX Association, August 2011. Online: http://dl.acm.org/citation.cfm?id=2028052.2028063.
-
(2011)
Proceedings WOOT 2011
-
-
Oakley, J.1
Bratus, S.2
-
36
-
-
84968558644
-
Q: Exploit hardening made easy
-
David Wagner, editor, August Online
-
Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. Q: Exploit hardening made easy. In David Wagner, editor, Proceedings of USENIX Security 2011, August 2011. Online: http://users.ece.cmu.edu/~ejschwar/papers/usenix11.pdf.
-
(2011)
Proceedings of USENIX Security 2011
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
37
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Sabrina De Capitani di Vimercati and Paul Syverson, editors, ACM Press, October
-
Hovav Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Sabrina De Capitani di Vimercati and Paul Syverson, editors, Proceedings of CCS 2007, pages 552–61. ACM Press, October 2007.
-
(2007)
Proceedings of CCS 2007
, pp. 552-561
-
-
Shacham, H.1
-
38
-
-
85084161911
-
Weird machines” in ELF: A spotlight on the underappreciated metadata
-
USENIX, August Online
-
Rebecca Shapiro, Sergey Bratus, and Sean W. Smith. “Weird machines” in ELF: A spotlight on the underappreciated metadata. In Proceedings of WOOT 2013. USENIX, August 2013. Online: https://www.usenix.org/conference/woot13/workshopprogram/presentation/Shapiro.
-
(2013)
Proceedings of WOOT 2013
-
-
Shapiro, R.1
Bratus, S.2
Smith, S.W.3
-
39
-
-
76949101487
-
-
Bugtraq, August Online
-
Solar Designer. Getting around non-executable stack (and fix). Bugtraq, August 1997. Online: http://seclists.org/bugtraq/1997/Aug/0063.html.
-
(1997)
Getting around Non-Executable Stack (and Fix)
-
-
-
41
-
-
84888378420
-
A primitive for revealing stealthy peripheral-based attacks on the computing platform’s main memory
-
October Online
-
Patrick Stewin. A primitive for revealing stealthy peripheral-based attacks on the computing platform’s main memory. In Proceedings of RAID 2013, pages 1–20, October 2013. Online: http://link.springer.com/chapter/10.1007%2F978-3-642-41284-4_1.
-
(2013)
Proceedings of RAID 2013
, pp. 1-20
-
-
Stewin, P.1
-
42
-
-
84875669566
-
Understanding dma malware
-
Springer-Verlag, July Online
-
Patrick Stewin and Iurii Bystrov. Understanding dma malware. In Proceedings of DIMVA 2012, pages 21–41. Springer-Verlag, July 2012. Online: http://dx.doi.org/10.1007/978-3-642-37300-8_2.
-
(2012)
Proceedings of DIMVA 2012
, pp. 21-41
-
-
Stewin, P.1
Bystrov, I.2
-
43
-
-
84855347648
-
Introducing ring −3 rootkits
-
July Online
-
Alexander Tereshkin and Rafal Wojtczuk. Introducing ring −3 rootkits. Presented at Black Hat Briefings, July 2009. Online: http://www.blackhat.com/presentations/bh-usa-09/TERESHKIN/BHUSA09-Tereshkin-Ring3Rootkit-SLIDES.pdf.
-
(2009)
Black Hat Briefings
-
-
Tereshkin, A.1
Wojtczuk, R.2
-
44
-
-
84875683728
-
-
November Online
-
Arrigo Triulzi. Project Maux Mk.II, November 2008. Online: http://www.alchemistowl.org/arrigo/Papers/Arrigo-TriulziPACSEC08-Project-Maux-II.pdf.
-
(2008)
Project Maux Mk.II
-
-
Triulzi, A.1
-
47
-
-
84939556806
-
The weird machines in proof-carrying code
-
IEEE Computer Society, May Online
-
Julien Vanegue. The weird machines in proof-carrying code. In Proceedings of SPW 2014, pages 209–13. IEEE Computer Society, May 2014. Online: http://www.ieee-security.org/TC/SPW2014/papers/5103a209.PDF.
-
(2014)
Proceedings of SPW 2014
, pp. 209-213
-
-
Vanegue, J.1
-
48
-
-
78651410940
-
GPU-assisted malware
-
Jean-Yves Marion, Noam Rathaus, and Cliff Zhou, editors, IEEE Computer Society, October Online
-
Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. GPU-assisted malware. In Jean-Yves Marion, Noam Rathaus, and Cliff Zhou, editors, Proceedings of MAL-WARE 2010, pages 1–6. IEEE Computer Society, October 2010. Online: http://dcs.ics.forth.gr/Activities/ papers/gpumalware.malware10.pdf.
-
(2010)
Proceedings of MAL-WARE 2010
, pp. 1-6
-
-
Vasiliadis, G.1
Polychronakis, M.2
Ioannidis, S.3
|