-
3
-
-
79955994779
-
Jump-oriented programming: a new class of code-reuse attack
-
ACM
-
T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang, “Jump-oriented programming: a new class of code-reuse attack,” in Proceedings of the 6th Symposium on Information, Computer and Communications Security. ACM, 2011.
-
(2011)
Proceedings of the 6th Symposium on Information, Computer and Communications Security
-
-
Bletsch, T.1
Jiang, X.2
Freeh, V. W.3
Liang, Z.4
-
4
-
-
70349267779
-
When good instructions go bad: generalizing return-oriented programming to risc
-
ACM
-
E. Buchanan, R. Roemer, H. Shacham, and S. Savage, “When good instructions go bad: generalizing return-oriented programming to risc,” in Proceedings of the 15th conference on Computer and communications security. ACM, 2008.
-
(2008)
Proceedings of the 15th conference on Computer and communications security
-
-
Buchanan, E.1
Roemer, R.2
Shacham, H.3
Savage, S.4
-
5
-
-
17644393012
-
Bypassing stackguard and stackshield
-
January [Online]. Available
-
Bulba and Kil3r, “Bypassing stackguard and stackshield,” Phrack, vol. 56, no. 5, January 2000. [Online]. Available: http://www.phrack.org/issues.html?issue=56&id=5
-
(2000)
Phrack
, vol.56
, Issue.5
-
-
-
6
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
ACM
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang, “Mapping kernel objects to enable systematic integrity checking,” in Proceedings of the 16th conference on Computer and communications security. ACM, 2009.
-
(2009)
Proceedings of the 16th conference on Computer and communications security
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
7
-
-
78650032454
-
Return-oriented programming without returns
-
ACM
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, “Return-oriented programming without returns,” in Proceedings of the 17th conference on Computer and communications security. ACM, 2010.
-
(2010)
Proceedings of the 17th conference on Computer and communications security
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
8
-
-
85180636384
-
Can DREs provide long-lasting security? The case of return-oriented programming and the avc advantage
-
USENIX Association
-
S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham, “Can DREs provide long-lasting security? The case of return-oriented programming and the avc advantage,” in Proceedings of the conference on Electronic voting technology/workshop on trustworthy elections. USENIX Association, 2009.
-
(2009)
Proceedings of the conference on Electronic voting technology/workshop on trustworthy elections
-
-
Checkoway, S.1
Feldman, A. J.2
Kantor, B.3
Halderman, J. A.4
Felten, E. W.5
Shacham, H.6
-
9
-
-
78650906305
-
Return-oriented rootkit without returns (on the x86)
-
Springer
-
P. Chen, X. Xing, B. Mao, and L. Xie, “Return-oriented rootkit without returns (on the x86),” in Information and Communications Security, ser. LNCS. Springer, 2010, vol. 6476, pp. 340–354.
-
(2010)
Information and Communications Security, ser. LNCS
, vol.6476
, pp. 340-354
-
-
Chen, P.1
Xing, X.2
Mao, B.3
Xie, L.4
-
10
-
-
84925350246
-
-
corelanc0d3r, Corelan Team, Tech. Rep., December [Online]. Available
-
corelanc0d3r, “Exploit writing tutorial part 11: Heap spraying demystified,” Corelan Team, Tech. Rep., December 2011. [Online]. Available: https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
-
(2011)
Exploit writing tutorial part 11: Heap spraying demystified
-
-
-
11
-
-
85009448253
-
Pointguard tm: protecting pointers from buffer overflow vulnerabilities
-
USENIX Association
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, “Pointguard tm: protecting pointers from buffer overflow vulnerabilities,” in Proceedings of the 12th USENIX Security Symposium. USENIX Association, 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
12
-
-
85084160243
-
Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks
-
USENIX Association
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, “Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks,” in Proceedings of the 7th USENIX Security Symposium. USENIX Association, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
14
-
-
78650024047
-
-
Ruhr-University Bochum, Tech. Rep. HGI-TR-2010-002
-
L. Davi, A. Dmitrienko, A.-R. Sadeghi, and M. Winandy, “Return-oriented programming without returns on arm,” Ruhr-University Bochum, Tech. Rep. HGI-TR-2010-002, 2010.
-
(2010)
Return-oriented programming without returns on arm
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
15
-
-
79956032720
-
Ropdefender: a detection tool to defend against return-oriented programming attacks
-
ACM
-
L. Davi, A.-R. Sadeghi, and M. Winandy, “Ropdefender: a detection tool to defend against return-oriented programming attacks,” in Proceedings of the 6th Symposium on Information, Computer and Communications Security. ACM, 2011.
-
(2011)
Proceedings of the 6th Symposium on Information, Computer and Communications Security
-
-
Davi, L.1
Sadeghi, A.-R.2
Winandy, M.3
-
21
-
-
85056904897
-
-
Secfence, Tech. Rep., September [Online]. Available
-
V. Katoch, “Whitepaper on bypassing aslr/dep,” Secfence, Tech. Rep., September 2011. [Online]. Available: http://www.exploit-db.com/wp-content/themes/exploit/docs/17914.pdf
-
(2011)
Whitepaper on bypassing aslr/dep
-
-
Katoch, V.1
-
22
-
-
77954614533
-
Defeating return-oriented rootkits with”return-less” kernels
-
ACM
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, “Defeating return-oriented rootkits with”return-less” kernels,” in Proceedings of the 5th European conference on Computer systems. ACM, 2010.
-
(2010)
Proceedings of the 5th European conference on Computer systems
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
23
-
-
3042642332
-
The advanced return-into-lib(c) exploits
-
December [Online]. Available
-
Nergal, “The advanced return-into-lib(c) exploits,” Phrack, vol. 58, no. 4, December 2001. [Online]. Available: http://www.phrack.org/issues.html?issue=58&id=4
-
(2001)
Phrack
, vol.58
, Issue.4
-
-
Nergal1
-
24
-
-
78751484536
-
G-Free: defeating return-oriented programming through gadget-less binaries
-
ACM
-
K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, “G-Free: defeating return-oriented programming through gadget-less binaries,” in Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 12 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 12
-
-
Onarlioglu, K.1
Bilge, L.2
Lanzi, A.3
Balzarotti, D.4
Kirda, E.5
-
25
-
-
0006100649
-
Smashing the stack for fun and profit
-
November [Online]. Available
-
A. One, “Smashing the stack for fun and profit,” Phrack, vol. 49, no. 14, November 1996. [Online]. Available: http://www.phrack.org/issues.html?issue=49&id=14
-
(1996)
Phrack
, vol.49
, Issue.14
-
-
One, A.1
-
28
-
-
4344593013
-
Beyond stack smashing: recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker, “Beyond stack smashing: recent advances in exploiting buffer overruns,” Security & Privacy, vol. 2, no. 4, pp. 20–27, 2004.
-
(2004)
Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
35
-
-
76949101487
-
Getting around non-executable stack (and fix)
-
Aug
-
Solar Designer, “Getting around non-executable stack (and fix),” Bugtraq Mailing List, Aug. 1997.
-
(1997)
Bugtraq Mailing List
-
-
Designer, Solar1
-
36
-
-
85180630038
-
-
2nd ed., UEFI Inc., July [Online]. Available
-
UEFI Specification, 2nd ed., UEFI Inc., July 2013. [Online]. Available: http://www.uefi.org/specs/download/UEFI_2_4.pdf
-
(2013)
UEFI Specification
-
-
-
38
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
ACM
-
Z. Wang, X. Jiang, W. Cui, and P. Ning, “Countering kernel rootkits with lightweight hook protection,” in Proceedings of the 16th conference on Computer and communications security. ACM, 2009.
-
(2009)
Proceedings of the 16th conference on Computer and communications security
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
39
-
-
79960481357
-
Countering persistent kernel rootkits through systematic hook discovery
-
Springer
-
Z. Wang, X. Jiang, W. Cui, and X. Wang, “Countering persistent kernel rootkits through systematic hook discovery,” in Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection. Springer, 2008.
-
(2008)
Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
|