-
1
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, “Control-flow integrity, ” in ACM Conference on Computer and Communications Security (CCS), 2005.
-
(2005)
ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
4
-
-
33745217853
-
Diehard: probabilistic memory safety for unsafe languages
-
ACM
-
E. D. Berger and B. G. Zorn, “Diehard: probabilistic memory safety for unsafe languages, ” in PLDI, vol. 41, no. 6. ACM, 2006, pp. 158-168.
-
(2006)
PLDI
, vol.41
, Issue.6
, pp. 158-168
-
-
Berger, E. D.1
Zorn, B. G.2
-
6
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, “Non-control-data attacks are realistic threats, ” in USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
8
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attack
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, “StackGuard: Automatic adaptive detection and prevention of buffer-overflow attack, ” in USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
9
-
-
85180814356
-
Static detection of c++ vtable escape vulnerabilities in binary code
-
D. Dewey and J. T. Giffin, “Static detection of c++ vtable escape vulnerabilities in binary code.” in NDSS, 2012.
-
(2012)
NDSS
-
-
Dewey, D.1
Giffin, J. T.2
-
11
-
-
0004349103
-
-
Microsoft Research, Tech. Rep. MSR-TR-2001-50
-
A. Edwards, A. Srivastava, and H. Vo, “Vulcan: binary transformation in a distributed environment, ” Microsoft Research, Tech. Rep. MSR-TR-2001-50, 2001.
-
(2001)
Vulcan: binary transformation in a distributed environment
-
-
Edwards, A.1
Srivastava, A.2
Vo, H.3
-
13
-
-
84922965427
-
Out of control: Overcoming control-flow integrity
-
E. Göktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, “Out of control: Overcoming control-flow integrity, ” in IEEE S&P, 2014.
-
(2014)
IEEE S&P
-
-
Göktas, E.1
Athanasopoulos, E.2
Bos, H.3
Portokalidis, G.4
-
16
-
-
0034226001
-
SPEC CPU2000: Measuring CPU Performance in the New Millennium
-
Jul
-
J. L. Henning, “SPEC CPU2000: Measuring CPU Performance in the New Millennium, ” Computer, Jul. 2000.
-
(2000)
Computer
-
-
Henning, J. L.1
-
17
-
-
36849034066
-
SPEC CPU2006 benchmark descriptions
-
Sep
-
J. L. Henning, “SPEC CPU2006 benchmark descriptions, ” SIGARCH Comput. Archit. News, vol. 34, pp. 1-17, Sep. 2006.
-
(2006)
SIGARCH Comput. Archit. News
, vol.34
, pp. 1-17
-
-
Henning, J. L.1
-
19
-
-
84869381037
-
ILR: Where'd my gadgets go
-
J. Hiser, A. Nguyen-tuong, M. Co, M. Hall, and J. W. Davidson, “ILR: Where'd my gadgets go, ” in IEEE Symposium on Security and Privacy, 2012.
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Hiser, J.1
Nguyen-tuong, A.2
Co, M.3
Hall, M.4
Davidson, J. W.5
-
21
-
-
85076902948
-
Code-pointer integrity
-
[Online]. Available
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song, “Code-pointer integrity, ” OSDI'14, 2014, 00000. [Online]. Available: https://www.usenix.org/system/files/conference/osdi14/osdi14-paper-kuznetsov.pdf?utm_source= dlvr.it&utm_medium=tumblr
-
(2014)
OSDI'14
, pp. 00000
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
27
-
-
84881252577
-
-
Microsoft Visual Studio 2005, “Image has safe exception handlers, ” http://msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx.
-
(2005)
Image has safe exception handlers
-
-
-
28
-
-
84964539164
-
-
Mar. 25 uS Patent 8, 683, 583
-
M. R. Miller, K. D. Johnson, and T. W. Burrell, “Using virtual table protections to prevent the exploitation of object corruption vulnerabilities, ” Mar. 25 2014, uS Patent 8, 683, 583.
-
(2014)
Using virtual table protections to prevent the exploitation of object corruption vulnerabilities
-
-
Miller, M. R.1
Johnson, K. D.2
Burrell, T. W.3
-
31
-
-
70450237674
-
SoftBound: highly compatible and complete spatial memory safety for C
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, “SoftBound: highly compatible and complete spatial memory safety for C, ” in Conference of Programming Language Design and Implementation (PLDI), 2009.
-
(2009)
Conference of Programming Language Design and Implementation (PLDI)
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M. M.3
Zdancewic, S.4
-
32
-
-
77954726241
-
CETS: compiler enforced temporal safety for C
-
S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, “CETS: compiler enforced temporal safety for C, ” in International Symposium on Memory Management (ISMM), 2010.
-
(2010)
International Symposium on Memory Management (ISMM)
-
-
Nagarakatte, S.1
Zhao, J.2
Martin, M. M.3
Zdancewic, S.4
-
36
-
-
0030836322
-
Low-cost, concurrent checking of pointer and array accesses in c programs
-
H. Patil and C. Fischer, “Low-cost, concurrent checking of pointer and array accesses in c programs, ” Softw., Pract. Exper., vol. 27, no. 1, pp. 87-110, 1997.
-
(1997)
Softw., Pract. Exper
, vol.27
, Issue.1
, pp. 87-110
-
-
Patil, H.1
Fischer, C.2
-
39
-
-
2642520196
-
A binary rewriting defense against stack based buffer overflow attacks
-
M. Prasad and T.-c. Chiueh, “A binary rewriting defense against stack based buffer overflow attacks, ” in USENIX Annual Technical Conference, 2003.
-
(2003)
USENIX Annual Technical Conference
-
-
Prasad, M.1
Chiueh, T.-c.2
-
41
-
-
85066348691
-
-
RightWare
-
RightWare, “Browsermark 2.1 benchmark, ” http://browsermark.rightware.com/, 2014.
-
(2014)
Browsermark 2.1 benchmark
-
-
-
42
-
-
85180546932
-
-
rix
-
rix, “Smashing C++ VPTRs, ” http://phrack.org/issues/56/8.html, 2000.
-
(2000)
Smashing C++ VPTRs
-
-
-
45
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), ” in ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
-
46
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-j. Goh, N. Modadugu, and D. Boneh, “On the effectiveness of address-space randomization, ” Proceedings of the 11th ACM conference on Computer and communications security (CCS'04), p. 298, 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security (CCS'04)
, pp. 298
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-j.4
Modadugu, N.5
Boneh, D.6
-
49
-
-
84970915820
-
Improving function pointer security for virtual method dispatches
-
C. Tice, “Improving function pointer security for virtual method dispatches, ” in GNU Tools Cauldron Workshop, 2012.
-
(2012)
GNU Tools Cauldron Workshop
-
-
Tice, C.1
-
50
-
-
77955212682
-
HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang, “HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity, ” in IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Wang, Z.1
Jiang, X.2
-
51
-
-
20344383014
-
An efficient and backwards-compatible transformation to ensure memory safety of c programs
-
ACM
-
W. Xu, D. C. DuVarney, and R. Sekar, “An efficient and backwards-compatible transformation to ensure memory safety of c programs, ” in ACM SIGSOFT Software Engineering Notes, vol. 29, no. 6. ACM, 2004, pp. 117-126.
-
(2004)
ACM SIGSOFT Software Engineering Notes
, vol.29
, Issue.6
, pp. 117-126
-
-
Xu, W.1
DuVarney, D. C.2
Sekar, R.3
-
52
-
-
84881218812
-
Practical control flow integrity and randomization for binary executables
-
IEEE
-
C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, “Practical control flow integrity and randomization for binary executables, ” in Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 2013, pp. 559-573.
-
(2013)
Security and Privacy (SP), 2013 IEEE Symposium on
, pp. 559-573
-
-
Zhang, C.1
Wei, T.2
Chen, Z.3
Duan, L.4
Szekeres, L.5
McCamant, S.6
Song, D.7
Zou, W.8
-
53
-
-
85041451135
-
Control flow integrity for cots binaries
-
M. Zhang and R. Sekar, “Control flow integrity for cots binaries.” in USENIX Security, 2013, pp. 337-352.
-
(2013)
USENIX Security
, pp. 337-352
-
-
Zhang, M.1
Sekar, R.2
|