-
1
-
-
72449145808
-
Control-flow integrity principles, implementations, and applications
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information System Security, 13, 2009.
-
(2009)
ACM Transactions on Information System Security
, vol.13
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
3
-
-
84988352452
-
-
ARM. ARM architecture reference manual. http://silver.arm.com/download/ARM_and_AMBA_Architecture/AR150-DA-70000-r0p0-00bet9/DDI0487A_h_armv8_arm.pdf, 2015.
-
(2015)
ARM architecture reference manual
-
-
-
4
-
-
85013680453
-
Skee: A lightweight secure kernel-level execution environment for arm
-
A. Azab, K. Swidowski, R. Bhutkar, J. Ma, W. Shen, R. Wang, and P. Ning. Skee: A lightweight secure kernel-level execution environment for arm. In 23rd Annual Network and Distributed System Security Symposium, NDSS, 2016.
-
(2016)
23rd Annual Network and Distributed System Security Symposium, NDSS
-
-
Azab, A.1
Swidowski, K.2
Bhutkar, R.3
Ma, J.4
Shen, W.5
Wang, R.6
Ning, P.7
-
5
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2014.
-
(2014)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Azab, A. M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
6
-
-
85025171717
-
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
-
M. Backes and S. Nürnberger. Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. In 23rd USENIX Security Symposium, USENIX Sec, 2014.
-
(2014)
23rd USENIX Security Symposium, USENIX Sec
-
-
Backes, M.1
Nürnberger, S.2
-
8
-
-
84954119725
-
Timely rerandomization for mitigating memory disclosures
-
D. Bigelow, T. Hobson, R. Rudd, W. Streilein, and H. Okhravi. Timely rerandomization for mitigating memory disclosures. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Bigelow, D.1
Hobson, T.2
Rudd, R.3
Streilein, W.4
Okhravi, H.5
-
9
-
-
70350684106
-
-
Technical Report MSR-TR-2008-120, Microsoft Research
-
C. Cadar, P. Akritidis, M. Costa, J.-P. Martin, and M. Castro. Data randomization. Technical Report MSR-TR-2008-120, Microsoft Research, 2008.
-
(2008)
Data randomization
-
-
Cadar, C.1
Akritidis, P.2
Costa, M.3
Martin, J.-P.4
Castro, M.5
-
10
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In 14th USENIX Security Symposium, USENIX Sec, 2005.
-
(2005)
14th USENIX Security Symposium, USENIX Sec
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
11
-
-
84954171757
-
Losing control: On the effectiveness of control-flow integrity under stack attacks
-
M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen, C. Liebchen, M. Negro, M. Qunaibit, and A.-R. Sadeghi. Losing control: On the effectiveness of control-flow integrity under stack attacks. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Conti, M.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Liebchen, C.6
Negro, M.7
Qunaibit, M.8
Sadeghi, A.-R.9
-
12
-
-
84945195324
-
Readactor: Practical code randomization resilient to memory disclosure
-
S. Crane, C. Liebchen, A. Homescu, L. Davi, P. Larsen, A.-R. Sadeghi, S. Brunthaler, and M. Franz. Readactor: Practical code randomization resilient to memory disclosure. In 36th IEEE Symposium on Security and Privacy, S&P, 2015.
-
(2015)
36th IEEE Symposium on Security and Privacy, S&P
-
-
Crane, S.1
Liebchen, C.2
Homescu, A.3
Davi, L.4
Larsen, P.5
Sadeghi, A.-R.6
Brunthaler, S.7
Franz, M.8
-
14
-
-
85028598800
-
-
CVE Details
-
CVE Details. Linux kernel: Vulnerability statistics. http://www.cvedetails.com/product/47/Linux-Linux-Kernel.html, 2016.
-
(2016)
Linux kernel: Vulnerability statistics
-
-
-
15
-
-
84965059568
-
Isomeron: Code randomization resilient to (Just-In-Time) return-oriented programming
-
L. Davi, C. Liebchen, A.-R. Sadeghi, K. Z. Snow, and F. Monrose. Isomeron: Code randomization resilient to (Just-In-Time) return-oriented programming. In 22nd Annual Network and Distributed System Security Symposium, NDSS, 2015.
-
(2015)
22nd Annual Network and Distributed System Security Symposium, NDSS
-
-
Davi, L.1
Liebchen, C.2
Sadeghi, A.-R.3
Snow, K. Z.4
Monrose, F.5
-
18
-
-
85180410414
-
iOS kernel exploitation
-
BH EU
-
S. Esser. iOS kernel exploitation. In Blackhat Europe, BH EU, 2011.
-
(2011)
Blackhat Europe
-
-
Esser, S.1
-
19
-
-
84978153207
-
Fine-grained control-flow integrity for kernel software
-
X. Ge, N. Talele, M. Payer, and T. Jaeger. Fine-grained control-flow integrity for kernel software. In 1st IEEE European Symposium on Security and Privacy, Euro S&P, 2016.
-
(2016)
1st IEEE European Symposium on Security and Privacy, Euro S&P
-
-
Ge, X.1
Talele, N.2
Payer, M.3
Jaeger, T.4
-
22
-
-
84870525044
-
Os-sommelier: Memory-only operating system fingerprinting in the cloud
-
Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin. Os-sommelier: Memory-only operating system fingerprinting in the cloud. In 3rd ACM Symposium on Cloud Computing, SoCC, 2012.
-
(2012)
3rd ACM Symposium on Cloud Computing, SoCC
-
-
Gu, Y.1
Fu, Y.2
Prakash, A.3
Lin, Z.4
Yin, H.5
-
23
-
-
84987628667
-
Automatic generation of data-oriented exploits
-
H. Hu, Z. L. Chua, S. Adrian, P. Saxena, and Z. Liang. Automatic generation of data-oriented exploits. In 24th USENIX Security Symposium, USENIX Sec, 2015.
-
(2015)
24th USENIX Security Symposium, USENIX Sec
-
-
Hu, H.1
Chua, Z. L.2
Adrian, S.3
Saxena, P.4
Liang, Z.5
-
24
-
-
84987597669
-
Data-oriented programming: On the expressiveness of non-control data attacks
-
H. Hu, S. Shinde, A. Sendroiu, Z. L. Chua, P. Saxena, and Z. Liang. Data-oriented programming: On the expressiveness of non-control data attacks. In 37th IEEE Symposium on Security and Privacy, S&P, 2016.
-
(2016)
37th IEEE Symposium on Security and Privacy, S&P
-
-
Hu, H.1
Shinde, S.2
Sendroiu, A.3
Chua, Z. L.4
Saxena, P.5
Liang, Z.6
-
29
-
-
84905484287
-
Flipping bits in memory without accessing them: An experimental study of dram disturbance errors
-
Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C. Wilkerson, K. Lai, and O. Mutlu. Flipping bits in memory without accessing them: An experimental study of dram disturbance errors. In 41st Annual International Symposium on Computer Architecture, ISCA, 2014.
-
(2014)
41st Annual International Symposium on Computer Architecture, ISCA
-
-
Kim, Y.1
Daly, R.2
Kim, J.3
Fallin, C.4
Lee, J. H.5
Lee, D.6
Wilkerson, C.7
Lai, K.8
Mutlu, O.9
-
30
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation, OSDI, 2014.
-
(2014)
11th USENIX Symposium on Operating Systems Design and Implementation, OSDI
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
31
-
-
84914111191
-
SoK: Automated software diversity
-
P. Larsen, A. Homescu, S. Brunthaler, and M. Franz. SoK: Automated software diversity. In 35th IEEE Symposium on Security and Privacy, S&P, 2014.
-
(2014)
35th IEEE Symposium on Security and Privacy, S&P
-
-
Larsen, P.1
Homescu, A.2
Brunthaler, S.3
Franz, M.4
-
32
-
-
85076209306
-
-
LTP developer
-
LTP developer. The linux test project. https://linux-test-project.github.io/, 2016.
-
(2016)
The linux test project
-
-
-
33
-
-
84954110587
-
Aslr-guard: Stopping address space leakage for code reuse attacks
-
K. Lu, C. Song, B. Lee, S. P. Chung, T. Kim, and W. Lee. Aslr-guard: Stopping address space leakage for code reuse attacks. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2015.
-
(2015)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Lu, K.1
Song, C.2
Lee, B.3
Chung, S. P.4
Kim, T.5
Lee, W.6
-
38
-
-
85135634568
-
-
MWR Labs. Windows 8 kernel memory protections bypass. http://labs.mwrinfosecurity.com/blog/2014/08/15/windows-8-kernel-memory-protections-bypass, 2014.
-
(2014)
Windows 8 kernel memory protections bypass
-
-
-
41
-
-
84986537586
-
-
Phoronix. Phoronix test suite. http://www.phoronix-test-suite.com/, 2016.
-
(2016)
Phoronix test suite
-
-
-
43
-
-
77949482509
-
Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
-
R. Riley, X. Jiang, and D. Xu. Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In 11th International Symposium on Research in Attacks, Intrusions and Defenses, RAID, 2008.
-
(2008)
11th International Symposium on Research in Attacks, Intrusions and Defenses, RAID
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
-
45
-
-
41149103393
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig. Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses. ACM SIGOPS Operating Systems Review, 41(6):335–350, 2007.
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, Issue.6
, pp. 335-350
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
47
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2004.
-
(2004)
ACM SIGSAC Conference on Computer and Communications Security, CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
48
-
-
84881263793
-
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
-
K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In 34th IEEE Symposium on Security and Privacy, S&P, 2013.
-
(2013)
34th IEEE Symposium on Security and Privacy, S&P
-
-
Snow, K. Z.1
Monrose, F.2
Davi, L.3
Dmitrienko, A.4
Liebchen, C.5
Sadeghi, A.6
-
49
-
-
84987602059
-
Enforcing kernel security invariants with data flow integrity
-
C. Song, B. Lee, K. Lu, W. R. Harris, T. Kim, and W. Lee. Enforcing kernel security invariants with data flow integrity. In 23rd Annual Network and Distributed System Security Symposium, NDSS, 2016.
-
(2016)
23rd Annual Network and Distributed System Security Symposium, NDSS
-
-
Song, C.1
Lee, B.2
Lu, K.3
Harris, W. R.4
Kim, T.5
Lee, W.6
-
50
-
-
84959256791
-
-
Internet [May, 2016]. Available on
-
B. Spengler. Grsecurity. Internet [May, 2016]. Available on: http://grsecurity.net, 2016.
-
(2016)
Grsecurity
-
-
Spengler, B.1
-
51
-
-
84881235941
-
SoK: Eternal war in memory
-
L. Szekeres, M. Payer, T. Wei, and D. Song. SoK: Eternal war in memory. In 34th IEEE Symposium on Security and Privacy, S&P, 2013.
-
(2013)
34th IEEE Symposium on Security and Privacy, S&P
-
-
Szekeres, L.1
Payer, M.2
Wei, T.3
Song, D.4
-
52
-
-
85060050382
-
-
P. Team. RAP: RIP ROP. https://pax.grsecurity.net/docs/PaXTeamH2HC15-RAP-RIP-ROP.pdf, 2015.
-
(2015)
RAP: RIP ROP
-
-
Team, P.1
-
53
-
-
85046430791
-
-
Trusted Computing Group. Tpm 1.2 protection profile. https://www.trustedcomputinggroup.org/tpm-1-2-protection-profile/, 2016.
-
(2016)
Tpm 1.2 protection profile
-
-
-
54
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
IEEE
-
Z. Wang and X. Jiang. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 380–395. IEEE, 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 380-395
-
-
Wang, Z.1
Jiang, X.2
-
55
-
-
77950798876
-
Subverting the xen hypervisor
-
Blackhat USA, BH US
-
R. Wojtczuk. Subverting the xen hypervisor. In Blackhat USA, BH US, 2008.
-
(2008)
-
-
Wojtczuk, R.1
|