-
1
-
-
33646767376
-
Control-flow integrity
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, “Control-flow integrity,” in ACM Conference on Computer and Communications Security (CCS), 2005.
-
(2005)
ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
2
-
-
0004072686
-
-
Addison-Wesley
-
A. V. Aho, R. Sethi, and J. D. Ullman, Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, A. V.1
Sethi, R.2
Ullman, J. D.3
-
3
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro, “Preventing memory error exploits with WIT,” in IEEE Symposium on Security and Privacy (Oakland), 2008.
-
(2008)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
0004200684
-
Computer security technology planning study
-
U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Tech. Rep. ESD-TR-73-51
-
J. P. Anderson, “Computer security technology planning study,” U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Tech. Rep. ESD-TR-73-51, 1972.
-
(1972)
-
-
Anderson, J. P.1
-
5
-
-
85063250778
-
-
Android Open Source Project, “Verified boot,” https://source.android.com/ devices/tech/security/verifiedboot/index.html.
-
Verified boot
-
-
-
9
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen, “Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world,” in ACM Conference on Computer and Communications Security (CCS), 2014.
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Azab, A. M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
11
-
-
85101088382
-
Thorough static analysis of device drivers
-
T. Ball, E. Bounimova, B. Cook, V. Levin, J. Lichtenberg, C. McGarvey, B. Ondrusek, S. K. Rajamani, and A. Ustuner, “Thorough static analysis of device drivers,” in ACM EuroSys Conference, 2006, pp. 73-85.
-
(2006)
ACM EuroSys Conference
, pp. 73-85
-
-
Ball, T.1
Bounimova, E.2
Cook, B.3
Levin, V.4
Lichtenberg, J.5
McGarvey, C.6
Ondrusek, B.7
Rajamani, S. K.8
Ustuner, A.9
-
13
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang, “Mapping kernel objects to enable systematic integrity checking,” in ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
14
-
-
85053935206
-
Controlflow bending: On the effectiveness of control-flow integrity
-
N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross, “Controlflow bending: On the effectiveness of control-flow integrity,” in Usenix Security Symposium, 2015.
-
(2015)
Usenix Security Symposium
-
-
Carlini, N.1
Barresi, A.2
Payer, M.3
Wagner, D.4
Gross, T. R.5
-
16
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
M. Castro, M. Costa, J.-P. Martin, M. Peinado, P. Akritidis, A. Donnelly, P. Barham, and R. Black, “Fast byte-granularity software fault isolation,” in ACM Symposium on Operating Systems Principles (SOSP), 2009.
-
(2009)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
18
-
-
84863145383
-
Linux kernel vulnerabilities: State-of-the-art defenses and open problems
-
H. Chen, Y. Mao, X. Wang, D. Zhou, N. Zeldovich, and M. F. Kaashoek, “Linux kernel vulnerabilities: State-of-the-art defenses and open problems,” in Asia-Pacific Workshop on Systems (APSys), 2011.
-
(2011)
Asia-Pacific Workshop on Systems (APSys)
-
-
Chen, H.1
Mao, Y.2
Wang, X.3
Zhou, D.4
Zeldovich, N.5
Kaashoek, M. F.6
-
20
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer, “Non-control-data attacks are realistic threats,” in Usenix Security Symposium, 2005.
-
(2005)
Usenix Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E. C.3
Gauriar, P.4
Iyer, R. K.5
-
21
-
-
84954171757
-
Losing control: On the effectiveness of control-flow integrity under stack attacks
-
M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen, C. Liebchen, M. Negro, M. Qunaibit, and A. R. Sadeghi, “Losing control: On the effectiveness of control-flow integrity under stack attacks,” in ACM Conference on Computer and Communications Security (CCS), 2015.
-
(2015)
ACM Conference on Computer and Communications Security (CCS)
-
-
Conti, M.1
Crane, S.2
Davi, L.3
Franz, M.4
Larsen, P.5
Liebchen, C.6
Negro, M.7
Qunaibit, M.8
Sadeghi, A. R.9
-
23
-
-
70450078948
-
Secure virtual architecture: A safe execution environment for commodity operating systems
-
J. Criswell, A. Lenharth, D. Dhurjati, and V. Adve, “Secure virtual architecture: A safe execution environment for commodity operating systems,” in ACM Symposium on Operating Systems Principles (SOSP), 2007.
-
(2007)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Criswell, J.1
Lenharth, A.2
Dhurjati, D.3
Adve, V.4
-
24
-
-
84939168956
-
Nested kernel: An operating system architecture for intra-kernel privilege separation
-
N. Dautenhahn, T. Kasampalis, W. Dietz, J. Criswell, and V. Adve, “Nested kernel: An operating system architecture for intra-kernel privilege separation,” in International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2015.
-
(2015)
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Dautenhahn, N.1
Kasampalis, T.2
Dietz, W.3
Criswell, J.4
Adve, V.5
-
25
-
-
78651539599
-
Xfi: Software guards for system address spaces
-
U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula, “Xfi: Software guards for system address spaces,” in Symposium on Operating Systems Design and Implementation (OSDI), 2006.
-
(2006)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Erlingsson, U.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G. C.5
-
26
-
-
84945192930
-
Missing the Point(er): On the Effectiveness of Code Pointer Integrity
-
I. Evans, S. Fingeret, J. Gonzalez, U. Otgonbaatar, T. Tang, H. Shrobe, S. Sidiroglou-Douskos, M. Rinard, and H. Okhravi, “Missing the Point(er): On the Effectiveness of Code Pointer Integrity,” in IEEE Symposium on Security and Privacy (Oakland), 2015.
-
(2015)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Evans, I.1
Fingeret, S.2
Gonzalez, J.3
Otgonbaatar, U.4
Tang, T.5
Shrobe, H.6
Sidiroglou-Douskos, S.7
Rinard, M.8
Okhravi, H.9
-
27
-
-
84954145711
-
Control jujutsu: On the weaknesses of finegrained control flow integrity
-
I. Evans, F. Long, U. Otgonbaatar, H. Shrobe, M. Rinard, H. Okhravi, and S. Sidiroglou-Douskos, “Control jujutsu: On the weaknesses of finegrained control flow integrity,” in ACM Conference on Computer and Communications Security (CCS), 2015.
-
(2015)
ACM Conference on Computer and Communications Security (CCS)
-
-
Evans, I.1
Long, F.2
Otgonbaatar, U.3
Shrobe, H.4
Rinard, M.5
Okhravi, H.6
Sidiroglou-Douskos, S.7
-
28
-
-
84987628667
-
Automatic generation of data-oriented exploits
-
H. Hu, Z. L. Chua, S. Adrian, P. Saxena, and Z. Liang, “Automatic generation of data-oriented exploits,” in Usenix Security Symposium, 2015.
-
(2015)
Usenix Security Symposium
-
-
Hu, H.1
Chua, Z. L.2
Adrian, S.3
Saxena, P.4
Liang, Z.5
-
32
-
-
85084161650
-
Finding user/kernel pointer bugs with type inference
-
R. Johnson and D. Wagner, “Finding user/kernel pointer bugs with type inference.” in Usenix Security Symposium, 2004.
-
(2004)
Usenix Security Symposium
-
-
Johnson, R.1
Wagner, D.2
-
34
-
-
84905484287
-
Flipping bits in memory without accessing them: An experimental study of dram disturbance errors
-
Y. Kim, R. Daly, J. Kim, C. Fallin, J. H. Lee, D. Lee, C. Wilkerson, K. Lai, and O. Mutlu, “Flipping bits in memory without accessing them: An experimental study of dram disturbance errors,” in Annual International Symposium on Computer Architecture (ISCA), 2014.
-
(2014)
Annual International Symposium on Computer Architecture (ISCA)
-
-
Kim, Y.1
Daly, R.2
Kim, J.3
Fallin, C.4
Lee, J. H.5
Lee, D.6
Wilkerson, C.7
Lai, K.8
Mutlu, O.9
-
35
-
-
72249120603
-
sel4: Formal verification of an os kernel
-
G. Klein, K. Elphinstone, G. Heiser, J. Andronick, D. Cock, P. Derrin, D. Elkaduwe, K. Engelhardt, R. Kolanski, M. Norrish et al., “sel4: Formal verification of an os kernel,” in ACM Symposium on Operating Systems Principles (SOSP), 2009.
-
(2009)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
-
36
-
-
85076902948
-
Code-pointer integrity
-
V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song, “Code-pointer integrity,” in Symposium on Operating Systems Design and Implementation (OSDI), 2014.
-
(2014)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Kuznetsov, V.1
Szekeres, L.2
Payer, M.3
Candea, G.4
Sekar, R.5
Song, D.6
-
38
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
D. Larochelle and D. Evans, “Statically detecting likely buffer overflow vulnerabilities.” in Usenix Security Symposium, 2001.
-
(2001)
Usenix Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
39
-
-
85180736289
-
Defeating returnoriented rootkits with return-less kernels
-
J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, “Defeating returnoriented rootkits with return-less kernels,” in European Symposium on Research in Computer Security (ESORICS), 2010.
-
(2010)
European Symposium on Research in Computer Security (ESORICS)
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
40
-
-
77952379905
-
Secure untrusted data repository (sundr)
-
J. Li, M. N. Krohn, D. Mazières, and D. Shasha, “Secure untrusted data repository (sundr),” in Symposium on Operating Systems Design and Implementation (OSDI), 2004.
-
(2004)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Li, J.1
Krohn, M. N.2
Mazières, D.3
Shasha, D.4
-
41
-
-
84961990257
-
Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures
-
Z. Lin, J. Rhee, X. Zhang, D. Xu, and X. Jiang, “Siggraph: Brute force scanning of kernel data structure instances using graph-based signatures.” in Network and Distributed System Security Symposium (NDSS), 2011.
-
(2011)
Network and Distributed System Security Symposium (NDSS)
-
-
Lin, Z.1
Rhee, J.2
Zhang, X.3
Xu, D.4
Jiang, X.5
-
43
-
-
82655175538
-
Software fault isolation with api integrity and multi-principal modules
-
Y. Mao, H. Chen, D. Zhou, X. Wang, N. Zeldovich, and M. F. Kaashoek, “Software fault isolation with api integrity and multi-principal modules,” in ACM Symposium on Operating Systems Principles (SOSP), 2011.
-
(2011)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Mao, Y.1
Chen, H.2
Zhou, D.3
Wang, X.4
Zeldovich, N.5
Kaashoek, M. F.6
-
45
-
-
84958012396
-
Cross-checking semantic correctness: The case of finding file system bugs
-
C. Min, S. Kashyap, B. Lee, C. Song, and T. Kim, “Cross-checking semantic correctness: The case of finding file system bugs,” in ACM Symposium on Operating Systems Principles (SOSP), 2015.
-
(2015)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Min, C.1
Kashyap, S.2
Lee, B.3
Song, C.4
Kim, T.5
-
46
-
-
85019266862
-
-
MITRE, “Cve-2013-6282,” https://cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2013-6282, 2013.
-
(2013)
Cve-2013-6282
-
-
-
48
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song, “Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software,” in Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
50
-
-
85180795675
-
ARM TrustZone and KVM Coexistence with RTOS For Automotive
-
M. Paolino, “ARM TrustZone and KVM Coexistence with RTOS For Automotive,” in ALS Japan, 2015.
-
(2015)
ALS Japan
-
-
Paolino, M.1
-
52
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. D. Payne, M. Carbone, M. Sharif, and W. Lee, “Lares: An architecture for secure active monitoring using virtualization,” in IEEE Symposium on Security and Privacy (Oakland), 2008.
-
(2008)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Payne, B. D.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
53
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
N. L. Petroni Jr, T. Fraser, A. Walters, and W. A. Arbaugh, “An architecture for specification-based detection of semantic integrity violations in kernel dynamic data.” in Usenix Security Symposium, 2006.
-
(2006)
Usenix Security Symposium
-
-
Petroni, N. L.1
Fraser, T.2
Walters, A.3
Arbaugh, W. A.4
-
55
-
-
70449824733
-
Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses
-
A. Seshadri, M. Luk, N. Qu, and A. Perrig, “Secvisor: A tiny hypervisor to provide lifetime kernel code integrity for commodity oses,” in ACM Symposium on Operating Systems Principles (SOSP), 2007.
-
(2007)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Seshadri, A.1
Luk, M.2
Qu, N.3
Perrig, A.4
-
56
-
-
74049145643
-
Secure in-vm monitoring using hardware virtualization
-
M. I. Sharif, W. Lee, W. Cui, and A. Lanzi, “Secure in-vm monitoring using hardware virtualization,” in ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Sharif, M. I.1
Lee, W.2
Cui, W.3
Lanzi, A.4
-
59
-
-
85180736276
-
-
“System error code,” https://msdn.microsoft.com/en-us/library/windows/ desktop/ms681382%28v=vs.85%29.aspx, 2001.
-
(2001)
System error code
-
-
-
60
-
-
85180763769
-
-
The IEEE and The Open Group, errno.h system error numbers. The Open Group, the Open Group Base Specifications 7, IEEE Std 1003.1, 2013 Edition
-
The IEEE and The Open Group, errno.h - system error numbers. The Open Group, 2013, the Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2013 Edition, http://pubs.opengroup.org/onlinepubs/9699919799/ functions/rename.html.
-
(2013)
-
-
-
61
-
-
85180789023
-
-
The Linux Foundation, “Llvmlinux,” http://llvm.linuxfoundation.org/ index.php/Main_Page.
-
Llvmlinux
-
-
-
63
-
-
0001225966
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, “Efficient software-based fault isolation,” in ACM Symposium on Operating Systems Principles (SOSP), 1994.
-
(1994)
ACM Symposium on Operating Systems Principles (SOSP)
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T. E.3
Graham, S. L.4
-
64
-
-
84893504229
-
Improving integer security for systems with kint
-
X. Wang, H. Chen, Z. Jia, N. Zeldovich, and M. F. Kaashoek, “Improving integer security for systems with kint.” in Symposium on Operating Systems Design and Implementation (OSDI), 2012.
-
(2012)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Wang, X.1
Chen, H.2
Jia, Z.3
Zeldovich, N.4
Kaashoek, M. F.5
-
65
-
-
77955212682
-
Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
-
Z. Wang and X. Jiang, “Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity,” in IEEE Symposium on Security and Privacy (Oakland), 2010.
-
(2010)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Wang, Z.1
Jiang, X.2
-
66
-
-
14844302134
-
Meca: an extensible, expressive system and language for statically checking security properties
-
J. Yang, T. Kremenek, Y. Xie, and D. Engler, “Meca: an extensible, expressive system and language for statically checking security properties,” in ACM Conference on Computer and Communications Security (CCS), 2003.
-
(2003)
ACM Conference on Computer and Communications Security (CCS)
-
-
Yang, J.1
Kremenek, T.2
Xie, Y.3
Engler, D.4
-
67
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar, “Native client: A sandbox for portable, untrusted x86 native code,” in IEEE Symposium on Security and Privacy (Oakland), 2009.
-
(2009)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J. B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
68
-
-
84910635238
-
Armlock: Hardwarebased fault isolation for arm
-
Y. Zhou, X. Wang, Y. Chen, and Z. Wang, “Armlock: Hardwarebased fault isolation for arm,” in ACM Conference on Computer and Communications Security (CCS), 2014.
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Zhou, Y.1
Wang, X.2
Chen, Y.3
Wang, Z.4
|