-
1
-
-
33646767376
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In ACM Conference on Computer and Communications Security (CCS), 2005.
-
(2005)
ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
78651539599
-
XFI: Software Guards for System Address Spaces
-
M. Abadi, M. Budiu, U. Erlingsson, G. C. Necula, and M. Vrable. XFI: Software Guards for System Address Spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2006.
-
(2006)
USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Necula, G. C.4
Vrable, M.5
-
3
-
-
50249149602
-
Preventing Memory Error Exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing Memory Error Exploits with WIT. IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
4
-
-
0006100649
-
Smashing the Stack for Fun and Profit
-
Aleph One. Smashing the Stack for Fun and Profit. Phrack Magazine, 49(14), 1996.
-
(1996)
Phrack Magazine
, vol.49
, Issue.14
-
-
One, Aleph1
-
5
-
-
84860095094
-
Once upon a free
-
Anonymous
-
Anonymous. Once upon a free. Phrack Magazine, 57(9), 2001.
-
(2001)
Phrack Magazine
, vol.57
, Issue.9
-
-
-
6
-
-
85180811408
-
-
Apple Inc. Manual Page of dyld - the dynamic link editor. http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man1/dyld.1.html, 2011.
-
(2011)
Manual Page of dyld - the dynamic link editor
-
-
-
9
-
-
26844531642
-
Basic Integer Overflows
-
blexim
-
blexim. Basic Integer Overflows. Phrack Magazine, 60(10), 2002.
-
(2002)
Phrack Magazine
, vol.60
, Issue.10
-
-
-
11
-
-
78650032454
-
Return-oriented Programming Without Returns
-
S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy. Return-oriented Programming Without Returns. In ACM Conference on Computer and Communications Security (CCS), 2010.
-
(2010)
ACM Conference on Computer and Communications Security (CCS)
-
-
Checkoway, S.1
Davi, L.2
Dmitrienko, A.3
Sadeghi, A.-R.4
Shacham, H.5
Winandy, M.6
-
13
-
-
85180751613
-
-
comex
-
comex. http://www.jailbreakme.com//#.
-
-
-
-
15
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
23
-
-
34748842480
-
Advances in Format String Exploitation
-
gera
-
gera. Advances in Format String Exploitation. Phrack Magazine, 59(12), 2002.
-
(2002)
Phrack Magazine
, vol.59
, Issue.12
-
-
-
24
-
-
85029681162
-
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
-
R. Hund, T. Holz, and F. C. Freiling. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security Symposium, 2009.
-
(2009)
USENIX Security Symposium
-
-
Hund, R.1
Holz, T.2
Freiling, F. C.3
-
25
-
-
78650002359
-
Fun and Games with Mac OS X and iPhone Payloads
-
V. Iozzo and C. Miller. Fun and Games with Mac OS X and iPhone Payloads. In Black Hat Europe, 2009.
-
(2009)
Black Hat Europe
-
-
Iozzo, V.1
Miller, C.2
-
26
-
-
84877972820
-
-
V. Iozzo and R.-P. Weinmann. PWN2OWN contest. http://blog.zynamics.com/2010/03/24/ralf-philipp-weinmann-vincenzo-iozzo-own-the-iphone-at-pwn2own/, 2010.
-
(2010)
PWN2OWN contest
-
-
Iozzo, V.1
Weinmann, R.-P.2
-
31
-
-
85180774515
-
-
Microsoft. The/SAFESEH compiler flag. http://msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx, 2011.
-
(2011)
The/SAFESEH compiler flag
-
-
-
34
-
-
3042642332
-
The Advanced return-into-lib(c) Exploits: PaX Case Study
-
Nergal. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 58(4), 2001.
-
(2001)
Phrack Magazine
, vol.58
, Issue.4
-
-
Nergal1
-
36
-
-
85072933898
-
Adapting Software Fault Isolation to Contemporary CPU Architectures
-
D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko, K. Schimpf, B. Yee, and B. Chen. Adapting Software Fault Isolation to Contemporary CPU Architectures. In USENIX Security Symposium, 2010.
-
(2010)
USENIX Security Symposium
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
37
-
-
77952351839
-
The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
-
H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In ACM Conference on Computer and Communications Security (CCS), 2007.
-
(2007)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
-
38
-
-
14844328033
-
On the Effectiveness of Address-space Randomization
-
H. Shacham, E. jin Goh, N. Modadugu, B. Pfaff, and D. Boneh. On the Effectiveness of Address-space Randomization. In ACM Conference on Computer and Communications Security (CCS), 2004.
-
(2004)
ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
jin Goh, E.2
Modadugu, N.3
Pfaff, B.4
Boneh, D.5
-
39
-
-
85180810478
-
return-to-libc" attack
-
Solar Designer. Bugtraq
-
Solar Designer. "return-to-libc" attack. Bugtraq, 1997.
-
(1997)
-
-
-
41
-
-
0027836576
-
Efficient Software-based Fault Isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient Software-based Fault Isolation. ACM SIGOPS Operating Systems Review, 27(5), 1993.
-
(1993)
ACM SIGOPS Operating Systems Review
, vol.27
, Issue.5
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T. E.3
Graham, S. L.4
-
42
-
-
77955212682
-
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
-
Z. Wang and X. Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Wang, Z.1
Jiang, X.2
-
46
-
-
69149106605
-
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A Sandbox for Portable, Untrusted x86 Native Code. IEEE Symposium on Security and Privacy, 2009.
-
(2009)
IEEE Symposium on Security and Privacy
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J. B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
48
-
-
85180816114
-
Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption
-
D. D. Zovi. Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption. In Black Hat USA, 2011.
-
(2011)
Black Hat USA
-
-
Zovi, D. D.1
|