Proftpd CVE 2006-5815
| [0009]
|
BROP Nginx exploit
| [0009]
|
Add infrastructure and support for Intel PT
| [0009]
|
Intel Processor Trace decoder library
| [0009]
|
Poking Holes
| [0009]
|
ApacheBench.
| [0009]
|
libdwarf' library
| [0009]
|
Control-flow Integrity
| [0009]
|
Control-flow integrity principles, implementations, and applications
| [0009]
|
You can run but you can't read: Preventing disclosure exploits in executable code
| [0009]
|
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
| [0009]
|
Timely rerandomization for mitigating memory disclosures
| [0009]
|
Hacking blind
| [0009]
|
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
| [0009]
|
Leakage-Resilient Layout Randomization for Mobile Devices
| [0009]
|
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries
| [0009]
|
Readactor: Practical code randomization resilient to memory disclosure
| [0009]
|
The performance cost of shadow stacks and stack canaries. In Proceedings of the 10th ACM Symposium on Information
| [0009]
|
Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation
| [0009]
|
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
| [0009]
|
Heap bounds protection with low fat pointers
| [0009]
|
Missing the point (er): On the effectiveness of code pointer integrity
| [0009]
|
Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding
| [0009]
|
Out of control: Overcoming control-flow integrity
| [0009]
|
Undermining information hiding (and what to do about it)
| [0009]
|
ASLR on the line: Practical cache attacks on the MMU
| [0009]
|
Data-oriented programming: On the expressiveness of non-control data attacks. In Security and Privacy (SP)
| [0009]
|
Intel. Processor Tracing.
| [0009]
|
Breaking Kernel Address Space Layout Randomization with Intel TSX
| [0009]
|
Towards Automated Discovery of Crash-Resistant Primitives in Binaries
| [0009]
|
No Need to Hide: Protecting Safe Regions on Commodity Hardware
| [0009]
|
Code-pointer integrity
| [0009]
|
Poster: Getting the point (er): On the feasibility of attacks on code-pointer integrity
| [0009]
|
LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation
| [0009]
|
ASLR-Guard: Stopping address space leakage for code reuse attacks
| [0009]
|
Cryptographically enforced control flow integrity
| [0009]
|
Opaque Control-Flow Integrity
| [0009]
|
SoftBound: Highly compatible and complete spatial memory safety for C
| [0009]
|
CETS: Compiler Enforced Temporal Safety for C
| [0009]
|
Poking holes in information hiding
| [0009]
|
Return-oriented programming
| [0009]
|
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
| [0009]
|
Information leaks without memory disclosures: Remote side channel attacks on diversified code
| [0009]
|
AddressSanitizer: a fast address sanity checker
| [0009]
|
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
| [0009]
|
Heisenbyte: Thwarting memory disclosure attacks using destructive code reads
| [0009]
|
Enforcing forward-edge control- flow integrity in GCC & LLVM
| [0009]
|
Practical Context- Sensitive CFI
| [0009]
|
Efficient software-based fault isolation
| [0009]
|
Practical control flow integrity and randomization for binary executables
| [0009]
|
Control flow integrity for COTS binaries
| [0009]
|