Abstract  Description  Claims  Drawing  Search report  Cited references 

Proftpd CVE 2006-5815   [0009] 
BROP Nginx exploit   [0009] 
Add infrastructure and support for Intel PT   [0009] 
Intel Processor Trace decoder library   [0009] 
Poking Holes   [0009] 
ApacheBench.   [0009] 
libdwarf' library   [0009] 
Control-flow Integrity   [0009] 
Control-flow integrity principles, implementations, and applications   [0009] 
You can run but you can't read: Preventing disclosure exploits in executable code   [0009] 
Oxymoron: Making fine-grained memory randomization practical by allowing code sharing   [0009] 
Timely rerandomization for mitigating memory disclosures   [0009] 
Hacking blind   [0009] 
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector   [0009] 
Leakage-Resilient Layout Randomization for Mobile Devices   [0009] 
StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries   [0009] 
Readactor: Practical code randomization resilient to memory disclosure   [0009] 
The performance cost of shadow stacks and stack canaries. In Proceedings of the 10th ACM Symposium on Information   [0009] 
Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation   [0009] 
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming   [0009] 
Heap bounds protection with low fat pointers   [0009] 
Missing the point (er): On the effectiveness of code pointer integrity   [0009] 
Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding   [0009] 
Out of control: Overcoming control-flow integrity   [0009] 
Undermining information hiding (and what to do about it)   [0009] 
ASLR on the line: Practical cache attacks on the MMU   [0009] 
Data-oriented programming: On the expressiveness of non-control data attacks. In Security and Privacy (SP)   [0009] 
Intel. Processor Tracing.   [0009] 
Breaking Kernel Address Space Layout Randomization with Intel TSX   [0009] 
Towards Automated Discovery of Crash-Resistant Primitives in Binaries   [0009] 
No Need to Hide: Protecting Safe Regions on Commodity Hardware   [0009] 
Code-pointer integrity   [0009] 
Poster: Getting the point (er): On the feasibility of attacks on code-pointer integrity   [0009] 
LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation   [0009] 
ASLR-Guard: Stopping address space leakage for code reuse attacks   [0009] 
Cryptographically enforced control flow integrity   [0009] 
Opaque Control-Flow Integrity   [0009] 
SoftBound: Highly compatible and complete spatial memory safety for C   [0009] 
CETS: Compiler Enforced Temporal Safety for C   [0009] 
Poking holes in information hiding   [0009] 
Return-oriented programming   [0009] 
Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity   [0009] 
Information leaks without memory disclosures: Remote side channel attacks on diversified code   [0009] 
AddressSanitizer: a fast address sanity checker   [0009] 
Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization   [0009] 
Heisenbyte: Thwarting memory disclosure attacks using destructive code reads   [0009] 
Enforcing forward-edge control- flow integrity in GCC & LLVM   [0009] 
Practical Context- Sensitive CFI   [0009] 
Efficient software-based fault isolation   [0009] 
Practical control flow integrity and randomization for binary executables   [0009] 
Control flow integrity for COTS binaries   [0009]