Control-flow integrity

Results: 54



#Item
12013 IEEE Symposium on Security and Privacy  Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

2013 IEEE Symposium on Security and Privacy Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,

Add to Reading List

Source URL: seclab.cs.sunysb.edu

Language: English - Date: 2016-02-03 15:00:11
    2ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

    ASLR: How Robust is the Randomness? Jonathan Ganz What is Address Space Layout Randomization? ● Provides System-Level Control-Flow Integrity

    Add to Reading List

    Source URL: s3.amazonaws.com

    Language: English - Date: 2017-09-25 15:39:32
      3CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau  Dan Boneh

      CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau Dan Boneh

      Add to Reading List

      Source URL: iot.stanford.edu

      Language: English - Date: 2015-11-12 17:49:16
        4Code-Pointer Integrity Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song Control-Flow Hijack Attack Memory

        Code-Pointer Integrity Volodymyr Kuznetsov, László Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song Control-Flow Hijack Attack Memory

        Add to Reading List

        Source URL: dslab.epfl.ch

        Language: English - Date: 2018-08-14 09:29:23
          5A  Control-Flow Integrity: Precision, Security, and Performance Nathan Burow, Purdue University Scott A. Carr, Purdue University

          A Control-Flow Integrity: Precision, Security, and Performance Nathan Burow, Purdue University Scott A. Carr, Purdue University

          Add to Reading List

          Source URL: nebelwelt.net

          Language: English - Date: 2018-08-13 04:41:49
            6Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1  Purdue University

            Fine-Grained Control-Flow Integrity through Binary Hardening Mathias Payer1 , Antonio Barresi2 , and Thomas R. Gross2 1 Purdue University

            Add to Reading List

            Source URL: nebelwelt.net

            Language: English - Date: 2018-08-13 04:44:10
              7Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley  Antonio Barresi

              Control-Flow Bending: On the Effectiveness of Control-Flow Integrity Nicolas Carlini UC Berkeley Antonio Barresi

              Add to Reading List

              Source URL: nebelwelt.net

              Language: English - Date: 2018-08-13 04:44:10
                8Taming Transactions: Towards Hardware-Assisted Control Flow Integrity using Transactional Memory Marius Muench1 , Fabio Pagani1 , Yan Shoshitaishvili2 , Christopher Kruegel2 , Giovanni Vigna2 , and Davide Balzarotti1 1 2

                Taming Transactions: Towards Hardware-Assisted Control Flow Integrity using Transactional Memory Marius Muench1 , Fabio Pagani1 , Yan Shoshitaishvili2 , Christopher Kruegel2 , Giovanni Vigna2 , and Davide Balzarotti1 1 2

                Add to Reading List

                Source URL: www.s3.eurecom.fr

                - Date: 2016-09-16 13:32:57
                  9Control-Flow Integrity: Precision, Security, and Performance Nathan Burow∗ , Scott Carr∗ , Stefan Brunthaler† , Mathias Payer∗ , Joseph Nash† , Per Larsen† , Michael Franz† arXiv:1602.04056v1 [cs.CR] 12 Feb

                  Control-Flow Integrity: Precision, Security, and Performance Nathan Burow∗ , Scott Carr∗ , Stefan Brunthaler† , Mathias Payer∗ , Joseph Nash† , Per Larsen† , Michael Franz† arXiv:1602.04056v1 [cs.CR] 12 Feb

                  Add to Reading List

                  Source URL: arxiv.org

                  - Date: 2016-02-14 20:56:28
                    102015 IEEE Trustcom/BigDataSE/ISPA  Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses  Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng

                    2015 IEEE Trustcom/BigDataSE/ISPA Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses Bingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng

                    Add to Reading List

                    Source URL: www.sec.in.tum.de

                    Language: English - Date: 2016-04-22 03:46:05