|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 17 keywords
|
|
|
Results
Found 27 publication records. Showing 27 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Thirumalaisamy Ragunathan, P. Krishna Reddy |
Improving the performance of read-only transactions through asynchronous speculation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2008 Spring Simulation Multiconference, SpringSim 2008, Ottawa, Canada, April 14-17, 2008, pp. 467-474, 2008, SCS/ACM, 1-56555-319-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
parallel processing, concurrency control, database systems, speculation, read-only transactions |
79 | Vishal Kher, Yongdae Kim |
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), Beijing, China, October 10-12, 2007, pp. 55-64, 2007, IEEE Computer Society, 0-7695-2995-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Dmitry Evtyushkin, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh |
Jump over ASLR: Attacking branch predictors to bypass ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 49th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO 2016, Taipei, Taiwan, October 15-19, 2016, pp. 40:1-40:13, 2016, IEEE Computer Society, 978-1-5090-3508-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
53 | Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Breaking the memory secrecy assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Second European Workshop on System Security, EUROSEC 2009, Nuremburg, Germany, March 31, 2009, pp. 1-8, 2009, ACM, 978-1-60558-472-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass |
53 | Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh |
On the effectiveness of address-space randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 298-307, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
address-space randomization, automated attacks, diversity |
36 | Charlie Miller |
Mobile Attacks and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 68-70, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS |
30 | Lan Luo, Xinhui Shao, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu |
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(18), pp. 17120-17135, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | DaeHee Jang |
Badaslr: Exceptional cases of ASLR aiding exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 112, pp. 102510, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu |
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II, pp. 531-548, 2022, Springer, 978-3-031-17145-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao |
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2022, Edinburgh, UK, June 22-24, 2022, pp. 1-8, 2022, IEEE, 978-1-6654-2141-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Daehee Jang |
BadASLR: Exceptional Cases of ASLR Aiding Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications - 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers, pp. 278-289, 2021, Springer, 978-3-030-89431-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Alireza Khodamoradi, Kristof Denolf, Kees A. Vissers, Ryan Kastner |
ASLR: An Adaptive Scheduler for Learning Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: International Joint Conference on Neural Networks, IJCNN 2021, Shenzhen, China, July 18-22, 2021, pp. 1-8, 2021, IEEE, 978-1-6654-3900-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Jestin Joy, Kannan Balakrishnan, M. Sreeraj |
SignQuiz: A Quiz Based Tool for Learning Fingerspelled Signs in Indian Sign Language Using ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 28363-28371, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida |
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018, pp. 227-242, 2018, IEEE, 978-1-5386-4228-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Vivek Parikh, Prabhaker Mateti |
ASLR and ROP Attack Mitigations for ARM-Based Android Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - 5th International Symposium, SSCC 2017, Manipal, India, September 13-16, 2017, Proceedings, pp. 350-363, 2017, Springer, 978-981-10-6897-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida |
ASLR on the Line: Practical Cache Attacks on the MMU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017, 2017, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
30 | Jonathan Ganz, Sean Peisert |
ASLR: How Robust Is the Randomness? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Cybersecurity Development, SecDev 2017, Cambridge, MA, USA, September 24-26, 2017, pp. 34-41, 2017, IEEE Computer Society, 978-1-5386-3467-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard |
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 368-379, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes 0001 |
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016, 2016, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
30 | Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee |
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015, pp. 280-291, 2015, ACM, 978-1-4503-3832-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross |
CAIN: Silently Breaking ASLR in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOOT ![In: 9th USENIX Workshop on Offensive Technologies, WOOT '15, Washington, DC, USA, August 10-11, 2015., 2015, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
30 | Hector Marco-Gisbert, Ismael Ripoll |
On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 2014 IEEE 13th International Symposium on Network Computing and Applications, NCA 2014, Cambridge, MA, USA, 21-23 August, 2014, pp. 145-152, 2014, IEEE Computer Society, 978-1-4799-5392-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee |
From Zygote to Morula: Fortifying Weakened ASLR on Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, pp. 424-439, 2014, IEEE Computer Society, 978-1-4799-4686-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Mathias Payer, Thomas R. Gross |
String oriented programming: when ASLR is not enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPREW@POPL ![In: Proceedings of the 2nd ACM SIGPLAN Program Protection and Reverse Engineering Workshop 2013, PPREW@POPL 2013, January 26, 2013, Rome, Italy, pp. 2:1-2:9, 2013, ACM, 978-1-4503-1857-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Ralf Hund, Carsten Willems, Thorsten Holz |
Practical Timing Side Channel Attacks Against Kernel Space ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
30 | Ralf Hund, Carsten Willems, Thorsten Holz |
Practical Timing Side Channel Attacks against Kernel Space ASLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pp. 191-205, 2013, IEEE Computer Society, 978-1-4673-6166-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
30 | David J. Day, Zhengxu Zhao |
Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Autom. Comput. ![In: Int. J. Autom. Comput. 8(4), pp. 472-483, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #27 of 27 (100 per page; Change: )
|
|