The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ASLR with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2016 (16) 2017-2022 (11)
Publication types (Num. hits)
article(5) inproceedings(22)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 17 occurrences of 17 keywords

Results
Found 27 publication records. Showing 27 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
79Thirumalaisamy Ragunathan, P. Krishna Reddy Improving the performance of read-only transactions through asynchronous speculation. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel processing, concurrency control, database systems, speculation, read-only transactions
79Vishal Kher, Yongdae Kim Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. Search on Bibsonomy SRDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
60Dmitry Evtyushkin, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh Jump over ASLR: Attacking branch predictors to bypass ASLR. Search on Bibsonomy MICRO The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
53Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 Breaking the memory secrecy assumption. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass
53Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh On the effectiveness of address-space randomization. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF address-space randomization, automated attacks, diversity
36Charlie Miller Mobile Attacks and Defense. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS
30Lan Luo, Xinhui Shao, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30DaeHee Jang Badaslr: Exceptional cases of ASLR aiding exploitation. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. Search on Bibsonomy ESORICS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. Search on Bibsonomy DSC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Daehee Jang BadASLR: Exceptional Cases of ASLR Aiding Exploitation. Search on Bibsonomy WISA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Alireza Khodamoradi, Kristof Denolf, Kees A. Vissers, Ryan Kastner ASLR: An Adaptive Scheduler for Learning Rate. Search on Bibsonomy IJCNN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Jestin Joy, Kannan Balakrishnan, M. Sreeraj SignQuiz: A Quiz Based Tool for Learning Fingerspelled Signs in Indian Sign Language Using ASLR. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. Search on Bibsonomy EuroS&P The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Vivek Parikh, Prabhaker Mateti ASLR and ROP Attack Mitigations for ARM-Based Android Devices. Search on Bibsonomy SSCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida ASLR on the Line: Practical Cache Attacks on the MMU. Search on Bibsonomy NDSS The full citation details ... 2017 DBLP  BibTeX  RDF
30Jonathan Ganz, Sean Peisert ASLR: How Robust Is the Randomness? Search on Bibsonomy SecDev The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. Search on Bibsonomy CCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes 0001 How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. Search on Bibsonomy NDSS The full citation details ... 2016 DBLP  BibTeX  RDF
30Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. Search on Bibsonomy CCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross CAIN: Silently Breaking ASLR in the Cloud. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
30Hector Marco-Gisbert, Ismael Ripoll On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows. Search on Bibsonomy NCA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee From Zygote to Morula: Fortifying Weakened ASLR on Android. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Mathias Payer, Thomas R. Gross String oriented programming: when ASLR is not enough. Search on Bibsonomy PPREW@POPL The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Ralf Hund, Carsten Willems, Thorsten Holz Practical Timing Side Channel Attacks Against Kernel Space ASLR. Search on Bibsonomy NDSS The full citation details ... 2013 DBLP  BibTeX  RDF
30Ralf Hund, Carsten Willems, Thorsten Holz Practical Timing Side Channel Attacks against Kernel Space ASLR. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30David J. Day, Zhengxu Zhao Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems. Search on Bibsonomy Int. J. Autom. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #27 of 27 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license