|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9 occurrences of 8 keywords
|
|
|
Results
Found 5 publication records. Showing 5 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
150 | Hovav Shacham |
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). |
CCS |
2007 |
DBLP DOI BibTeX RDF |
return-into-libc, instruction set, turing completeness |
136 | Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong |
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set |
65 | Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage |
When good instructions go bad: generalizing return-oriented programming to RISC. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
return-into-libc, return-oriented programming, RISC, SPARC |
65 | Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh |
Scalable network-based buffer overflow attack detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks |
55 | Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning |
On the Expressiveness of Return-into-libc Attacks. |
RAID |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #5 of 5 (100 per page; Change: )
|
|