CONTROL FLOW INTEGRITY PRINCIPLES IMPLEMENTATIONS AND APPLICATIONS ACM

Mar 30, 14
Other articles:
  • www.hindawi.com/journals/isrn.software.engineering/2013/. /ref/‎CachedFeb 17, 2013 . View at Scopus; R. Gold, “Control flow graphs and code coverage,” . . integrity
  • www.avantssar.eu/sectest2011/pdfs/Diatchki.pdf‎CachedSimilarAbstract—Control-flow integrity (CFI) checks ensure that pro- grams respect . .
  • www.csc.ncsu.edu/faculty/jiang/pubs/ACSAC11_CFL.pdf‎CachedSimilarDec 5, 2011 . control flow integrity with a small performance overhead. Specifically . . natural
  • www.bibsonomy.org/bibtex/. /dblp‎CachedControl-flow integrity principles, implementations, and applications. Martín Abadi
  • www.computer.org/csdl/trans/tq/2010/03/ttq2010030255-abs.html[1] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, "Control-Flow Integrity:
  • https://www.signup4.net/Upload/. /1020-1045_Lee%20Pike.pdf‎CachedSimilarControl-flow integrity: principles, implementations, and applications. ACM
  • link.springer.com/chapter/10.1007%2F978-3-642-34210-3_8‎SimilarDespite the large number of proposed countermeasures against control-flow . U.
  • budiu.info/work/‎CachedSimilarA particularly exciting application is training the real-time body .
  • techdigest.jhuapl.edu/TD/td3202/32_02-Grizzard.pdf‎Cachedeach control-flow transfer of a program does not diverge . control- flow integrity,
  • ftp.math.utah.edu/pub/tex/bib/toc/tissec.html‎CachedMar 13, 2014 . Table of contents for issues of ACM Transactions on Information and . . Control-
  • sva.cs.illinois.edu/menagerie/other.htmlInformation flow, randomization, and canaries have also been used to detect
  • www.cs.umd.edu/class/spring2014/cmsc838g/list.txt‎Cached. Control-flow integrity: principles, implementations, and applications http://dl.
  • www.cs.rutgers.edu/~vinodg/teaching/spring-2009. /reading.html‎CachedCommunications of the ACM, Volume 27, Issue 8, August 1984.
  • waset.org/Publications/reductions-of-control-flow-graphs/9997636‎CachedControl- ´ flow integrity principles, implementations, and applications. ACM
  • www.informatik.uni-trier.de/~ley/pers/hd/a/Abadi:Mart=iacute=n‎CachedSimilarMartín Abadi, Steve Kremer (Eds.): Principles of Security and Trust - Third . .. Jay
  • www.cs.cornell.edu/andru/pldi06-tutorial/bibliography.html‎Cached26th ACM Symposium on Principles of Programming Languages (POPL), pages
  • www.deepdyve.com/. /association-for-computing-machinery/control-flow- integrity-principles-implementations-and-applications-0Z3EJQref5‎CachedControl-flow integrity principles, implementations, and applications . ACM
  • www.informatik.tu-darmstadt.de/fileadmin/. /2011-poster-cfi.pdf‎CachedSimilarOct 21, 2011 . Control-Flow Integrity: Principles, Implementations, and Applications. In ACM
  • dl.acm.org/citation.cfm?id=1102165‎SimilarThe enforcement of a basic safety property, Control-Flow Integrity (CFI), can . .
  • ipads.se.sjtu.edu.cn/lib/exe/fetch.php?media=publications:cfimon. ‎CachedSimilarabout a variety of attacks violating control flow integrity without any changes to
  • users.soe.ucsc.edu/~abadi/Papers/cfi-tissec-revised.pdf‎CachedPrinciples, Implementations, and Applications . forcement of a basic safety
  • www.erdemaktas.com/files/erdem_acm.pdf‎Cached“Control-flow integrity principles, implementations, and applications”, ACM
  • research.microsoft.com/pubs/64250/ccs05.pdf‎CachedControl-Flow Integrity. Principles, Implementations, and Applications . Control-
  • seclab.cs.sunysb.edu/seclab/pubs/usenix13.pdf‎CachedControl-Flow Integrity (CFI) has been recognized as an important low-level
  • sprout.ics.uci.edu/projects/attestation/papers/date.pdf‎CachedREFERENCES. [1] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow
  • www.cse.usf.edu/~ligatti/CV.pdf‎CachedBest-paper award at the 2007 ACM SIGPLAN Conference on Programming . [3]
  • www.utdallas.edu/~hamlen/cs6301fa13.html‎CachedACM Transactions on Information and System Security, 3(1):30-50, 2000. .
  • citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.364. ‎CachedExisting solutions that monitor control flow either have large overhead or high
  • lists.cs.uiuc.edu/pipermail/llvm-commits/Week-of-Mon. /113893.htmlDec 16, 2010 . . on other techniques (such as taint tracking and control-flow integrity). . + <b> +
  • research.microsoft.com/apps/pubs/?id=69217‎CachedControl-Flow Integrity - Principles, Implementations, and Applications .
  • https://www.zotero.org/groups/llvm-cfi/items/. /U9KNHCVP‎CachedControl-flow integrity principles, implementations, and applications . Publication,
  • en.wikipedia.org/wiki/Return-oriented_programming‎CachedSimilarAn attacker gains control of the call stack to hijack program control flow and then
  • www.mecs-press.org/ijwmt/ijwmt-v2-n3/v2n3-6.html‎Cachedprogram behavior; branch decision-making variable; control flow; . J.Ligatti, “
  • https://www.cs.indiana.edu/~lepike/pubs/diatchki-sectest2011.pdf‎CachedAbstract—Control-flow integrity (CFI) checks ensure that pro- grams respect . .
  • https://www.usenix.org/system/files/login/. /105516-Schwartz.pdf‎CachedSimilarin this article, we are referring to a control flow hijack exploit . Control flow . ..
  • www.cse.lehigh.edu/~gtan/paper/cfiDataSandboxing.pdf‎CachedSimilar[2] M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity
  • www.acsac.org/2011/openconf/. /request.php?. oc. ‎CachedSimilarDec 9, 2011 . Exploit a software vul. to redirect control flow . towards finer and finer control
  • www.ru.is/faculty/ulfar/‎CachedSimilarPC member, EuroSys 2009, the ACM European Conference on Computer
  • In: Proceedings of the ACM Conference on Computer and Communications
  • scholar.google.com/citations?user=vWTI60AAAAAJPrincipal Researcher, Microsoft Corporation, and Professor Emeritus, UC Santa Cruz - Verified email at microsoft.comProceedings of the 4th ACM conference on Computer and communications .
  • https://lirias.kuleuven.be/bitstream/. /1/safety-in-numbers.pdf‎CachedReferences. 1. Martın Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti.
  • cseweb.ucsd.edu/classes/wi13/cse227-a/syllabus.html‎CachedSimilarJan 7, 2013 . Jan 16, Software Defenses (Levchenko): “Control-Flow Integrity: Principles,
  • www.scirp.org/journal/PaperInformation.aspx?paperID=43654‎CachedACSAC '06 Proceedings of the 22nd Annual Computer Security Applications
  • Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-Flow Integrity: Principles,
  • www.citeulike.org/user/lispler/article/8210525‎CachedMart\'ın Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti. ACM Trans. Inf. Syst.
  • scholar.google.com/citations?user=xmQREcEAAAAJ&hl=enUniversity of South Florida - Verified email at cse.usf.eduProceedings of the 12th ACM conference on Computer and communications .
  • dl.acm.org/citation.cfm?id=1609960‎SimilarControl-flow integrity principles, implementations, and applications . The
  • https://www.cs.jhu.edu/~s/musings/rop.html‎CachedOct 8, 2013 . When a user application calls into the kernel, the kernel will check that the .
  • citeseer.uark.edu:8080/citeseerx/showciting;jsessionid. ?cid. ‎Cached. documents that cite the following paper: Mihai Budiu, Ulfar Erlingsson, and Jay
  • https://www.nae.edu/. /UnifyingDisparateToolsinSoftwareSecurity.aspx‎CachedFurthermore, the more we rely on software to control critical systems, from

  • Sitemap