八、学术篇

8.1 The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)chevron-right8.2 Return-Oriented Programming without Returnschevron-right8.3 Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanismschevron-right8.4 ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attackschevron-right8.5 Data-Oriented Programming: On the Expressiveness of Non-Control Data Attackschevron-right8.7 What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenseschevron-right8.9 Symbolic Execution for Software Testing: Three Decades Laterchevron-right8.10 AEG: Automatic Exploit Generationchevron-right8.11 Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Softwachevron-right8.13 New Frontiers of Reverse Engineeringchevron-right8.14 Who Allocated My Memory? Detecting Custom Memory Allocators in C Binarieschevron-right8.21 Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attackschevron-right8.22 Practical Memory Checking With Dr. Memorychevron-right8.23 Evaluating the Effectiveness of Current Anti-ROP Defenseschevron-right8.24 How to Make ASLR Win the Clone Wars: Runtime Re-Randomizationchevron-right8.25 (State of) The Art of War: Offensive Techniques in Binary Analysischevron-right8.26 Driller: Augmenting Fuzzing Through Selective Symbolic Executionchevron-right8.27 Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmwarechevron-right8.28 Cross-Architecture Bug Search in Binary Executableschevron-right8.29 Dynamic Hooks: Hiding Control Flow Changes within Non-Control Datachevron-right8.30 Preventing brute force attacks against stack canary protection on networking serverschevron-right8.33 Under-Constrained Symbolic Execution: Correctness Checking for Real Codechevron-right8.34 Enhancing Symbolic Execution with Veritestingchevron-right8.38 TaintEraser: Protecting Sensitive Data Leaks Using Application-Level Taint Trackingchevron-right8.39 DART: Directed Automated Random Testingchevron-right8.40 EXE: Automatically Generating Inputs of Deathchevron-right8.41 IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Timechevron-right8.42 Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploitschevron-right8.43 DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagationchevron-right8.44 Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristicschevron-right8.45 Ramblr: Making Reassembly Great Againchevron-right8.46 FreeGuard: A Faster Secure Heap Allocatorchevron-right8.48 Reassembleable Disassemblingchevron-right

Was this helpful?