Search

Your search keyword '"Address space layout randomization"' showing total 130 results

Search Constraints

Start Over You searched for: Descriptor "Address space layout randomization" Remove constraint Descriptor: "Address space layout randomization"
130 results on '"Address space layout randomization"'

Search Results

1. BadASLR: Exceptional Cases of ASLR Aiding Exploitation

2. ASLR: How Robust is the Randomness?

3. ASLR机制脆弱性自动分析方法.

4. A Static Recognition Mechanism for Indirect Call Based on Static Single Assignment

5. Securely Sharing Randomized Code That Flies

6. Fine-Grained Address Space Layout Randomization on Program Load.

7. Exploit detection based on illegal control flow transfers identification

8. Mitigation of Kernel Memory Corruption Using Multiple Kernel Memory Mechanism

9. Stopping Memory Disclosures via Diversification and Replicated Execution

10. PageDumper: a mechanism to collect page table manipulation information at run-time

11. MKM: Multiple Kernel Memory for Protecting Page Table Switching Mechanism Against Memory Corruption

12. Address Space Layout Randomization Comparative Analysis on Windows 10 and Ubuntu 18.04 LTS

13. ARG: Automatic ROP Chains Generation

14. Exploiting stack-based buffer overflow using modern day techniques

15. An Automatic Evaluation Approach for Binary Software Vulnerabilities with Address Space Layout Randomization Enabled

16. Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time

17. Measurable and Deployable Security

18. BadASLR: Exceptional Cases of ASLR Aiding Exploitation

19. Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP

20. Saffire: Context-sensitive Function Specialization against Code Reuse Attacks

21. A Review of Memory Errors Exploitation in x86-64

22. MARDU

23. Lightweight and Seamless Memory Randomization for Mission-Critical Services in a Cloud Platform

24. KASLR-MT: kernel address space layout randomization for multi-tenant cloud systems

25. TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs

26. Badaslr: Exceptional cases of ASLR aiding exploitation

27. Fine-grained address space layout randomization on program load

28. Leveraging relocations in ELF-binaries for Linux kernel version identification

29. BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation

30. Breaking KASLR Using Memory Deduplication in Virtualized Environments

31. ReRanz

32. Sleak

33. Different is Good

34. Mitigating Reverse Engineering Attacks on Deep Neural Networks

35. Research on Security Protection of Network Based on Address Layout Randomization from the Perspective of Attackers

36. KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism

37. How Kernel Randomization is Canceling Memory Deduplication in Cloud Computing Systems

38. Automatic Exploit Generation for Buffer Overflow Vulnerabilities

39. Compiler-Assisted Code Randomization

40. Function-Oriented Programming: A New Class of Code Reuse Attack in C Applications

41. Multi-variant execution environments

42. Diversity and information leaks

43. FRProtector: Defeating Control Flow Hijacking Through Function-Level Randomization and Transfer Protection

44. Improvement of Runtime Intrusion Prevention Evaluator (RIPE)

45. Dynamic Loader Oriented Programming on Linux

46. ASLR: How Robust Is the Randomness?

47. Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables

48. NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64

49. HAIT: Heap Analyzer with Input Tracing

50. SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs

Catalog

Books, media, physical & digital resources