Towards Efficient Heap Overflow Discovery
暂无分享,去创建一个
[1] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[2] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[3] Arash Baratloo,et al. Libsafe: Protecting Critical Elements of Stacks , 2003 .
[4] Jean-Yves Marion,et al. Aligot: cryptographic function identification in obfuscated binary programs , 2012, CCS.
[5] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[6] Wouter Joosen,et al. HeapSentry: Kernel-Assisted Protection against Heap Overflows , 2013, DIMVA.
[7] Emery D. Berger,et al. DieHarder: securing the heap , 2010, CCS '10.
[8] Antonio González,et al. Control speculation in multithreaded processors through dynamic loop detection , 1998, Proceedings 1998 Fourth International Symposium on High-Performance Computer Architecture.
[9] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[10] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Herbert Bos,et al. The BORG: Nanoprobing Binaries for Buffer Overreads , 2015, CODASPY.
[12] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[13] Eric Lahtinen,et al. Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement , 2015, ASPLOS.
[14] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[15] Xavier Allamigeon,et al. Static analysis by abstract interpretation: application to the detection of heap overflows , 2008, Journal in Computer Virology.
[16] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[17] Xi Chen,et al. StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries , 2015, NDSS.
[18] Jiang Ming,et al. Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[19] Xiangyu Zhang,et al. Convicting exploitable software vulnerabilities: An efficient input provenance based approach , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[20] Xi Chen,et al. Who allocated my memory? Detecting custom memory allocators in C binaries , 2013, 2013 20th Working Conference on Reverse Engineering (WCRE).
[21] Zhi Wang,et al. Xede: Practical Exploit Early Detection , 2015, RAID.
[22] Charlie Miller,et al. Engineering Heap Overflow Exploits with JavaScript , 2008, WOOT.
[23] Juan Caballero,et al. Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities , 2012, ISSTA 2012.
[24] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[25] Wolfgang Küchlin,et al. Integrated Static Analysis for Linux Device Driver Verification , 2007, IFM.
[26] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[27] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[28] Christopher Krügel,et al. Ramblr: Making Reassembly Great Again , 2017, NDSS.
[29] Brendan Dolan-Gavitt,et al. Tappan Zee (north) bridge: mining memory accesses for introspection , 2013, CCS.
[30] Fan Long,et al. Sound input filter generation for integer overflow errors , 2014, POPL.
[31] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[32] Peng Liu,et al. HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[33] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[34] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[35] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[36] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[37] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[38] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[39] Roland H. C. Yap,et al. Stack Bounds Protection with Low Fat Pointers , 2017, NDSS.
[40] Roland H. C. Yap,et al. Heap bounds protection with low fat pointers , 2016, CC.
[41] Ravishankar K. Iyer,et al. Security Vulnerabilities: From Analysis to Detection and Masking Techniques , 2006, Proceedings of the IEEE.
[42] David Brumley,et al. Program-Adaptive Mutational Fuzzing , 2015, 2015 IEEE Symposium on Security and Privacy.
[43] Marie-Laure Potet,et al. Statically detecting use after free on binary code , 2014, Journal of Computer Virology and Hacking Techniques.
[44] Chao Zhang,et al. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time , 2010, ESORICS.
[45] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.