|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 17 keywords
|
|
|
Results
Found 27 publication records. Showing 27 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Thirumalaisamy Ragunathan, P. Krishna Reddy |
Improving the performance of read-only transactions through asynchronous speculation. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
parallel processing, concurrency control, database systems, speculation, read-only transactions |
79 | Vishal Kher, Yongdae Kim |
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. |
SRDS |
2007 |
DBLP DOI BibTeX RDF |
|
60 | Dmitry Evtyushkin, Dmitry V. Ponomarev, Nael B. Abu-Ghazaleh |
Jump over ASLR: Attacking branch predictors to bypass ASLR. |
MICRO |
2016 |
DBLP DOI BibTeX RDF |
|
53 | Raoul Strackx, Yves Younan, Pieter Philippaerts, Frank Piessens, Sven Lachmund, Thomas Walter 0001 |
Breaking the memory secrecy assumption. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
buffer overread, probabilistic countermeasure, buffer overflow, systems security, bypass |
53 | Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh |
On the effectiveness of address-space randomization. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
address-space randomization, automated attacks, diversity |
36 | Charlie Miller |
Mobile Attacks and Defense. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS |
30 | Lan Luo, Xinhui Shao, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu |
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | DaeHee Jang |
Badaslr: Exceptional cases of ASLR aiding exploitation. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu |
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. |
ESORICS (2) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Wei-Loon Mow, Shih-Kun Huang, Hsu-Chun Hsiao |
LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR. |
DSC |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Daehee Jang |
BadASLR: Exceptional Cases of ASLR Aiding Exploitation. |
WISA |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Alireza Khodamoradi, Kristof Denolf, Kees A. Vissers, Ryan Kastner |
ASLR: An Adaptive Scheduler for Learning Rate. |
IJCNN |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Jestin Joy, Kannan Balakrishnan, M. Sreeraj |
SignQuiz: A Quiz Based Tool for Learning Fingerspelled Signs in Indian Sign Language Using ASLR. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida |
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. |
EuroS&P |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Vivek Parikh, Prabhaker Mateti |
ASLR and ROP Attack Mitigations for ARM-Based Android Devices. |
SSCC |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida |
ASLR on the Line: Practical Cache Attacks on the MMU. |
NDSS |
2017 |
DBLP BibTeX RDF |
|
30 | Jonathan Ganz, Sean Peisert |
ASLR: How Robust Is the Randomness? |
SecDev |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard |
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Kangjie Lu, Wenke Lee, Stefan Nürnberger, Michael Backes 0001 |
How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. |
NDSS |
2016 |
DBLP BibTeX RDF |
|
30 | Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, Wenke Lee |
ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross |
CAIN: Silently Breaking ASLR in the Cloud. |
WOOT |
2015 |
DBLP BibTeX RDF |
|
30 | Hector Marco-Gisbert, Ismael Ripoll |
On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows. |
NCA |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Byoungyoung Lee, Long Lu, Tielei Wang, Taesoo Kim, Wenke Lee |
From Zygote to Morula: Fortifying Weakened ASLR on Android. |
IEEE Symposium on Security and Privacy |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Mathias Payer, Thomas R. Gross |
String oriented programming: when ASLR is not enough. |
PPREW@POPL |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Ralf Hund, Carsten Willems, Thorsten Holz |
Practical Timing Side Channel Attacks Against Kernel Space ASLR. |
NDSS |
2013 |
DBLP BibTeX RDF |
|
30 | Ralf Hund, Carsten Willems, Thorsten Holz |
Practical Timing Side Channel Attacks against Kernel Space ASLR. |
IEEE Symposium on Security and Privacy |
2013 |
DBLP DOI BibTeX RDF |
|
30 | David J. Day, Zhengxu Zhao |
Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems. |
Int. J. Autom. Comput. |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #27 of 27 (100 per page; Change: )
|
|