Title |
Conference |
Tags |
Nibbler: Debloating Binary Shared Libraries |
ACSAC2019-2019 - San Juan, Puerto Rico |
|
Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure |
IEEEEuropeanSymposiumS&P-2018 - London, United Kingdom |
|
BYPASSING CLANG'S SAFESTACK FOR FUN AND PROFIT |
BlackHatEU-2016 - London,uk |
|
Undermining Information Hiding (and What to Do about It) |
USENIX-2016 - austin,usa |
|
ShrinkWrap: VTable protection without loose ends |
ACSAC-2015 - los angeles,usa |
|
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines |
NDSS-2015 - san diego,usa |
|
Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard |
usenix-2014 - san diego,usa |
|
Out Of Control: Overcoming Control-Flow Integrity |
IEEE-2014 - SamJose,USA |
|
Exploiting Split Browsers for Efficiently Protecting User Data |
CCSW-2012 - Raleigh,USA |
|
kGuard: Lightweight Kernel Protection against Return-to-User Attacks |
USENIX-2012 - Washington, D.C. |
|
Ileak: A Lightweight System For Detecting Inadvertent Information Leaks
|
EC2ND-2010 - Germany |
Security
|