Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Asia Slowinska"'
Publikováno v:
DSN
Parallax is a novel self-contained code integrity verification approach, that protects instructions by overlapping Return-Oriented Programming (ROP) gadgets with them. Our technique implicitly verifies integrity by translating selected code (verifica
Publikováno v:
EuroSys
Portokalidis, G, Slowinska, A & Bos, H 2006, ' Argos : An Emulator for Fingerprinting Zero-Day Attacks for advertised honeypots with automatic signature generation ', Operating Systems Review (ACM), vol. 40, no. 4, pp. 15-27 . https://doi.org/10.1145/1218063.1217938
Operating Systems Review (ACM), 40(4), 15-27. Association for Computing Machinery (ACM)
Portokalidis, G, Slowinska, A & Bos, H 2006, ' Argos : An Emulator for Fingerprinting Zero-Day Attacks for advertised honeypots with automatic signature generation ', Operating Systems Review (ACM), vol. 40, no. 4, pp. 15-27 . https://doi.org/10.1145/1218063.1217938
Operating Systems Review (ACM), 40(4), 15-27. Association for Computing Machinery (ACM)
As modern operating systems and software become larger and more complex, they are more likely to contain bugs, which may allow attackers to gain illegitimate access. A fast and reliable mechanism to discern and generate vaccines for such attacks is v
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783319085081
Many software vendors use data obfuscation to make it hard for reverse engineers to recover the layout, value and meaning of the variables in a program. The research question in this paper is whether the state-of-the-art data obfuscations techniques
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::96035899114bb1a13c9277505972607d
https://doi.org/10.1007/978-3-319-08509-8_1
https://doi.org/10.1007/978-3-319-08509-8_1
Publikováno v:
Haller, I, Slowinska, A & Bos, H 2013, MemPick : A tool for data structure detection . in Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013 ., 6671327, pp. 479-480, 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, 14/10/13 . https://doi.org/10.1109/WCRE.2013.6671327
WCRE
Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013, 479-480
STARTPAGE=479;ENDPAGE=480;TITLE=Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013
WCRE
Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013, 479-480
STARTPAGE=479;ENDPAGE=480;TITLE=Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013
Most current techniques for data structure reverse engineering are limited to low-level programing constructs, such as individual variables or structs. In practice, pointer networks connect some of these constructs, to form higher level entities like
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::39083b88e5b08447ea332e1573a583b6
https://research.vu.nl/en/publications/00202a41-3a90-4911-818b-8d6acfae95eb
https://research.vu.nl/en/publications/00202a41-3a90-4911-818b-8d6acfae95eb
Autor:
Xi Chen Asia Slowinska Her
Publikováno v:
Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries.
Publikováno v:
MemPick: data structure detection in C/C++ binaries.
Publikováno v:
WCRE
Many existing techniques for reversing data structures in C/C++ binaries are limited to low-level programming constructs, such as individual variables or structs. Unfortunately, without detailed information about a program's pointer structures, foren
Publikováno v:
WCRE
Vrije Universiteit Amsterdam
Bos, H J, Slowinska, J M & Chen, X 2013, Who allocated my memory? Detecting custom memory allocators in C binaries . in Proceedings of the 20th Working Conference on Reverse Engineering (WCRE) . Koblenz, Germany .
Proceedings of the 20th Working Conference on Reverse Engineering (WCRE)
Vrije Universiteit Amsterdam
Bos, H J, Slowinska, J M & Chen, X 2013, Who allocated my memory? Detecting custom memory allocators in C binaries . in Proceedings of the 20th Working Conference on Reverse Engineering (WCRE) . Koblenz, Germany .
Proceedings of the 20th Working Conference on Reverse Engineering (WCRE)
Many reversing techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system's malloc and free functions, and track each chunk of memory thus allocated as a data structure. However, many p
Publikováno v:
Chen, X, Slowinska, A & Bos, H 2013, MemBrush : A practical tool to detect custom memory allocators in C binaries . in Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013 . Proceedings-Working Conference on Reverse Engineering, WCRE, pp. 477-478, 20th Working Conference on Reverse Engineering, WCRE 2013, Koblenz, Germany, 14/10/13 . https://doi.org/10.1109/WCRE.2013.6671326
Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013, 477-478
STARTPAGE=477;ENDPAGE=478;TITLE=Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013
WCRE
Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013, 477-478
STARTPAGE=477;ENDPAGE=478;TITLE=Proceedings-20th Working Conference on Reverse Engineering, WCRE 2013
WCRE
Many reversing techniques for data structures rely on the knowledge of memory allocation routines. Typically, they interpose on the system's malloc and free functions, and track each chunk of memory thus allocated as a data structure. However, many p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::2f0b4050363eef9cc5dffbea895087c9
https://research.vu.nl/en/publications/7a637f51-50ce-4cad-8e9f-00cc48ac7176
https://research.vu.nl/en/publications/7a637f51-50ce-4cad-8e9f-00cc48ac7176
Publikováno v:
System-level Support for Intrusion Recovery.