Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Garmany, Behrad"'
Memory corruption vulnerabilities are still a severe threat for software systems. To thwart the exploitation of such vulnerabilities, many different kinds of defenses have been proposed in the past. Most prominently, Control-Flow Integrity (CFI) has
Externí odkaz:
http://arxiv.org/abs/2007.04116
Autor:
Gawlik, Robert, Koppe, Philipp, Kollenda, Benjamin, Pawlowski, Andre, Garmany, Behrad, Holz, Thorsten
Memory disclosure attacks play an important role in the exploitation of memory corruption vulnerabilities. By analyzing recent research, we observe that bypasses of defensive solutions that enforce control-flow integrity or attempt to detect return-o
Externí odkaz:
http://arxiv.org/abs/2007.03550
More than two decades after the first stack smashing attacks, memory corruption vulnerabilities utilizing stack anomalies are still prevalent and play an important role in practice. Among such vulnerabilities, uninitialized variables play an exceptio
Externí odkaz:
http://arxiv.org/abs/2007.02314
Autor:
Garmany, Behrad (Dipl.)
Die in dieser Dissertation vorgestellte Forschung nimmt eine Nische im Bereich der statischen Programmanalyse ein, dessen Anwendung sich auf binäre (ausführbare) Programme fokussiert. Dabei verfolgen wir, analog zum Trend kommerzieller Quellcodeana
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ad96fa7e91e566d9dd79fb264139f8af
Autor:
Gawlik, Robert, Koppe, Philipp, Kollenda, Benjamin, Pawlowski, Andre, Garmany, Behrad, Holz, Thorsten
Publikováno v:
Detection of Intrusions & Malware & Vulnerability Assessment (9783319406664); 2016, p322-342, 21p
Publikováno v:
Computer Security - ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I; 2016, p602-620, 19p
Publikováno v:
IT: Information Technology; Apr2017, Vol. 59 Issue 2, p83-91, 9p
Publikováno v:
2015 IEEE Symposium on Security & Privacy; 2015, p709-724, 16p