Author:
Vishnyakov A. V.,Nurmukhametov A. R.
Reference116 articles.
1. The Heartbleed bug. http://heartbleed.com.
2. Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., and Maisel, W.H., Pacemakers and implantable cardiac defibrillators: software radio attacks and zero-power defenses, Proc. 2008 IEEE Symp. on Security and Privacy (sp 2008), Red Hook, NY: Curran Assoc., 2008, pp. 129–142. https://doi.org/10.1109/SP.2008.31
3. CWE-2020, CWE top 25 most dangerous software weaknesses.
https://cwe.mitre.org/top25/archive/2020/2020_cwe_ top25.html.
4. Peslyak, A., Getting around non-executable stack (and fix), 1997. https://seclists.org/bugtraq/1997/Aug/63.
5. Shacham, H., The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), Proc. 14th ACM Conf. on Computer and Communications Security (CCS ’07), Alexandria, Virginia, USA, New York, NY: Assoc. Comput. Mach., 2007, pp. 552–561. https://doi.org/10.1145/1315245.1315313
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Execution at RISC: Stealth JOP Attacks on RISC-V Applications;Lecture Notes in Computer Science;2024
2. TGRop: Top Gun of Return-Oriented Programming Automation;Lecture Notes in Computer Science;2024
3. DEPA: Determining Exploit Primitives Automatically for Interactive Programs;Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering;2022-10-21
4. MAJORCA: Multi-Architecture JOP and ROP Chain Assembler;2021 Ivannikov Ispras Open Conference (ISPRAS);2021-12