Sciweavers

49 search results - page 2 / 10
» Address-Space Randomization for Windows Systems
Sort
View
ASPLOS
2008
ACM
13 years 7 months ago
Archipelago: trading address space for reliability and security
Memory errors are a notorious source of security vulnerabilities that can lead to service interruptions, information leakage and unauthorized access. Because such errors are also ...
Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Ben...
CORR
2010
Springer
167views Education» more  CORR 2010»
13 years 5 months ago
Security Mitigations for Return-Oriented Programming Attacks
With the discovery of new exploit techniques, new protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomiz...
Piotr Bania
SRDS
2007
IEEE
13 years 11 months ago
RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization
Code injection attacks are a top threat to today’s Internet. With zero-day attacks on the rise, randomization techniques have been introduced to diversify software and operation...
Xuxian Jiang, Helen J. Wang, Dongyan Xu, Yi-Min Wa...
CMG
2003
13 years 6 months ago
Virtual Memory Constraints in 32-bit Windows
Many server workloads can exhaust the 32-bit virtual address space in the Windows server operating systems. Machines configured with 2 GB or more of RAM installed are particularly...
Mark B. Friedman
ACSAC
2009
IEEE
14 years 4 days ago
Surgically Returning to Randomized lib(c)
—To strengthen systems against code injection attacks, the write or execute only policy (W⊕X) and address space layout randomization (ASLR) are typically used in combination. T...
Giampaolo Fresi Roglia, Lorenzo Martignoni, Robert...