—In the recent past, a number of approaches have been proposed to protect certain types of control data in a program, such as return addresses saved on the stack, rendering most ...
Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaof...
—Return-oriented programming (ROP) has become the dominant form of vulnerability exploitation in both user and kernel space. Many defenses against ROP exploits exist, which can s...
Michalis Athanasakis, Elias Athanasopoulos, Michal...
—A credit network models trust between agents in a distributed environment and enables payments between arbitrary pairs of agents. With their flexible design and robustness agai...
Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, ...
—Some recent research presented evidence of blocks of IP addresses being stolen by BGP hijackers to launch spam campaigns [35]. This was the first time BGP hijacks were seen in ...
Pierre-Antoine Vervier, Olivier Thonnard, Marc Dac...
—We report on a user study that provides evidence that spaced repetition and a specific mnemonic technique enable users to successfully recall multiple strong passwords over tim...
—We propose Bloom cookies that encode a user’s profile in a compact and privacy-preserving way, without preventing online services from using it for personalization purposes. ...
Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatow...
Abstract—In the face of widespread DEP and ASLR deployment, JIT spraying brings together the best of code injection and code reuse attacks to defeat both defenses. However, to da...
—We explore software diversity as a defense against side-channel attacks by dynamically and systematically randomizing the control flow of programs. Existing software diversity ...
Stephen Crane, Andrei Homescu, Stefan Brunthaler, ...
—Cyber criminals are increasingly using robocalling, voice phishing and caller ID spoofing to craft attacks that are being used to scam unsuspecting users who have traditionally...
Abstract—A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launch...
Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kev...