Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
1805.04767
Cited By
v1
v2 (latest)
Block Oriented Programming: Automating Data-Only Attacks
12 May 2018
Kyriakos K. Ispoglou
Bader Albassam
Trent Jaeger
Mathias Payer
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Block Oriented Programming: Automating Data-Only Attacks"
24 / 24 papers shown
Non-control-Data Attacks and Defenses: A review
IEEE Access (IEEE Access), 2025
Lei Chong
AAML
116
0
0
27 Mar 2025
CleanStack: A New Dual-Stack for Defending Against Stack-Based Memory Corruption Attacks
Lei Chong
71
1
0
21 Mar 2025
One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices
IEEE Symposium on Security and Privacy (S&P), 2024
Marco Chilese
Richard Mitev
Meni Orenbach
Robert Thorburn
Ahmad Atamli-Reineh
A. Sadeghi
293
11
0
12 Mar 2024
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
Jinmeng Zhou
Jiayi Hu
Ziyue Pan
Jiaxun Zhu
Guoren Li
Wenbo Shen
Yulei Sui
Zhiyun Qian
185
8
0
31 Jan 2024
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects
Conference on Computer and Communications Security (CCS), 2023
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
152
1
0
10 Oct 2023
Poster: Control-Flow Integrity in Low-end Embedded Devices
Conference on Computer and Communications Security (CCS), 2023
Sashidhar Jakkamsetti
Youngil Kim
Andrew Searles
Gene Tsudik
208
0
0
19 Sep 2023
Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era
Weon Taek Na
J. Emer
Mengjia Yan
246
3
0
08 Sep 2023
InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion
Zhuojia Shen
J. Criswell
241
1
0
18 Apr 2023
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64
European Symposium on Security and Privacy (Euro S&P), 2022
Lukas Bernhard
Michael Rodler
Thorsten Holz
Lucas Davi
211
13
0
08 Mar 2022
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Claudio Canella
Sebastian Dorn
Daniel Gruss
Michael Schwarz
203
9
0
28 Feb 2022
Domain Page-Table Isolation
Claudio Canella
Andreas Kogler
Lukas Giner
Daniel Gruss
Michael Schwarz
231
3
0
21 Nov 2021
RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented Attacks
Computers & security (CS), 2021
Munir Geden
K. Rasmussen
169
2
0
20 Oct 2021
Identifying Non-Control Security-Critical Data through Program Dependence Learning
Zhilong Wang
Haizhou Wang
Hong Hu
Peng Liu
AAML
189
0
0
27 Aug 2021
DIALED: Data Integrity Attestation for Low-end Embedded Devices
Design Automation Conference (DAC), 2021
Ivan De Oliveira Nunes
Sashidhar Jakkamsetti
Gene Tsudik
194
36
0
24 Mar 2021
Survey of Methods for Automated Code-Reuse Exploit Generation
Programming and computer software (PCS), 2020
A. Vishnyakov
A. Nurmukhametov
152
7
0
16 Nov 2020
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves
USENIX Security Symposium (USENIX Security), 2020
Tobias Cloosters
Michael Rodler
Lucas Davi
154
78
0
15 Jul 2020
Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Jannik Pewny
Philipp Koppe
Thorsten Holz
126
21
0
05 Jul 2020
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP
Salman Ahmed
Ya Xiao
Gang Tan
Kevin Z. Snow
Fabian Monrose
Danfeng
D. Yao
200
0
0
07 Oct 2019
Analyzing Control Flow Integrity with LLVM-CFI
Asia-Pacific Computer Systems Architecture Conference (APCSAC), 2019
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Victor Connes
Jens Grossklags
Claudia Eckert
77
16
0
02 Oct 2019
Exploit Prediction Scoring System (EPSS)
Jay Jacobs
Sasha Romanosky
Benjamin Edwards
M. Roytman
Idris Adjerid
166
129
0
13 Aug 2019
DMON: A Distributed Heterogeneous N-Variant System
Alexios Voulimeneas
Dokyung Song
Fabian Parzefall
Yeoul Na
Per Larsen
Michael Franz
Stijn Volckaert
139
8
0
08 Mar 2019
Exploitation Techniques and Defenses for Data-Oriented Attacks
Long Cheng
Hans Liljestrand
Thomas Nyman
Yu-Tsung Lee
D. Yao
Trent Jaeger
Nadarajah Asokan
AAML
180
27
0
22 Feb 2019
Automated CFI Policy Assessment with Reckon
Paul Muntean
65
0
0
20 Dec 2018
Shining Light On Shadow Stacks
IEEE Symposium on Security and Privacy (IEEE S&P), 2018
Amir-Hossein Karimi
Xinping Zhang
A. Ghodsi
LLMSV
308
166
0
07 Nov 2018
1
Page 1 of 1