ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1805.04767
  4. Cited By
Block Oriented Programming: Automating Data-Only Attacks
v1v2 (latest)

Block Oriented Programming: Automating Data-Only Attacks

12 May 2018
Kyriakos K. Ispoglou
Bader Albassam
Trent Jaeger
Mathias Payer
ArXiv (abs)PDFHTML

Papers citing "Block Oriented Programming: Automating Data-Only Attacks"

24 / 24 papers shown
Non-control-Data Attacks and Defenses: A review
Non-control-Data Attacks and Defenses: A reviewIEEE Access (IEEE Access), 2025
Lei Chong
AAML
116
0
0
27 Mar 2025
CleanStack: A New Dual-Stack for Defending Against Stack-Based Memory Corruption Attacks
CleanStack: A New Dual-Stack for Defending Against Stack-Based Memory Corruption Attacks
Lei Chong
71
1
0
21 Mar 2025
One for All and All for One: GNN-based Control-Flow Attestation for
  Embedded Devices
One for All and All for One: GNN-based Control-Flow Attestation for Embedded DevicesIEEE Symposium on Security and Privacy (S&P), 2024
Marco Chilese
Richard Mitev
Meni Orenbach
Robert Thorburn
Ahmad Atamli-Reineh
A. Sadeghi
293
11
0
12 Mar 2024
Beyond Control: Exploring Novel File System Objects for Data-Only
  Attacks on Linux Systems
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
Jinmeng Zhou
Jiayi Hu
Ziyue Pan
Jiaxun Zhu
Guoren Li
Wenbo Shen
Yulei Sui
Zhiyun Qian
185
8
0
31 Jan 2024
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects
Top of the Heap: Efficient Memory Error Protection for Many Heap ObjectsConference on Computer and Communications Security (CCS), 2023
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
152
1
0
10 Oct 2023
Poster: Control-Flow Integrity in Low-end Embedded DevicesConference on Computer and Communications Security (CCS), 2023
Sashidhar Jakkamsetti
Youngil Kim
Andrew Searles
Gene Tsudik
208
0
0
19 Sep 2023
Penetrating Shields: A Systematic Analysis of Memory Corruption
  Mitigations in the Spectre Era
Penetrating Shields: A Systematic Analysis of Memory Corruption Mitigations in the Spectre Era
Weon Taek Na
J. Emer
Mengjia Yan
246
3
0
08 Sep 2023
InversOS: Efficient Control-Flow Protection for AArch64 Applications
  with Privilege Inversion
InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion
Zhuojia Shen
J. Criswell
241
1
0
18 Apr 2023
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based
  Pointer Tagging on Intel x86-64
xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64European Symposium on Security and Privacy (Euro S&P), 2022
Lukas Bernhard
Michael Rodler
Thorsten Holz
Lucas Davi
211
13
0
08 Mar 2022
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems
Claudio Canella
Sebastian Dorn
Daniel Gruss
Michael Schwarz
203
9
0
28 Feb 2022
Domain Page-Table Isolation
Domain Page-Table Isolation
Claudio Canella
Andreas Kogler
Lukas Giner
Daniel Gruss
Michael Schwarz
231
3
0
21 Nov 2021
RegGuard: Leveraging CPU Registers for Mitigation of Control- and
  Data-Oriented Attacks
RegGuard: Leveraging CPU Registers for Mitigation of Control- and Data-Oriented AttacksComputers & security (CS), 2021
Munir Geden
K. Rasmussen
169
2
0
20 Oct 2021
Identifying Non-Control Security-Critical Data through Program
  Dependence Learning
Identifying Non-Control Security-Critical Data through Program Dependence Learning
Zhilong Wang
Haizhou Wang
Hong Hu
Peng Liu
AAML
189
0
0
27 Aug 2021
DIALED: Data Integrity Attestation for Low-end Embedded Devices
DIALED: Data Integrity Attestation for Low-end Embedded DevicesDesign Automation Conference (DAC), 2021
Ivan De Oliveira Nunes
Sashidhar Jakkamsetti
Gene Tsudik
194
36
0
24 Mar 2021
Survey of Methods for Automated Code-Reuse Exploit Generation
Survey of Methods for Automated Code-Reuse Exploit GenerationProgramming and computer software (PCS), 2020
A. Vishnyakov
A. Nurmukhametov
152
7
0
16 Nov 2020
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities
  in SGX Enclaves
TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX EnclavesUSENIX Security Symposium (USENIX Security), 2020
Tobias Cloosters
Michael Rodler
Lucas Davi
154
78
0
15 Jul 2020
Steroids for DOPed Applications: A Compiler for Automated Data-Oriented
  Programming
Steroids for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Jannik Pewny
Philipp Koppe
Thorsten Holz
126
21
0
05 Jul 2020
Methodologies for Quantifying (Re-)randomization Security and Timing
  under JIT-ROP
Methodologies for Quantifying (Re-)randomization Security and Timing under JIT-ROP
Salman Ahmed
Ya Xiao
Gang Tan
Kevin Z. Snow
Fabian Monrose
Danfeng
D. Yao
200
0
0
07 Oct 2019
Analyzing Control Flow Integrity with LLVM-CFI
Analyzing Control Flow Integrity with LLVM-CFIAsia-Pacific Computer Systems Architecture Conference (APCSAC), 2019
Paul Muntean
Matthias Neumayer
Zhiqiang Lin
Victor Connes
Jens Grossklags
Claudia Eckert
77
16
0
02 Oct 2019
Exploit Prediction Scoring System (EPSS)
Exploit Prediction Scoring System (EPSS)
Jay Jacobs
Sasha Romanosky
Benjamin Edwards
M. Roytman
Idris Adjerid
166
129
0
13 Aug 2019
DMON: A Distributed Heterogeneous N-Variant System
DMON: A Distributed Heterogeneous N-Variant System
Alexios Voulimeneas
Dokyung Song
Fabian Parzefall
Yeoul Na
Per Larsen
Michael Franz
Stijn Volckaert
139
8
0
08 Mar 2019
Exploitation Techniques and Defenses for Data-Oriented Attacks
Exploitation Techniques and Defenses for Data-Oriented Attacks
Long Cheng
Hans Liljestrand
Thomas Nyman
Yu-Tsung Lee
D. Yao
Trent Jaeger
Nadarajah Asokan
AAML
180
27
0
22 Feb 2019
Automated CFI Policy Assessment with Reckon
Automated CFI Policy Assessment with Reckon
Paul Muntean
65
0
0
20 Dec 2018
Shining Light On Shadow Stacks
Shining Light On Shadow StacksIEEE Symposium on Security and Privacy (IEEE S&P), 2018
Amir-Hossein Karimi
Xinping Zhang
A. Ghodsi
LLMSV
308
166
0
07 Nov 2018
1
Page 1 of 1