Formatting

This commit is contained in:
Valentin Brandl 2019-12-15 13:01:42 +01:00
parent 5bd8c61a69
commit cb948467bf
No known key found for this signature in database
GPG Key ID: 30D341DD34118D7D

View File

@ -1,7 +1,7 @@
own:
@inproceedings{TypeAssisted2002,
author = {{Lhee, Kyung-suk and Chapin, Steve J.}},
author = {{{Lhee}, Kyung-suk and {Chapin}, Steve J.}},
booktitle = {{11\textsuperscript{th} USENIX Security Symposium}},
% no conference abbreviation
title = {{Type-Assisted Dynamic Buffer Overflow Detection}},
@ -9,44 +9,53 @@ own:
}
@inproceedings{Rop2007,
author = {{Shacham, Hovav}},
booktitle = {{Proceedings of the 14th ACM conference on Computer and communications security (CCS)}},
title = {{The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)}},
author = {{Shacham}, Hovav},
booktitle = {{Proceedings of the 14th ACM conference on Computer and
communications security (CCS)}},
title = {{The Geometry of Innocent Flesh on the Bone: Return-into-libc without
Function Calls (on the x86)}},
year = {2007}
}
@inproceedings{Detection2018,
author = {{Chaim, Marcos and Santos, Daniel and Cruzes, Daniela}},
booktitle = {{International Journal of Systems and Software Security and Protection (IJSSSP)}},
title = {{What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability}},
author = {{{Chaim}, Marcos and {Santos}, Daniel and {Cruzes}, Daniela}},
booktitle = {{International Journal of Systems and Software Security and
Protection (IJSSSP)}},
title = {{What Do We Know About Buffer Overflow Detection?: A Survey on
Techniques to Detect A Persistent Vulnerability}},
year = {2018}
}
@inproceedings{AtkDef2016,
author = {{Wang, Wei}},
booktitle = {{7\textsuperscript{th} International Conference on Education, Management, Information and Computer Science (ICEMC 2017)}},
title = {{Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability}},
author = {{{Wang}, Wei}},
booktitle = {{7\textsuperscript{th} International Conference on Education,
Management, Information and Computer Science (ICEMC 2017)}},
title = {{Survey of Attacks and Defenses on Stack-based Buffer Overflow
Vulnerability}},
year = {2017}
}
@INPROCEEDINGS{Effectiveness2014,
author={{H. M. {Gisbert} and I. {Ripoll}}},
booktitle={{IEEE 13\textsuperscript{th} International Symposium on Network Computing and Applications (ISNCA)}},
title={{On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows}},
author={{{Gisbert}, H. M. and {Ripoll}, I.}},
booktitle={{IEEE 13\textsuperscript{th} International Symposium on Network
Computing and Applications (ISNCA)}},
title={{On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer
Overflows}},
year={2014},
}
@inproceedings{Rad2001,
author = {{Chiueh, Tzi-cker and Hsu, Fu-Hau}},
booktitle = {{21\textsuperscript{st} International Conference on Distributed Computing Systems}},
author = {{{Chiueh}, Tzi-cker and {Hsu}, Fu-Hau}},
booktitle = {{21\textsuperscript{st} International Conference on Distributed
Computing Systems}},
title = {{RAD: A Compile-Time Solution to Buffer Overflow Attacks}},
year = {2001}
}
@inproceedings{Stackguard1998,
author = {{Cowan, Crispan and Po, Calton and Maier, Dave and Walpole, Jonathan
and Bakke, Peat and Beattie, Steve and Grier, Aaron and Wagle, Perru and
Yhang, Qian}},
author = {{{Cowan}, Crispan and {Po}, Calton and {Maier}, Dave and {Walpole},
Jonathan and {Bakke}, Peat and {Beattie}, Steve and {Grier}, Aaron and
{Wagle}, Perru and {Yhang}, Qian}},
booktitle = {{7\textsuperscript{th} USENIX Security Symposium}},
title = {{StackGuard: Automatic Adaptive Detection and Prevention of
Buffer-Overflow Attacks}},
@ -55,23 +64,27 @@ year = {2001}
@inproceedings{AslrEffective2004,
year = {2004},
booktitle = {{11\textsuperscript{th} ACM conference on Computer and communications security (CCS)}},
booktitle = {{11\textsuperscript{th} ACM conference on Computer and
communications security (CCS)}},
title = {{On the Effectiveness of Address-Space Randomization}},
author = {{Shacham, Hovav and Page, Matthew and Pfaff, Ben and Goh, Eu-Jin and Modadugu, Nagendra and Boneh, Dan}}
author = {{{Shacham}, Hovav and {Page}, Matthew and {Pfaff}, Ben and {Goh},
Eu-Jin and {Modadugu}, Nagendra and {Boneh}, Dan}}
}
@ARTICLE{Smashing2004,
author={J. {Pincus} and B. {Baker}},
author={{Pincus}, J. and {Baker}, B.},
journal={{IEEE Security \& Privacy}},
title={{Beyond stack smashing: recent advances in exploiting buffer overruns}},
title={{Beyond stack smashing: recent advances in exploiting buffer
overruns}},
year={2004},
volume={2},
number={4},
}
@article{Counter2012,
author = {{Younan, Yves and Joosen, Wouter and Piessens, Frank}},
title = {{Runtime countermeasures for code injection attacks against C and C++ programs}},
author = {{{Younan}, Yves and {Joosen}, Wouter and {Piessens}, Frank}},
title = {{Runtime countermeasures for code injection attacks against C and C++
programs}},
year={2012},
journal = {{ACM Computing Surveys (CSUR)}},
volume = {44},
@ -80,11 +93,8 @@ year = {2001}
@InProceedings{Dep2007,
author={{Condit, Jeremy
and Harren, Matthew
and Anderson, Zachary
and Gay, David
and Necula, George C.}},
author={{{Condit}, Jeremy and {Harren}, Matthew and {Anderson}, Zachary and
{Gay}, David and {Necula}, George C.}},
title={{Dependent Types for Low-Level Programming}},
booktitle={{Programming Languages and Systems}},
year={2007}
@ -103,7 +113,7 @@ year={2007}
year = {2019},
urlDate = {2019-12-10},
title = {{Implement Address Space Layout Randomization (ASLR)}},
author = {{Konstantin Belousov}}
author = {{{Belousov}, Konstantin}}
}
@online{Linuxaslr,
@ -111,7 +121,7 @@ year={2007}
year = {2013},
urlDate = {2019-12-10},
title = {{Kernel address space layout randomization}},
author = {{Jake Edge}}
author = {{{Edge}, Jake}}
}
existing: