Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Code reuse Attacks). Showing records 1 – 4 of 4 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


University of Michigan

1. Aga, Misiker Tadesse. Thwarting Advanced Code-reuse Attacks.

Degree: PhD, Computer Science & Engineering, 2019, University of Michigan

Code-reuse attacks are the leading mechanism by which attackers infiltrate systems. Various mitigation techniques have been proposed to defend against these attacks, the most prominent… (more)

Subjects/Keywords: code-reuse attacks; Computer Science; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Aga, M. T. (2019). Thwarting Advanced Code-reuse Attacks. (Doctoral Dissertation). University of Michigan. Retrieved from http://hdl.handle.net/2027.42/155142

Chicago Manual of Style (16th Edition):

Aga, Misiker Tadesse. “Thwarting Advanced Code-reuse Attacks.” 2019. Doctoral Dissertation, University of Michigan. Accessed March 02, 2021. http://hdl.handle.net/2027.42/155142.

MLA Handbook (7th Edition):

Aga, Misiker Tadesse. “Thwarting Advanced Code-reuse Attacks.” 2019. Web. 02 Mar 2021.

Vancouver:

Aga MT. Thwarting Advanced Code-reuse Attacks. [Internet] [Doctoral dissertation]. University of Michigan; 2019. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/2027.42/155142.

Council of Science Editors:

Aga MT. Thwarting Advanced Code-reuse Attacks. [Doctoral Dissertation]. University of Michigan; 2019. Available from: http://hdl.handle.net/2027.42/155142


University of California – Irvine

2. Crane, Stephen. Enhancing and Extending Software Diversity.

Degree: Computer Science, 2015, University of California – Irvine

 Software immunity through diversity is a promising research direction. Address Space Layout Randomization has been widely deployed to defend against code-reuse attacks and significantly raises… (more)

Subjects/Keywords: Computer science; Code-reuse Attacks; Computer Security; Side-channel Attacks; Software Defenses; Software Diversity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Crane, S. (2015). Enhancing and Extending Software Diversity. (Thesis). University of California – Irvine. Retrieved from http://www.escholarship.org/uc/item/45w3n70k

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Crane, Stephen. “Enhancing and Extending Software Diversity.” 2015. Thesis, University of California – Irvine. Accessed March 02, 2021. http://www.escholarship.org/uc/item/45w3n70k.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Crane, Stephen. “Enhancing and Extending Software Diversity.” 2015. Web. 02 Mar 2021.

Vancouver:

Crane S. Enhancing and Extending Software Diversity. [Internet] [Thesis]. University of California – Irvine; 2015. [cited 2021 Mar 02]. Available from: http://www.escholarship.org/uc/item/45w3n70k.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Crane S. Enhancing and Extending Software Diversity. [Thesis]. University of California – Irvine; 2015. Available from: http://www.escholarship.org/uc/item/45w3n70k

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Syracuse University

3. Prakash, Aravind. Binary Program Integrity Models for Defeating Code-Reuse Attacks.

Degree: PhD, Electrical Engineering and Computer Science, 2015, Syracuse University

  During a cyber-attack, an adversary executes offensive maneuvers to target computer systems. Particularly, an attacker often exploits a vulnerability within a program, hijacks control-flow,… (more)

Subjects/Keywords: Binary Analysis; Code-Reuse Attacks; Control-Flow Integrity; Program Integrity; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Prakash, A. (2015). Binary Program Integrity Models for Defeating Code-Reuse Attacks. (Doctoral Dissertation). Syracuse University. Retrieved from https://surface.syr.edu/etd/230

Chicago Manual of Style (16th Edition):

Prakash, Aravind. “Binary Program Integrity Models for Defeating Code-Reuse Attacks.” 2015. Doctoral Dissertation, Syracuse University. Accessed March 02, 2021. https://surface.syr.edu/etd/230.

MLA Handbook (7th Edition):

Prakash, Aravind. “Binary Program Integrity Models for Defeating Code-Reuse Attacks.” 2015. Web. 02 Mar 2021.

Vancouver:

Prakash A. Binary Program Integrity Models for Defeating Code-Reuse Attacks. [Internet] [Doctoral dissertation]. Syracuse University; 2015. [cited 2021 Mar 02]. Available from: https://surface.syr.edu/etd/230.

Council of Science Editors:

Prakash A. Binary Program Integrity Models for Defeating Code-Reuse Attacks. [Doctoral Dissertation]. Syracuse University; 2015. Available from: https://surface.syr.edu/etd/230

4. Elsabagh, Mohamed. Protection from Within: Runtime Hardening Techniques for COTS Binaries .

Degree: 2017, George Mason University

 Software systems are the backbone of modern life as they drive all computerized technologies. The ever-increasing size and complexity of today's systems makes them very… (more)

Subjects/Keywords: Computer science; Code-Reuse Attacks; Denial-of-Service; Probabilistic Finite Automata; Return-Oriented Programming; Runtime Application Self-Protection; Static Binary Analysis

…Commercial Off-The-Shelf CRA Code-Reuse Attacks DEP Data Execution Prevention DFI Data Flow… …x29; attacks and Code-Reuse Attacks (CRA). The presented techniques directly embed… …Reuse Attacks (CRA) [50], where existing code in the executable memory of… …Positive FPR False Positive Rate FRA Function-Reuse Attacks GCC GNU Compiler Collection… …Function-Reuse Attacks (FRA). I present EigenROP as a system for transparent detection… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Elsabagh, M. (2017). Protection from Within: Runtime Hardening Techniques for COTS Binaries . (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/11317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Elsabagh, Mohamed. “Protection from Within: Runtime Hardening Techniques for COTS Binaries .” 2017. Thesis, George Mason University. Accessed March 02, 2021. http://hdl.handle.net/1920/11317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Elsabagh, Mohamed. “Protection from Within: Runtime Hardening Techniques for COTS Binaries .” 2017. Web. 02 Mar 2021.

Vancouver:

Elsabagh M. Protection from Within: Runtime Hardening Techniques for COTS Binaries . [Internet] [Thesis]. George Mason University; 2017. [cited 2021 Mar 02]. Available from: http://hdl.handle.net/1920/11317.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Elsabagh M. Protection from Within: Runtime Hardening Techniques for COTS Binaries . [Thesis]. George Mason University; 2017. Available from: http://hdl.handle.net/1920/11317

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.