Return-oriented programming (French Wikipedia)

Analysis of information sources in references of the Wikipedia article "Return-oriented programming" in French language version.

refsWebsite
Global rank French rank
2nd place
3rd place
1,933rd place
3,198th place
low place
low place
153rd place
287th place
low place
low place
low place
low place
low place
low place
415th place
809th place
488th place
827th place

columbia.edu

cs.columbia.edu

doi.org

dx.doi.org

  • (en) Hovav Shacham, Erik Buchanan, Ryan Roemer et Stefan Savage, Proceedings of the 15th ACM conference on Computer and communications security - CCS '08, , 576 p. (ISBN 978-1-59593-810-7, DOI 10.1145/1455770.1455776, lire en ligne), « When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC », p. 27–38
  • (en) M. N. Abadi, M. Budiu, Ú. Erlingsson et J. Ligatti, Proceedings of the 12th ACM conference on Computer and communications security - CCS '05, (ISBN 978-1-59593-226-6 et 1-59593-226-7, DOI 10.1145/1102120.1102165), « Control-Flow Integrity: Principles, Implementations, and Applications », p. 340–353
  • (en) M. N. Abadi, M. Budiu, Ú. Erlingsson et J. Ligatti, Control-Flow Integrity : Principles, Implementations, and Applications, vol. 13, ACM Transactions on Information and System Security, (DOI 10.1145/1609956.1609960), p. 1
  • (en) H. Shacham, Proceedings of the 14th ACM conference on Computer and communications security - CCS '07, (ISBN 978-1-59593-703-2, DOI 10.1145/1315245.1315313), « The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) », p. 552–561
  • (en) R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich et W. Streilein, Research in Attacks, Intrusions, and Defenses, vol. 8145, (ISBN 978-3-642-41283-7, DOI 10.1007/978-3-642-41284-4_5, lire en ligne), « Systematic Analysis of Defenses against Return-Oriented Programming », p. 82–102
  • (en) J. Hiser, A. Nguyen-Tuong, M. Co, M. Hall et J.W. Davidson, 2012 IEEE Symposium on Security and Privacy, (ISBN 978-1-4673-1244-8, DOI 10.1109/SP.2012.39), « ILR: Where'd My Gadgets Go? », p. 571–585

microsoft.com

technet.microsoft.com

mit.edu

web.mit.edu

phrack.org

  • (en) Nemo, « Modern Objective-C Exploitation Techniques », Phrack, no 69,‎ (lire en ligne)
  • (en) Nergal, « The advanced return-into-lib(c) exploits », Phrack, no 58,‎ (lire en ligne)

seclists.org

shell-storm.org

suse.com

users.suse.com

  • (en) Sebastian Krahmer, X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique, (lire en ligne)

ucsd.edu

cseweb.ucsd.edu