Author image not provided
 Sven Lachmund

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article6.25
Citation Count50
Publication count8
Publication years2009-2013
Available for download4
Average downloads per article468.50
Downloads (cumulative)1,874
Downloads (12 Months)108
Downloads (6 Weeks)8
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


8 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 8 of 8
Sort by:

1 published by ACM
June 2013 ACM Transactions on Information and System Security (TISSEC): Volume 16 Issue 1, June 2013
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 27,   Downloads (Overall): 547

Full text available: PDFPDF
Code Pointer Masking (CPM) is a novel countermeasure against code injection attacks on native code. By enforcing the correct semantics of code pointers, CPM thwarts attacks that modify code pointers to divert the application’s control flow. It does not rely on secret values such as stack canaries and protects against ...
Keywords: Code injection, masking, code pointer, countermeasure

2
August 2011 Journal in Computer Virology: Volume 7 Issue 3, August 2011
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Code injection attacks are one of the most powerful and important classes of attacks on software. In these attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also ...

3
July 2011 DIMVA'11: Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 7

In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that ...

4 published by ACM
May 2010 SESS '10: Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 119

Full text available: PDFPDF
Applications are typically executed in the security context of the user. Nonetheless, they do not need all the access rights. Since software vulnerabilities based attacks are not rare nowadays, executing applications with minimal rights (least privileges) is desirable. Attackers would only be able to access a fraction of resources. The ...

5
January 2010 Transactions on computational science XI: special issue on security in computing, part II
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Applications are typically executed in the security context of the user. Nonetheless, they do not need all the access rights granted. Executing applications with minimal rights (least privileges) is desirable. In case of an attack, only a fraction of resources can be accessed. The state-of-the-art on application-based access control policy ...

6
December 2009 ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

External storage devices, such as USB-Sticks, SD-Cards, or other flash memory devices, are widely used today. These devices may pose a threat if they contain sensitive data and are then lost or forgotten somewhere. Usability of existing encryption solutions for such external storage media is limited because of the need ...
Keywords: usability, security, encryption, file system, transparent encryption, USB storage

7 published by ACM
November 2009 CCS '09: Proceedings of the 16th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 2,   Downloads (12 Months): 14,   Downloads (Overall): 645

Full text available: PDFPDF
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, where it is stored in memory. The malicious input is chosen in such a way that its representation in memory is also ...
Keywords: alphanumeric shellcode, turing completeness, filter-resistance

8 published by ACM
March 2009 EUROSEC '09: Proceedings of the Second European Workshop on System Security
Publisher: ACM
Bibliometrics:
Citation Count: 35
Downloads (6 Weeks): 5,   Downloads (12 Months): 65,   Downloads (Overall): 554

Full text available: PDFPDF
Many countermeasures exist that attempt to protect against buffer overflow attacks on applications written in C and C++. The most widely deployed countermeasures rely on artificially introducing randomness in the memory image of the application. StackGuard and similar systems, for instance, will insert a random value before the return address ...
Keywords: buffer overread, probabilistic countermeasure, buffer overflow, bypass, systems security



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us