메뉴 건너뛰기




Volumn , Issue , 2004, Pages 298-307

On the effectiveness of address-space randomization

Author keywords

Address space randomization; Automated attacks; Diversity

Indexed keywords

C (PROGRAMMING LANGUAGE); COMPUTER ARCHITECTURE; COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; COSTS; HTTP; SERVERS;

EID: 14844328033     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030124     Document Type: Conference Paper
Times cited : (695)

References (35)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Nov.
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), Nov. 1996. http://www.phrack.org/phrack/49/P49-14.
    • (1996) Phrack Magazine , vol.49 , Issue.14
  • 2
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free()
    • Aug.
    • Anonymous. Once upon a free(). Phrack Magazine, 57(9), Aug. 2001. http://www.phrack.org/phrack/57/p57-0x09.
    • (2001) Phrack Magazine , vol.57 , Issue.9
  • 4
    • 84860108788 scopus 로고    scopus 로고
    • June
    • Apache Software Foundation. ASF bulletin 20020617, June 2002. http://httpd.apache.org/info/security_bulletin_20020617.txt.
    • (2002) ASF Bulletin 20020617
  • 5
    • 84860107517 scopus 로고    scopus 로고
    • June
    • Apache Software Foundation. ASF bulletin 20020620, June 2002. http://httpd.apache.org/info/security_bulletin_20020620.txt.
    • (2002) ASF Bulletin 20020620
  • 7
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • V. Paxson, editor, USENIX, Aug.
    • S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In V. Paxson, editor, Proc. 12th USENIX Sec. Symp., pages 105-20. USENIX, Aug. 2003.
    • (2003) Proc. 12th USENIX Sec. Symp. , pp. 105-120
    • Bhatkar, S.1    Duvarney, D.2    Sekar, R.3
  • 8
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing stackGuard and StackShield
    • May
    • Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack Magazine, 56(5), May 2000. http://www.phrack.org/phrack/56/p56-0x05.
    • (2000) Phrack Magazine , vol.56 , Issue.5
  • 9
    • 84860106943 scopus 로고    scopus 로고
    • June
    • CERT, June 2002. http://www.cert.org/advisories/CA-2002-17.html.
    • (2002)
  • 12
    • 4243572705 scopus 로고
    • How to use a 64-bit address space
    • University of Washington, Department of Computer Science and Engineering, March
    • J. S. Chase, H. M. Levy, M. Baker-Harvey, and E. D. Lazowska. How to use a 64-bit address space. Technical Report 92-03-02, University of Washington, Department of Computer Science and Engineering, March 1992.
    • (1992) Technical Report 92-03-02
    • Chase, J.S.1    Levy, H.M.2    Baker-Harvey, M.3    Lazowska, E.D.4
  • 13
    • 85009448253 scopus 로고    scopus 로고
    • PointGuard: Protecting pointers from buffer overflow vulnerabilities
    • V. Paxson, editor, USENIX, Aug.
    • C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In V. Paxson, editor, Proc. 12th USENIX Sec. Symp., pages 91-104. USENIX, Aug. 2003.
    • (2003) Proc. 12th USENIX Sec. Symp. , pp. 91-104
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 15
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • June
    • T. Durden. Bypassing PaX ASLR protection. Phrack Magazine, 59(9), June 2002. http://www.phrack.org/phrack/59/p59-0x09.
    • (2002) Phrack Magazine , vol.59 , Issue.9
    • Durden, T.1
  • 16
    • 14844332687 scopus 로고    scopus 로고
    • ProPolice: Improved stack-smashing attack detection
    • Oct.
    • H. Etoh and K. Yoda. ProPolice: Improved stack-smashing attack detection. IPSJ SIGNotes Computer SECurity, 014(025), Oct. 2001. http://www.trl.ibm.com/ projects/security/ssp.
    • (2001) IPSJ SIGNotes Computer SECurity , vol.14 , Issue.25
    • Etoh, H.1    Yoda, K.2
  • 17
    • 26844521052 scopus 로고    scopus 로고
    • Feb.
    • PedCIRC. BotNets: Detection and mitigation, Feb. 2003. http://www.fedcirc.gov/library/documents/botNetsv32.doc.
    • (2003) BotNets: Detection and Mitigation
  • 19
    • 14844282642 scopus 로고    scopus 로고
    • Cybersecurity: The cost of monopoly - How the dominance of Microsoft's products poses a risk to security
    • Comp. and Comm. Ind. Assn.
    • D. Geer, R. Bace, P. Gutmann, P. Metzger, C. Pfleeger, J. Quarterman, and B. Schneier. Cybersecurity: The cost of monopoly - how the dominance of Microsoft's products poses a risk to security. Technical report, Comp. and Comm. Ind. Assn., 2003.
    • (2003) Technical Report
    • Geer, D.1    Bace, R.2    Gutmann, P.3    Metzger, P.4    Pfleeger, C.5    Quarterman, J.6    Schneier, B.7
  • 20
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • Aug.
    • M. Kaempf. Vudo malloc tricks. Phrack Magazine, 57(8), Aug. 2001. http://www.phrack.org/phrack/57/p57-0x08.
    • (2001) Phrack Magazine , vol.57 , Issue.8
    • Kaempf, M.1
  • 21
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • ACM Press, Oct.
    • G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proc. 10th ACM Conf. Comp. and Comm. Sec., pages 272-80. ACM Press, Oct. 2003.
    • (2003) Proc. 10th ACM Conf. Comp. and Comm. Sec. , pp. 272-280
    • Kc, G.S.1    Keromytis, A.D.2    Prevelakis, V.3
  • 23
    • 14844331622 scopus 로고    scopus 로고
    • Bot software spreads, causes new worries
    • June
    • L. McLaughlin. Bot software spreads, causes new worries. IEEE Distributed Systems Online, 5(6), June 2004. http://csd1.computer.org/comp/mags/ds/2004/06/ 06001.pdf.
    • (2004) IEEE Distributed Systems Online , vol.5 , Issue.6
    • McLaughlin, L.1
  • 24
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (PaX case study)
    • Dec.
    • Nergal. The advanced return-into-lib(c) exploits (PaX case study). Phrack Magazine, 58(4), Dec. 2001. http://www.phrack.org/phrack/58/p58-0x04.
    • (2001) Phrack Magazine , vol.58 , Issue.4
    • Nergal1
  • 25
    • 84902233195 scopus 로고    scopus 로고
    • A simple way to estimate the cost of downtime
    • A. Couch, editor. USENIX, Nov.
    • D. Patterson. A simple way to estimate the cost of downtime. In A. Couch, editor, Proc. 16th Systems Administration Conf. - LISA 2002, pages 185-8. USENIX, Nov. 2002.
    • (2002) Proc. 16th Systems Administration Conf. - LISA 2002 , pp. 185-188
    • Patterson, D.1
  • 26
    • 84860093864 scopus 로고    scopus 로고
    • PaX Team. PaX. http://pax.grsecurity.net.
  • 29
    • 84860106529 scopus 로고    scopus 로고
    • StackPatch
    • Solar Designer. StackPatch. http://www.openvall.com/linux.
    • Solar Designer
  • 30
    • 79956011976 scopus 로고    scopus 로고
    • "return-to-libc" attack
    • Bugtraq, Aug.
    • Solar Designer, "return-to-libc" attack. Bugtraq, Aug. 1997.
    • (1997) Solar Designer
  • 31
    • 85084162258 scopus 로고    scopus 로고
    • How to own the Internet in your spare time
    • D. Boneh, editor, USENIX, Aug.
    • S. Staniford, V. Paxson, and N. Weaver. How to own the Internet in your spare time. In D. Boneh, editor, Proc. 11th USENIX Sec. Symp., pages 149-67. USENIX, Aug. 2002.
    • (2002) Proc. 11th USENIX Sec. Symp. , pp. 149-167
    • Staniford, S.1    Paxson, V.2    Weaver, N.3
  • 32
    • 84860093865 scopus 로고    scopus 로고
    • StackShield
    • Vendicator. StackShield. http://www.angelfire.com/sk/stackshield.
    • Vendicator


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.