메뉴 건너뛰기




Volumn 17, Issue 3, 2009, Pages 331-362

Address-space layout randomization using code islands

Author keywords

Address space layout randomization (ASLR); Buffer overflow; Code island; Dynamic loader; Return into lib(c) attacks

Indexed keywords

ADDRESS SPACE; ADDRESS-SPACE LAYOUT RANDOMIZATION (ASLR); BRUTE-FORCE ATTACK; BUFFER OVERFLOW; C-SYSTEMS; CODE BLOCKS; CODE ISLAND; CODE TRANSFORMATION; DEDICATED SERVERS; ISLAND CONTROL; KEY COMPONENT; LIBRARY FUNCTIONS; MEMORY LOCATIONS; MEMORY MAPPING; MULTIPLE TARGETS; PROCESS LAYOUT; RETURN-INTO-LIB(C) ATTACKS; RUNTIMES; TARGET FUNCTIONS;

EID: 68149145720     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2009-0322     Document Type: Article
Times cited : (19)

References (24)
  • 1
    • 68149109525 scopus 로고    scopus 로고
    • Aleph One, Smashing the stack for fun and profit, www.Phrack.org 7(49) (1996), file no. 14.
    • Aleph One, Smashing the stack for fun and profit, www.Phrack.org 7(49) (1996), file no. 14.
  • 3
    • 84862372891 scopus 로고    scopus 로고
    • Enhancements to the linux kernel for blocking buffer overflow based attacks
    • Atlanta, GA, USA, October
    • M. Bernaschi, E. Gabrielli and L.V. Mancini, Enhancements to the linux kernel for blocking buffer overflow based attacks, in: 4th Linux Showcase & Conference, Atlanta, GA, USA, October 2000.
    • (2000) 4th Linux Showcase & Conference
    • Bernaschi, M.1    Gabrielli, E.2    Mancini, L.V.3
  • 4
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Washington, DC, USA, August
    • S. Bhatkar, D.C. DuVarney and R. Sekar, Address obfuscation: An efficient approach to combat a broad range of memory error exploits, in: Proceedings of the 12th USENIX Security Symposium, Washington, DC, USA, August 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 8
    • 68149118478 scopus 로고    scopus 로고
    • T. Durden, Bypassing PaX ASLR protection, www.Phrack.org 11(59) (2002), file no. 9.
    • T. Durden, Bypassing PaX ASLR protection, www.Phrack.org 11(59) (2002), file no. 9.
  • 9
    • 68149113534 scopus 로고    scopus 로고
    • eEye Digital Security, Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access), June 2001; http://www.eeye.com/html/ Research/Advisories/AD20010618.html.
    • eEye Digital Security, Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access), June 2001; http://www.eeye.com/html/ Research/Advisories/AD20010618.html.
  • 10
    • 68149173691 scopus 로고    scopus 로고
    • eEye Digital Security, ANALYSIS: .ida Code Red Worm, July 2001; http://www.eeye.com/html/ research/advisories/AL20010717.html.
    • eEye Digital Security, ANALYSIS: .ida "Code Red" Worm, July 2001; http://www.eeye.com/html/ research/advisories/AL20010717.html.
  • 13
    • 68149127718 scopus 로고    scopus 로고
    • Z. Liang and R. Sekar, Automated, sub-second attack signature generation: A basis for building self-protecting servers, Technical report, Department of Computer Science, Stony Brook University, May 2005.
    • Z. Liang and R. Sekar, Automated, sub-second attack signature generation: A basis for building self-protecting servers, Technical report, Department of Computer Science, Stony Brook University, May 2005.
  • 14
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Alexandria, VA, USA, November
    • Z. Liang and R. Sekar, Fast and automated generation of attack signatures: A basis for building self-protecting servers, in: Proceedings of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, November 2005.
    • (2005) Proceedings of the 12th ACM Conference on Computer and Communications Security
    • Liang, Z.1    Sekar, R.2
  • 15
    • 68149109524 scopus 로고    scopus 로고
    • Nergal, The advanced return-into-lib(c) exploits, www.Phrack.org 11(58) (2001), file no. 4.
    • Nergal, The advanced return-into-lib(c) exploits, www.Phrack.org 11(58) (2001), file no. 4.
  • 16
    • 68149135817 scopus 로고    scopus 로고
    • Openwall, Segvguard; ftp://ftp.pl.openwall.com/misc/segvguard/.
    • Segvguard
  • 20


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.