메뉴 건너뛰기




Volumn 5965 LNCS, Issue , 2010, Pages 1-17

BuBBle: A javascript engine level countermeasure against heap-spraying attacks

Author keywords

Browser security; Buffer overflow; Heap spraying; Memory corruption attacks

Indexed keywords

BROWSER SECURITY; BUFFER OVERFLOW; BUFFER OVERFLOWS; FIREFOX; IMPROVED RELIABILITY; JAVASCRIPT; MEMORY CORRUPTION ATTACKS; MEMORY OVERHEADS; SAFE LANGUAGES; SCRIPTING LANGUAGES; SECURITY ATTACKS;

EID: 77949446893     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11747-3_1     Document Type: Conference Paper
Times cited : (21)

References (37)
  • 5
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Washington, D.C, U.S.A, August, USENIX Association
    • Bhatkar, S., Duvarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., U.S.A., August 2003, pp. 105-120. USENIX Association (2003)
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 6
    • 49949115783 scopus 로고    scopus 로고
    • Data space randomization
    • Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
    • Bhatkar, S., Sekar, R.: Data space randomization. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 1-22. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5137 , pp. 1-22
    • Bhatkar, S.1    Sekar, R.2
  • 7
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • Baltimore, MD, August, USENIX Association
    • Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection from memory error exploits. In: 14th USENIX Security Symposium, Baltimore, MD, August 2005, USENIX Association (2005)
    • (2005) 14th USENIX Security Symposium
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.C.3
  • 9
    • 77949446188 scopus 로고    scopus 로고
    • Futuremark Corporation
    • Futuremark Corporation. Peacekeeper The Browser Benchmark, http://service.futuremark.com/peacekeeper/
    • Peacekeeper The Browser Benchmark
  • 10
    • 85009448253 scopus 로고    scopus 로고
    • PointGuard: Protecting pointers from buffer overflow vulnerabilities
    • Washington, D.C, U.S.A, August, USENIX Association
    • Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: protecting pointers from buffer overflow vulnerabilities. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., U.S.A., August 2003, pp. 91-104. USENIX Association (2003)
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 91-104
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 12
    • 70350626575 scopus 로고    scopus 로고
    • Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks
    • Flegel, U, Bruschi, D, eds, DIMVA 2009, Springer, Heidelberg
    • Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending browsers against drive-by downloads: mitigating heap-spraying code injection attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol. 5587, pp. 88-106. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5587 , pp. 88-106
    • Egele, M.1    Wurzinger, P.2    Kruegel, C.3    Kirda, E.4
  • 13
    • 70349142878 scopus 로고    scopus 로고
    • Low-level software security: Attacks and defenses
    • Technical Report MSRTR-2007-153, Microsoft Research November
    • Erlingsson, Ú.: Low-level software security: Attacks and defenses. Technical Report MSRTR-2007-153, Microsoft Research (November 2007)
    • (2007)
    • Erlingsson, U.1
  • 14
    • 14944385012 scopus 로고    scopus 로고
    • Protecting from stack-smashing attacks
    • Technical report, IBM Research Divison, Tokyo Research Laboratory June
    • Etoh, H., Yoda, K.: Protecting from stack-smashing attacks. Technical report, IBM Research Divison, Tokyo Research Laboratory (June 2000)
    • (2000)
    • Etoh, H.1    Yoda, K.2
  • 15
    • 77949479988 scopus 로고    scopus 로고
    • Mozilla Foundation
    • Mozilla Foundation. Firefox 3.5b4 (2009), http://developer.mozilla.org
    • (2009) Firefox 3.5b4
  • 16
    • 77949450020 scopus 로고    scopus 로고
    • Google. V8 Benchmark Suite - version 5, http://v8.googlecode.com
    • Google. V8 Benchmark Suite - version 5, http://v8.googlecode.com
  • 17
    • 77949446187 scopus 로고    scopus 로고
    • Intel. Intel architecture software developer's manual. 2: Instruction set reference (2002)
    • Intel. Intel architecture software developer's manual. vol. 2: Instruction set reference (2002)
  • 18
    • 77949447364 scopus 로고    scopus 로고
    • E. C. M. A. International. ECMA-262: ECMAScript Language Specification. ECMA (European Association for Standardizing Information and Communication Systems), 3rd edn., Geneva, Switzerland (December 1999)
    • E. C. M. A. International. ECMA-262: ECMAScript Language Specification. ECMA (European Association for Standardizing Information and Communication Systems), 3rd edn., Geneva, Switzerland (December 1999)
  • 23
    • 74049161045 scopus 로고    scopus 로고
    • Nozzle: A defense against heap-spraying code injection attacks
    • Technical report, Microsoft Research November
    • Ratanaworabhan, P., Livshits, B., Zorn, B.: Nozzle: A defense against heap-spraying code injection attacks. Technical report, Microsoft Research (November 2008)
    • (2008)
    • Ratanaworabhan, P.1    Livshits, B.2    Zorn, B.3
  • 25
    • 77949472797 scopus 로고    scopus 로고
    • securiteam.com. Heap spraying: Exploiting internet explorer vml 0-day xp sp2 (2009), http://blogs.securiteam.com/index.php/archives/641
    • securiteam.com. Heap spraying: Exploiting internet explorer vml 0-day xp sp2 (2009), http://blogs.securiteam.com/index.php/archives/641
  • 27
    • 77949426305 scopus 로고    scopus 로고
    • skypher.com. Heap spraying (2007), http://skypher.com/wiki/index.php
    • skypher.com. Heap spraying (2007), http://skypher.com/wiki/index.php
  • 29
    • 34548146785 scopus 로고    scopus 로고
    • TMS
    • TMS. Data execution prevention, http://technet.microsoft.com/en-us/ library/cc738483.aspx
    • Data execution prevention
  • 30
    • 32344441314 scopus 로고    scopus 로고
    • Stackguard: Simple stack smash protection for gcc
    • Ottawa, Ontario, Canada, May
    • Wagle, P., Cowan, C.: Stackguard: Simple stack smash protection for gcc. In: Proceedings of the GCC Developers Summit, Ottawa, Ontario, Canada, May 2003, pp. 243-256 (2003)
    • (2003) Proceedings of the GCC Developers Summit , pp. 243-256
    • Wagle, P.1    Cowan, C.2
  • 31
    • 77949438656 scopus 로고    scopus 로고
    • www2.webkit.org Sunspider javascript benchmark (2009), http://www2.webkit.org/perf/sunspider-0.9/sunspider.html
    • www2.webkit.org Sunspider javascript benchmark (2009), http://www2.webkit.org/perf/sunspider-0.9/sunspider.html
  • 33
    • 77949469586 scopus 로고    scopus 로고
    • www.packetstormsecurity.org 25bytes-execve (2009), http://www. packetstormsecurity.org/shellcode/25bytes-execve.txt
    • www.packetstormsecurity.org 25bytes-execve (2009), http://www. packetstormsecurity.org/shellcode/25bytes-execve.txt
  • 34
    • 27644457078 scopus 로고    scopus 로고
    • Transparent runtime randomization for security
    • Florence, Italy, October, IEEE Computer Society, IEEE Press, Los Alamitos () 2003
    • Xu, J., Kalbarczyk, Z., Iyer, R.K.: Transparent runtime randomization for security. In: 22nd International Symposium on Reliable Distributed Systems (SRDS 2003), Florence, Italy, October 2003, pp. 260-269. IEEE Computer Society, IEEE Press, Los Alamitos (2003)
    • (2003) 22nd International Symposium on Reliable Distributed Systems (SRDS , pp. 260-269
    • Xu, J.1    Kalbarczyk, Z.2    Iyer, R.K.3
  • 35
    • 38849147719 scopus 로고    scopus 로고
    • Code injection in C and C++: A survey of vulnerabilities and countermeasures
    • Technical report, Departement Computerwetenschappen, Katholieke Universiteit Leuven
    • Younan, Y., Joosen, W., Piessens, F.: Code injection in C and C++: A survey of vulnerabilities and countermeasures. Technical report, Departement Computerwetenschappen, Katholieke Universiteit Leuven (2004)
    • (2004)
    • Younan, Y.1    Joosen, W.2    Piessens, F.3
  • 36
    • 84989825191 scopus 로고    scopus 로고
    • Efficient protection against heap-based buffer overflows without resorting to magic
    • Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
    • Younan, Y., Joosen, W., Piessens, F.: Efficient protection against heap-based buffer overflows without resorting to magic. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 379-398. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 379-398
    • Younan, Y.1    Joosen, W.2    Piessens, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.