메뉴 건너뛰기




Volumn 6476 LNCS, Issue , 2010, Pages 340-354

Return-oriented rootkit without returns (on the x86)

Author keywords

[No Author keywords available]

Indexed keywords

INTEGRITY PROTECTION; MEMORY LAYOUT; RETURN-ORIENTED PROGRAMMING;

EID: 78650906305     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17650-0_24     Document Type: Conference Paper
Times cited : (10)

References (36)
  • 1
    • 78650887149 scopus 로고    scopus 로고
    • Felix "fx" lidner. Developments in cisco ios forensics
    • Felix "fx" lidner. Developments in cisco ios forensics. CONFidence 2.0, http://www.recurity-labs.com/content/pub/FX-Router-Exploitation. pdf
    • CONFidence 2.0
  • 8
    • 71549162538 scopus 로고    scopus 로고
    • Drop: Detecting return-oriented programming malicious code
    • Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. Springer, Heidelberg
    • Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: Drop: Detecting return-oriented programming malicious code. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 163-177. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5905 , pp. 163-177
    • Chen, P.1    Xiao, H.2    Shen, X.3    Yin, X.4    Mao, B.5    Xie, L.6
  • 14
    • 70349278622 scopus 로고    scopus 로고
    • Code injection attacks on harvard-architecture devices
    • Syverson, P., Jha, S. (eds.)
    • Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, pp. 15-26 (2008)
    • (2008) Proceedings of CCS 2008 , pp. 15-26
    • Francillon, A.1    Castelluccia, C.2
  • 20
    • 71549157865 scopus 로고    scopus 로고
    • X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique
    • Krahmer, S.: X86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. Phrack Magazine (2005), http://www.suse.de/krahmer/no- nx.pdf
    • (2005) Phrack Magazine
    • Krahmer, S.1
  • 26
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (pax case study)
    • Nergal
    • Nergal: The advanced return-into-lib(c) exploits (pax case study). Phrack Magazine (2001), http://www.phrack.org/archives/58/p58-0x04
    • (2001) Phrack Magazine
  • 27
    • 85036476282 scopus 로고    scopus 로고
    • Smashing the kernel stack for fun and profit
    • noir
    • noir: Smashing the kernel stack for fun and profit. Phrack Magazine (2006), http://www.phrack.com/issues.html?issue=60&id=6
    • (2006) Phrack Magazine
  • 29
    • 56549083677 scopus 로고    scopus 로고
    • Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing
    • Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
    • Riley, R., Jiang, X., Xu, D.: Guest-transparent prevention of kernel rootkits with vmm-based memory shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 1-20. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5230 , pp. 1-20
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 33
    • 84960561455 scopus 로고
    • On computable numbers, with an application to the entscheidungsproblem
    • Turing, A.M.: On computable numbers, with an application to the entscheidungsproblem. Proc. London Math. Soc., 230-265 (1936)
    • (1936) Proc. London Math. Soc. , pp. 230-265
    • Turing, A.M.1
  • 36
    • 84875683459 scopus 로고    scopus 로고
    • Wikipedia: Exec shield, http://en.wikipedia.org/wiki/Exec-Shield
    • Exec Shield


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.