메뉴 건너뛰기




Volumn , Issue , 2010, Pages 327-336

Heap Taichi: Exploiting memory allocation granularity in heap-spraying attacks

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); MEMORY ARCHITECTURE; STORAGE ALLOCATION (COMPUTER);

EID: 78751539789     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1920261.1920310     Document Type: Conference Paper
Times cited : (38)

References (47)
  • 1
    • 34548146785 scopus 로고    scopus 로고
    • Microsoft Corporation. Data execution prevention. http://technet. microsoft.com/enus/library/cc738483.aspx.
    • Data Execution Prevention
  • 2
    • 84882762802 scopus 로고    scopus 로고
    • The PaX team. http://pax.grsecurity.net.
    • The PaX Team
  • 4
    • 85170013541 scopus 로고    scopus 로고
    • Microsoft Internet Explorer .
    • Microsoft Internet Explorer .ANI file "anjh" header BoF exploit, 2004. http://skypher.com/wiki/index.php?title=www.edup.tudelft.nl/ ~bjwever/details-msie-ani.html.php.
    • (2004) ANI File "Anjh" Header BoF Exploit
  • 10
    • 80051984773 scopus 로고    scopus 로고
    • Pwn2own 2010, 2010. http://dvlabs.tippingpoint.com/blog/2010/02/15/ pwn2own-2010.
    • (2010) Pwn2own 2010
  • 15
    • 80053518299 scopus 로고    scopus 로고
    • Interpreter exploitation: Pointer inference and jit spraying
    • D. Blazakis. Interpreter exploitation: Pointer inference and jit spraying. In Blackhat, USA, 2010.
    • Blackhat, USA, 2010
    • Blazakis, D.1
  • 18
    • 85170001623 scopus 로고    scopus 로고
    • CVE, 2007. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007- 0038.
    • (2007) CVE
  • 20
    • 33644565261 scopus 로고    scopus 로고
    • Polymorphic shellcode engine using spectrum analysis
    • T. Detristan, T. Ulenspiegel, and Yann malcom. Polymorphic shellcode engine using spectrum analysis. Phrack 11,57-15 (2001).
    • (2001) Phrack , vol.11 , pp. 57-115
    • Detristan, T.1    Ulenspiegel, T.2    Malcom, Y.3
  • 23
    • 78650613386 scopus 로고    scopus 로고
    • A scalable concurrent malloc(3) implementation for freebsd
    • J. Evans. A scalable concurrent malloc(3) implementation for freebsd. In BSDCan conference, 2006.
    • BSDCan Conference, 2006
    • Evans, J.1
  • 25
    • 0025237929 scopus 로고
    • Fast allocation and deallocation of memory based on object lifetimes
    • D. R. Hanson. Fast allocation and deallocation of memory based on object lifetimes. Softw. Pract. Exper., 20(1):5-12, 1990.
    • (1990) Softw. Pract. Exper. , vol.20 , Issue.1 , pp. 5-12
    • Hanson, D.R.1
  • 34
    • 77952348035 scopus 로고    scopus 로고
    • Writing ia32 alphanumeric shellcodes
    • RIX.
    • RIX. Writing ia32 alphanumeric shellcodes. Phrack 11,57-15 (2001).
    • (2001) Phrack , vol.11 , pp. 57-115
  • 35
    • 85170006024 scopus 로고    scopus 로고
    • P. M. Sanjay Ghemawat, 2005. http://goog-perftools.sourceforge.net/doc/ tcmalloc.html.
    • (2005)
    • Sanjay Ghemawat, P.M.1
  • 39
    • 78650018752 scopus 로고    scopus 로고
    • Bypassing browser memory protections in windows vista
    • A. Sotirov. Bypassing browser memory protections in windows vista. In Blackhat, USA, 2008.
    • Blackhat, USA, 2008
    • Sotirov, A.1
  • 44
    • 78649988672 scopus 로고    scopus 로고
    • An analysis of address space layout randomization on windows vista™
    • O. Whitehouse. An analysis of address space layout randomization on windows vista™. In Symantec Advanced Threat Research, 2007.
    • (2007) Symantec Advanced Threat Research
    • Whitehouse, O.1
  • 46
    • 0029705858 scopus 로고    scopus 로고
    • Cryptovirology: Extortion-based security threats and countermeasures
    • Washington, DC, USA, IEEE Computer Society
    • A. Young and M. Yung. Cryptovirology: Extortion-based security threats and countermeasures. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 129, Washington, DC, USA, 1996. IEEE Computer Society.
    • (1996) SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy , pp. 129
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.