메뉴 건너뛰기




Volumn , Issue , 2011, Pages 20-29

Automatic construction of jump-oriented programming shellcode (on the x86)

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATIC CONSTRUCTION; DEFENCE MECHANISMS; EXECUTABLES; MALICIOUS CODES; PROGRAMMING TECHNIQUE; REAL-WORLD; RETURN-ORIENTED PROGRAMMING; SHELLCODE; TURING-COMPLETE;

EID: 79956058308     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966918     Document Type: Conference Paper
Times cited : (35)

References (33)
  • 1
    • 33751056900 scopus 로고    scopus 로고
    • Towards automatic generation of vulnerability-based signatures
    • DOI 10.1109/SP.2006.41, 1623997, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha, "Towards automatic generation of vulnerability-based signatures, " in Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006, pp. 2-16. (Pubitemid 44753708)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 2-16
    • Brumley, D.1    Newsome, J.2    Song, D.3    Wang, H.4    Jha, S.5
  • 2
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Berkeley, CA, USA: USENIX Association
    • M. Roesch, "Snort - lightweight intrusion detection for networks, " in Proceedings of the 13th USENIX Conference on System Administration. Berkeley, CA, USA: USENIX Association, 1999, pp. 229-238.
    • (1999) Proceedings of the 13th USENIX Conference on System Administration , pp. 229-238
    • Roesch, M.1
  • 3
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Berkeley, CA, USA: USENIX Association
    • H.-A. Kim and B. Karp, "Autograph: toward automated, distributed worm signature detection, " in Proceedings of the 13th Conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 271-286.
    • (2004) Proceedings of the 13th Conference on USENIX Security Symposium , pp. 271-286
    • Kim, H.-A.1    Karp, B.2
  • 4
    • 33745798878 scopus 로고    scopus 로고
    • [Online], Available
    • "The pax project, " 2004. [Online]. Available: http://pax.grsecurity.net/.
    • (2004) The Pax Project
  • 6
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits (pax case study)
    • [Online], Available
    • Nergal, "The advanced return-into-lib(c) exploits (pax case study), " Phrack Magazine, 2001. [Online]. Available: http://www.phrack.com/issues. html?issue=58&id=4.
    • (2001) Phrack Magazine
    • Nergal1
  • 7
    • 71549157865 scopus 로고    scopus 로고
    • X86-64 buffer overow exploits and the borrowed code chunks exploitation technique
    • [Online], Available
    • S. Krahmer, "X86-64 buffer overow exploits and the borrowed code chunks exploitation technique, " Phrack Magazine, 2005. [Online]. Available: http://www.suse.de/krahmer/no-nx.pdf.
    • (2005) Phrack Magazine
    • Krahmer, S.1
  • 8
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86)
    • New York, NY, USA: ACM
    • H. Shacham, "The geometry of innocent esh on the bone: return-into-libc without function calls (on the x86), " in Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS). New York, NY, USA: ACM, 2007, pp. 552-561.
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security(CCS) , pp. 552-561
    • Shacham, H.1
  • 11
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • San Jose, CA, USA
    • R. Hund, T. Holz, and F. C. Freiling, "Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms, " in Proceedings of 18th USENIX Security Symposium, San Jose, CA, USA, 2009, pp. 383-398.
    • (2009) Proceedings of 18th USENIX Security Symposium , pp. 383-398
    • Hund, R.1    Holz, T.2    Freiling, F.C.3
  • 13
    • 78650887149 scopus 로고    scopus 로고
    • Felix "fx" lidner.developments in cisco ios forensics
    • "Felix "fx" lidner.developments in cisco ios forensics, " CONFidence 2.0., http://www.recurity-labs.com/content/pub/ FXRouterExploitation.pdf.
    • CONFidence 2.0
  • 18
    • 71549162538 scopus 로고    scopus 로고
    • Drop: Detecting return-oriented programming malicious code
    • ser. Lecture Notes in Computer Science, A. Prakash and I. Gupta, Eds., Springer
    • P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie, "Drop: Detecting return-oriented programming malicious code." in ICISS, ser. Lecture Notes in Computer Science, A. Prakash and I. Gupta, Eds., vol. 5905. Springer, 2009, pp. 163-177.
    • (2009) ICISS , vol.5905 , pp. 163-177
    • Chen, P.1    Xiao, H.2    Shen, X.3    Yin, X.4    Mao, B.5    Xie, L.6
  • 23
    • 84960561455 scopus 로고
    • On computable numbers, with an application to the entscheidungs problem
    • A. M. Turing, "On computable numbers, with an application to the entscheidungs problem, " Proc. London Math. Soc., pp. 230-265, 1936.
    • (1936) Proc. London Math. Soc. , pp. 230-265
    • Turing, A.M.1
  • 24
    • 85175129712 scopus 로고    scopus 로고
    • [Online], Available
    • milw0rm. [Online]. Available: http://www.milw0rm.com/shellcode/linux/x86.
    • Milw0rm
  • 25
    • 85175133427 scopus 로고    scopus 로고
    • [Online], Available
    • "Implementing linux system calls, " Linux Journal, 1999. [Online]. Available: http://www.linuxjournal.com/article/3326.
    • (1999) Implementing Linux System Calls
  • 28
    • 85175133230 scopus 로고    scopus 로고
    • [Online], Available
    • ""linux/x86/ho detector", " milw0rm, 2008. [Online]. Available: http://www.milw0rm.com/shellcode/7154.
    • (2008) Linux/x86/Ho Detector
  • 33
    • 78650001763 scopus 로고    scopus 로고
    • Interpreter exploitation: Pointer inference and jit spraying
    • D. Blazakis, "interpreter exploitation: pointer inference and jit spraying, " BHDC, 2010, http://www.semantiscope.com/research/BHDC2010/BHDC- 2010-Paper.pdf.
    • (2010) BHDC
    • Blazakis, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.