메뉴 건너뛰기




Volumn , Issue , 2011, Pages 353-362

Mitigating code-reuse attacks with control-flow locking

Author keywords

[No Author keywords available]

Indexed keywords

ARBITRARY ORDER; CONTROL FLOWS; CONTROL-FLOW; DEFENSE TECHNIQUES; DEPLOYABILITY; NORMAL CONTROLS; PROOF OF CONCEPT; SYSTEM CALLS;

EID: 84855737396     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2076732.2076783     Document Type: Conference Paper
Times cited : (124)

References (38)
  • 1
    • 84855734503 scopus 로고    scopus 로고
    • Wikipedia. W^X. http://en.wikipedia.org/wiki/W^X.
  • 2
    • 76949101487 scopus 로고    scopus 로고
    • Getting around non-executable stack (and fix)
    • Solar Designer
    • Solar Designer. Getting around non-executable stack (and fix). Bugtraq, 1997.
    • (1997) Bugtraq
  • 3
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • Hovav Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In 14th ACM CCS, 2007.
    • (2007) 14th ACM CCS
    • Shacham, H.1
  • 4
    • 79956023817 scopus 로고    scopus 로고
    • Drop: Detecting return-oriented programming malicious code
    • Ping Chen, Hai Xiao, Xiaobin Shen, Xinchun Yin, Bing Mao, and Li Xie. Drop: Detecting return-oriented programming malicious code. In 5th ACM ICISS, 2009.
    • (2009) 5th ACM ICISS
    • Chen, P.1    Xiao, H.2    Shen, X.3    Yin, X.4    Mao, B.5    Xie, L.6
  • 5
    • 74049136385 scopus 로고    scopus 로고
    • Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
    • Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. Dynamic Integrity Measurement and Attestation: Towards Defense against Return-oriented Programming Attacks. In 4th ACM STC, 2009.
    • (2009) 4th ACM STC
    • Davi, L.1    Sadeghi, A.-R.2    Winandy, M.3
  • 7
    • 78650021053 scopus 로고    scopus 로고
    • ROPdefender: A detection tool to defend against return-oriented programming attacks
    • Horst Görtz Institute for IT Security, March
    • Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. ROPdefender: A detection tool to defend against return-oriented programming attacks. Technical Report HGI-TR-2010-001, Horst Görtz Institute for IT Security, March 2010.
    • (2010) Technical Report HGI-TR-2010-001
    • Davi, L.1    Sadeghi, A.-R.2    Winandy, M.3
  • 8
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • April
    • Tzi-cker Chiueh and Fu-Hau Hsu. RAD: A Compile-Time Solution to Buffer Overflow Attacks. In 21st IEEE ICDCS, April 2001.
    • (2001) 21st IEEE ICDCS
    • Chiueh, T.-C.1    Hsu, F.-H.2
  • 11
    • 79955994779 scopus 로고    scopus 로고
    • Jump-oriented programming: A new class of code-reuse attack
    • March
    • Tyler Bletsch, Xuxian Jiang, Vince Freeh, and Zhenkai Liang. Jump-Oriented Programming: A New Class of Code-Reuse Attack. In 6th AsiaCCS, March 2011.
    • (2011) 6th AsiaCCS
    • Bletsch, T.1    Jiang, X.2    Freeh, V.3    Liang, Z.4
  • 13
    • 33646767376 scopus 로고    scopus 로고
    • Control-flow integrity: Principles, implementations, and applications
    • October
    • Martín Abadi, Mihai Budiu, Úlfar Erilingsson, and Jay Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In 12th ACM CCS, October 2005.
    • (2005) 12th ACM CCS
    • Abadi, M.1    Budiu, M.2    Erilingsson, U.3    Ligatti, J.4
  • 14
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PaX case study
    • File 4 of 14, December
    • Nergal. The Advanced Return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 11, Issue 0x58, File 4 of 14, December 2001.
    • (2001) Phrack Magazine , vol.11 , Issue.58
    • Nergal1
  • 15
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • New York, NY, USA. ACM
    • Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage. When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC. In 15th ACM CCS, pages 27-38, New York, NY, USA, 2008. ACM.
    • (2008) 15th ACM CCS , pp. 27-38
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 16
    • 84855734502 scopus 로고    scopus 로고
    • "FX" Lidner. Developments in Cisco IOS forensics
    • Felix, November
    • Felix "FX" Lidner. Developments in Cisco IOS Forensics. In CONference 2.0, November 2009.
    • (2009) CONference 2.0
  • 18
    • 84861443711 scopus 로고    scopus 로고
    • Can DREs provide long-lasting security? the case of return-oriented programming and the AVC Advantage
    • August
    • Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In EVT/WOTE 2009, USENIX, August 2009.
    • (2009) EVT/WOTE 2009, USENIX
    • Checkoway, S.1    Feldman, A.J.2    Kantor, B.3    Halderman, J.A.4    Felten, E.W.5    Shacham, H.6
  • 19
    • 84855734501 scopus 로고    scopus 로고
    • Utilizing code reuse/ROP in PHP application exploits
    • Stefan Esser. Utilizing Code Reuse/ROP in PHP Application Exploits. In BlackHat USA, 2010.
    • (2010) BlackHat USA
    • Esser, S.1
  • 20
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • August
    • Ralf Hund, Thorsten Holz, and Felix C. Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In 19th USENIX Security Symposium, August 2009.
    • (2009) 19th USENIX Security Symposium
    • Hund, R.1    Holz, T.2    Freiling, F.C.3
  • 21
    • 74049112175 scopus 로고    scopus 로고
    • On the difficulty of software-based attestation of embedded devices
    • New York, NY, USA. ACM
    • Daniele Perito Claude Castelluccia, Aurélien Francillon and Claudio Soriente. On the Difficulty of Software-Based Attestation of Embedded Devices. In 16th ACM CCS, New York, NY, USA, 2009. ACM.
    • (2009) 16th ACM CCS
    • Castelluccia, D.P.C.1    Francillon, A.2    Soriente, C.3
  • 23
  • 24
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. 12th USENIX Security, 2003.
    • (2003) 12th USENIX Security
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 25
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. 14th USENIX Security, 2005.
    • (2005) 14th USENIX Security
    • Bhatkar, S.1    Sekar, R.2    Duvarney, D.C.3
  • 26
    • 27644457078 scopus 로고    scopus 로고
    • Transparent runtime randomization for security
    • October
    • Jun Xu, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. Transparent Runtime Randomization for Security. 22nd SRDS, October 2003.
    • (2003) 22nd SRDS
    • Xu, J.1    Kalbarczyk, Z.2    Iyer, R.K.3
  • 27
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • File 9 of 18, June
    • Tyler Durden. Bypassing PaX ASLR Protection. Phrack Magazine, Volume 11, Issue 0x59, File 9 of 18, June 2002.
    • (2002) Phrack Magazine , vol.11 , Issue.59
    • Durden, T.1
  • 30
    • 84991997276 scopus 로고    scopus 로고
    • Securing software by enforcing data-flow integrity
    • November
    • Miguel Castro, Manuel Costa, and Tim Harris. Securing Software by Enforcing Data-Flow Integrity. In 7th USENIX OSDI, November 2006.
    • (2006) 7th USENIX OSDI
    • Castro, M.1    Costa, M.2    Harris, T.3
  • 34
    • 78751484536 scopus 로고    scopus 로고
    • G-free: Defeating return-oriented programming through gadget-less binaries
    • Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-free: Defeating return-oriented programming through gadget-less binaries. In ACSAC, 2010.
    • (2010) ACSAC
    • Onarlioglu, K.1    Bilge, L.2    Lanzi, A.3    Balzarotti, D.4    Kirda, E.5
  • 37
    • 84855751231 scopus 로고    scopus 로고
    • Felix von Leitner et al. dietlibc. http://www.fefe.de/dietlibc/.
    • Von Leitner, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.