메뉴 건너뛰기




Volumn , Issue , 2011, Pages 58-65

ROP payload detection using speculative code execution

Author keywords

[No Author keywords available]

Indexed keywords

ADDRESS SPACE; ATTACK VECTOR; CODE EXECUTION; CODE INJECTION ATTACKS; DETECTION METHODS; DETECTION TECHNIQUE; EXPERIMENTAL EVALUATION; FALSE POSITIVE; INPUT DATAS; MEMORY BUFFERS; MEMORY PAGES; NETWORK TRAFFIC; PROTOTYPE IMPLEMENTATIONS; RUNTIMES; SHELLCODE; WINDOWS APPLICATION;

EID: 84855846511     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2011.6112327     Document Type: Conference Paper
Times cited : (39)

References (26)
  • 1
    • 84855860321 scopus 로고    scopus 로고
    • http://www.whitephosphorus.org/
  • 2
    • 84855826601 scopus 로고    scopus 로고
    • http://www.exploit-db.com/
  • 3
    • 84855860327 scopus 로고    scopus 로고
    • http://www.metasploit.com/
  • 7
    • 84878361127 scopus 로고    scopus 로고
    • Corelan Team
    • Corelan Team. Corelan ROPdb. https://www.corelan.be/index.php/security/ corelan-ropdb/
    • Corelan ROPdb
  • 10
    • 70349142878 scopus 로고    scopus 로고
    • Low-level software security: Attack and defenses
    • Technical Report MSR-TR-07-153
    • Ú. Erlingsson. Low-level software security: Attack and defenses. Technical Report MSR-TR-07-153, Microsoft Research, 2007. http://research. microsoft.com/pubs/64363/tr-2007-153.pdf
    • (2007) Microsoft Research
    • Erlingsson, Ú.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.