메뉴 건너뛰기




Volumn 15, Issue 1, 2012, Pages

Return-oriented programming: Systems, languages, and applications

Author keywords

Algorithms; Security

Indexed keywords

ADDRESS SPACE; BUILDING BLOCKES; CONTROL FLOWS; MALICIOUS CODES; MICROSOFT; SECURITY; SOLARIS;

EID: 84859457954     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/2133375.2133377     Document Type: Conference Paper
Times cited : (416)

References (66)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • ALEPH ONE.
    • ALEPH ONE. 1996. Smashing the stack for fun and profit. Phrack Mag. 49, 14. http://www.phrack.org/archives/49/p49-0x0e- Smashing%20The%20Stack%20For%20Fun% 20And%20Profit-by-Aleph1.txt.
    • (1996) Phrack Mag. , vol.49 , pp. 14
  • 3
    • 84859459147 scopus 로고    scopus 로고
    • ANONYMOUS.
    • ANONYMOUS. 2001. Once upon a free(). . . . Phrack Mag. 57, 9. http://www.phrack.org/archives/57/ p57-0x09-Once%20upon%20a%20free()-by- %anonymous%20author.txt.
    • (2001) Once Upon A Free(). . . . Phrack Mag , vol.57 , pp. 9
  • 6
    • 26844531642 scopus 로고    scopus 로고
    • Basic integer overflows
    • BLEXIM.
    • BLEXIM. 2002. Basic integer overflows. Phrack Mag. 60, 10. http://www.phrack.org/archives/60/p60-0x0a-Basic%20Integer%20Overflows-%by- blexim.txt.
    • (2002) Phrack Mag. , vol.60 , pp. 10
  • 8
    • 84859467781 scopus 로고    scopus 로고
    • Bypassing stackGuard and stackShield
    • BULBA AND KIL3R.
    • BULBA AND KIL3R. 2000. Bypassing StackGuard and StackShield. Phrack Mag. 56, 5. http://www.phrack.org/archives/56/p56-0x05- Bypassing%20StackGuard%20and%20StackShield- by-Kil3r%20&%20Bulba.txt.
    • (2000) Phrack Mag. , vol.56 , pp. 5
  • 13
    • 84859453847 scopus 로고    scopus 로고
    • Return-oriented exploitation
    • (Presentation slides)
    • DAI ZOVI, D. 2010. Return-oriented exploitation. Black Hat (Presentation slides). https://media.blackhat.com/bh-us-10/presentations/Zovi/BlackHat-USA- 2010-DaiZovi- Return-Oriented-Exploitation-slides.pdf.
    • (2010) Black Hat
    • Dai Zovi, D.1
  • 14
    • 84859458322 scopus 로고    scopus 로고
    • Win32 buffer overflows (location, exploitation, and prevention)
    • DARK SPYRIT.
    • DARK SPYRIT. 1999. Win32 buffer overflows (location, exploitation, and prevention). Phrack Mag. 55, 15. http://www.phrack.org/archives/55/p55-0x0f- Win32%20Buffer%20Overflows...-by-dark% 20spyrit.txt.
    • (1999) Phrack Mag. , vol.55 , pp. 15
  • 15
    • 74049136385 scopus 로고    scopus 로고
    • Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
    • N. Asokan, C. Nita-Rotaru, and J.-P. Seifert Eds., ACM Press
    • DAVI, L., SADEGHI, A.-R., AND WINANDY, M. 2009. Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks. In Proceedings of the Technical Communication Summit. N. Asokan, C. Nita-Rotaru, and J.-P. Seifert Eds., ACM Press, 49-54.
    • (2009) Proceedings of the Technical Communication Summit , pp. 49-54
    • Davi, L.1    Sadeghi, A.-R.2    Winandy, M.3
  • 18
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • DURDEN, T. 2002. Bypassing PaX ASLR protection. Phrack Mag. 59, 9. http://www.phrack.org/archives/59/p59-0x09-Bypassing%20PaX%20ASLR%20protection- by-Tyler% 20Durden.txt.
    • (2002) Phrack Mag. , vol.59 , pp. 9
    • Durden, T.1
  • 19
    • 38049035512 scopus 로고    scopus 로고
    • Low-level software security: Attacks and defenses
    • A. Aldini and R. Gorrieri Eds., Lecture Notes in Computer Science, Springer-Verlag
    • ERLINGSSON, U. 2007. Low-level software security: Attacks and defenses. In Foundations of Security Analysis and Design IV, A. Aldini and R. Gorrieri Eds., Lecture Notes in Computer Science, vol. 4677. Springer-Verlag, 92-134.
    • (2007) Foundations of Security Analysis and Design IV , vol.4677 , pp. 92-134
    • Erlingsson, U.1
  • 21
    • 14844332687 scopus 로고    scopus 로고
    • ProPolice: Improved stack-smashing attack detection
    • ETOH, H. AND YODA, K. 2001. ProPolice: Improved stack-smashing attack detection. IPSJ SIGNotes Comp. Sec. 14, 25. http://www.trl.ibm.com/projects/ security/ssp.
    • (2001) IPSJ SIGNotes Comp. Sec. , vol.14 , pp. 25
    • Etoh, H.1    Yoda, K.2
  • 24
    • 85084163372 scopus 로고    scopus 로고
    • StackGhost: Hardware facilitated stack protection
    • D. Wallach Ed., USENIX
    • FRANTZEN, M. AND SHUEY, M. 2001. StackGhost: Hardware facilitated stack protection. In Proceedings of the USENIX Security Symposium. D. Wallach Ed., USENIX, 55-66.
    • (2001) Proceedings of the USENIX Security Symposium. , pp. 55-66
    • Frantzen, M.1    Shuey, M.2
  • 27
    • 34748842480 scopus 로고    scopus 로고
    • Advances in format string exploiting
    • GERA AND RIQ.
    • GERA AND RIQ. 2001. Advances in format string exploiting. Phrack Mag. 59, 7. http://www.phrack.org/archives/59/p59-0x07-Advances%20in%20format%20string% 20exploitation-by-riq%20&%20gera.txt.
    • (2001) Phrack Mag. , vol.59 , pp. 7
  • 29
    • 84859476272 scopus 로고    scopus 로고
    • Big loop integer protection
    • HOROVITZ, O. 2002. Big loop integer protection. Phrack Mag. 60, 9. http://www.phrack.org/archives/60/ p60-0x09-Big%20Loop%20Integer%20Protection- by-Oded%20Horovitz.txt.
    • (2002) Phrack Mag. , vol.60 , pp. 9
    • Horovitz, O.1
  • 30
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • F. Monrose Ed., USENIX
    • HUND, R., HOLZ, T., AND FREILING, F. 2009. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Proceedings of the USENIX Security Symposium. F. Monrose Ed., USENIX, 383-398.
    • (2009) Proceedings of the USENIX Security Symposium , pp. 383-398
    • Hund, R.1    Holz, T.2    Freiling, F.3
  • 31
  • 32
    • 78650002359 scopus 로고    scopus 로고
    • Fun and games with Mac OS X and iPhone payloads
    • (Presentation slides)
    • IOZZO, V. AND MILLER, C. 2009. Fun and games with Mac OS X and iPhone payloads. Black Hat Europe (Presentation slides). http://www.blackhat.com/ presentations/bh-europe-09/ Miller-Iozzo/BlackHat-Europe-2009-Miller-Iozzo-OSX- IPhone-Payloads-whitepaper.pdf.
    • (2009) Black Hat Europe
    • Iozzo, V.1    Miller, C.2
  • 33
    • 84859453835 scopus 로고    scopus 로고
    • Everybody be cool this is a roppery!
    • IOZZO, V., KORNAU, T., AND WEINMANN, R.-P. 2010. Everybody be cool this is a roppery! Black Hat. http://www.zynamics.com/downloads/bh10-paper.pdf.
    • (2010) Black Hat
    • Iozzo, V.1    Kornau, T.2    Weinmann, R.-P.3
  • 35
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • KAEMPF, M. 2001. Vudo malloc tricks. Phrack Mag. 57, 8. http://www.phrack.org/archives/57/p57-0x08-Vudo%20malloc%20tricks-by-MaXX.txt.
    • (2001) Phrack Mag. , vol.57 , pp. 8
    • Kaempf, M.1
  • 36
    • 84859450905 scopus 로고    scopus 로고
    • The frame pointer overwrite
    • KLOG.
    • KLOG. 1999. The frame pointer overwrite. Phrack Mag. 55, 8. http://www.phrack.org/archives/55/p55-0x08-Frame%20Pointer%20Overwriting-by- klog.txt.
    • (1999) Phrack Mag. , vol.55 , pp. 8
  • 39
    • 84859459121 scopus 로고    scopus 로고
    • Payload already inside: Data re-use for ROP exploits
    • LE, L. 2010. Payload already inside: Data re-use for ROP exploits. Black Hat. https://media.blackhat.com/bh-us-10/whitepapers/Le/BlackHat-USA-2010-Le- Paper-Payloadalready- inside-data-reuse-for-ROP-exploits-wp.pdf.
    • (2010) Black Hat
    • L, E.L.1
  • 40
    • 77954614533 scopus 로고    scopus 로고
    • Defeating return-oriented rootkits with "return-less" kernels
    • G. Muller Ed., ACM Press
    • LI, J., WANG, Z., JIANG, X., GRACE, M., AND BAHRAM, S. 2010. Defeating return-oriented rootkits with "return-less" kernels. In Proceedings of the EuroSys Conference. G. Muller Ed., ACM Press, 195-208.
    • (2010) Proceedings of the EuroSys Conference , pp. 195-208
    • L, I.J.1    Wang, Z.2    Jiang, X.3    Grace, M.4    Bahram, S.5
  • 43
    • 84859460046 scopus 로고    scopus 로고
    • Presented at the BlackHat Europe 2009 Conference
    • MILLER, C. AND IOZZO, V. 2009. Fun and games with Mac OS X and iPhone payloads. Presented at the BlackHat Europe 2009 Conference. https://www. blackhat.com/presentations/bh-europe-09/ Miller-Iozzo/BlackHat-Europe-2009- Miller-Iozzo-OSX-IPhone-Payloads-whitepaper.pdf.
    • (2009) Fun and Games with Mac OS X and IPhone Payloads.
    • Miller, C.1    Iozzo, V.2
  • 45
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PaX case study
    • NERGAL.
    • NERGAL. 2001. The advanced return-into-lib(c) exploits: PaX case study. Phrack Mag. 58, 4. http://www.phrack.org/archives/58/p58-0x04-Advanced%20return- into-lib(c)%20exploits% 20(PaX%20case%20study)-by-nergal.txt.
    • (2001) Phrack Mag. , vol.58 , pp. 4
  • 47
    • 84859453834 scopus 로고    scopus 로고
    • Bugtraq
    • NEWSHAM, T. 2000. Non-exec stack. Bugtraq. http://seclists.org/bugtraq/ 2000/May/90.
    • (2000) Non-exec Stack.
    • Newsham, T.1
  • 53
    • 78649987049 scopus 로고    scopus 로고
    • Bugtraq. http://seclists.org/bugtraq/2000/Nov/26
    • RICHARTE, G. 2000. Re: Future of buffer overflows? Bugtraq. http://seclists.org/bugtraq/2000/Nov/32 and http://seclists.org/bugtraq/2000/ Nov/26.
    • (2000) Re: Future of Buffer Overflows?
    • Richarte, G.1
  • 59
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • S. D. Capitani and P. Syverson Eds., ACM Press
    • SHACHAM, H. 2007. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the ACM Conference on Computer and Communications Security (CCS'07). S. D. Capitani and P. Syverson Eds., ACM Press, 552-561.
    • (2007) Proceedings of the ACM Conference on Computer and Communications Security (CCS'07) , pp. 552-561
    • Shacham, H.1
  • 62
    • 84859459124 scopus 로고    scopus 로고
    • SOLAR DESIGNER.
    • SOLAR DESIGNER. 1998. StackPatch. http://www.openwall.com/linux.
    • (1998) StackPatch


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.