메뉴 건너뛰기




Volumn , Issue , 2012, Pages 157-168

Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code

Author keywords

Obfuscation; Randomization; Return oriented programming; Software security

Indexed keywords

ADDRESS SPACE; BASIC BLOCKS; BINARY FEATURES; BINARY TRANSFORMATION; DYNAMIC LINKING; LIBRARY CODES; LINUX PLATFORM; NATIVE CODE; OBFUSCATION; RANDOMIZATION; REALISTIC APPLICATIONS; RUNTIMES; SOFTWARE SECURITY; SOURCE CODES;

EID: 84869451043     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382216     Document Type: Conference Paper
Times cited : (306)

References (61)
  • 4
    • 84864849849 scopus 로고    scopus 로고
    • Part 3: Memory protection technologies
    • V. Abella, editor. Microsoft TechNet
    • S. Andersen. Part 3: Memory protection technologies. In V. Abella, editor, Changes in Functionality in Windows XP Service Pack 2. Microsoft TechNet, 2004. http://technet.microsoft.com/en-us/library/bb457155.aspx.
    • (2004) Changes in Functionality in Windows XP Service Pack 2
    • Andersen, S.1
  • 9
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. 12th USENIX Security Symposium, pages 105-120, 2003.
    • (2003) Proc. 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 10
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In Proc. 14th USENIX Security Symposium, pages 255-270, 2005.
    • (2005) Proc. 14th USENIX Security Symposium , pp. 255-270
    • Bhatkar, S.1    Sekar, R.2    Duvarney, D.C.3
  • 20
    • 84870645610 scopus 로고    scopus 로고
    • Corelan Team. Mona, 2012. http://redmine.corelan.be/projects/mona.
    • (2012)
  • 30
    • 33745203232 scopus 로고    scopus 로고
    • chapter 4: The Age-Old Art of Hooking, Pearson Education, Inc.
    • G. Hoglund and J. Butler. Rootkits: Subverting the Windows Kernel, chapter 4: The Age-Old Art of Hooking, pages 73-74. Pearson Education, Inc., 2006.
    • (2006) Rootkits: Subverting the Windows Kernel , pp. 73-74
    • Hoglund, G.1    Butler, J.2
  • 42
    • 84870647799 scopus 로고    scopus 로고
    • Position-independent code
    • Oracle Corporation. Position-independent code. In Linker and Libraries Guide. 2010. http://docs.oracle.com/cd/E19082-01/819-0690/chapter4-29405/index. html.
    • (2010) Linker and Libraries Guide
  • 44
  • 47
    • 70349127596 scopus 로고    scopus 로고
    • Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space
    • B. Salamat, T. Jackson, A. Gal, and M. Franz. Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space. In Proc. 4th ACM European Conf. on Computer Systems, pages 33-46, 2009.
    • (2009) Proc. 4th ACM European Conf. on Computer Systems , pp. 33-46
    • Salamat, B.1    Jackson, T.2    Gal, A.3    Franz, M.4
  • 48
    • 84870633182 scopus 로고    scopus 로고
    • J. Salwan. ROPgadget, 2012. http://shell-storm.org/project/ROPgadget.
    • (2012)
    • Salwan, J.1
  • 51
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proc. 14th ACM Conf. on Computer and Communications Security, pages 552-561, 2007.
    • (2007) Proc. 14th ACM Conf. on Computer and Communications Security , pp. 552-561
    • Shacham, H.1
  • 55
    • 77952399470 scopus 로고    scopus 로고
    • "Return-to-libc" attack
    • Solar Designer, August
    • Solar Designer. "return-to-libc" attack. Bugtraq, August 1997.
    • (1997) Bugtraq


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.