메뉴 건너뛰기




Volumn , Issue , 2012, Pages 143-148

RIM: A method to defend from JIT spraying attack

Author keywords

JIT spraying attack; Just In Time Compilation; malicious script

Indexed keywords

ARITHMETIC INSTRUCTIONS; ARITHMETIC OPERATIONS; CODE REUSE; JAVASCRIPT; JIT COMPILER; JIT SPRAYING ATTACK; JUST IN TIME; JUST-IN-TIME COMPILATION; MALICIOUS CODES; MALICIOUS SCRIPT; NATIVE CODE; PROTECTION MECHANISMS; SHELLCODE; VIRTUAL MACHINES; WEB APPLICATION;

EID: 84869467444     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2012.11     Document Type: Conference Paper
Times cited : (11)

References (22)
  • 3
    • 84870640596 scopus 로고    scopus 로고
    • Jit-spray attacks & advanced shellcode (2010). http://dsecrg.com/ files/pub/pdf/HITB%20-%20JITSpray%20Attacks%20and%20Advanced%20Shellcode.pdf.
    • (2010) Jit-spray Attacks & Advanced Shellcode
  • 4
    • 84870641125 scopus 로고    scopus 로고
    • Kvm. http://www.linux-kvm.org/page/Main-Page.
    • Kvm
  • 5
    • 84870643885 scopus 로고    scopus 로고
    • Qemu. http://wiki.qemu.org/Main Page.
  • 6
    • 84870635365 scopus 로고    scopus 로고
    • Tamarin project. http://wwwarchive.mozilla.org/projects/tamarin/.
    • Tamarin Project
  • 8
    • 84864919846 scopus 로고    scopus 로고
    • Jit spraying and mitigations
    • abs/1009.1038
    • P. Bania. Jit spraying and mitigations. CoRR, abs/1009.1038, 2010.
    • (2010) CoRR
    • Bania, P.1
  • 10
    • 79960876719 scopus 로고    scopus 로고
    • Jitdefender: A defense against jit spraying attacks
    • J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, and C. Rieder, editors, Future Challenges in Security and Privacy for Academia and Industry
    • P. Chen, Y. Fang, B. Mao, and L. Xie. Jitdefender: A defense against jit spraying attacks. In J. Camenisch, S. Fischer-Hübner, Y. Murayama, A. Portmann, and C. Rieder, editors, Future Challenges in Security and Privacy for Academia and Industry, volume 354 of IFIP Advances in Information and Communication Technology, pages 142-153.
    • IFIP Advances in Information and Communication Technology , vol.354 , pp. 142-153
    • Chen, P.1    Fang, Y.2    Mao, B.3    Xie, L.4
  • 11
    • 71549162538 scopus 로고    scopus 로고
    • Drop: Detecting return-oriented programming malicious code
    • A. Prakash and I. Sen Gupta, editors, Information Systems Security
    • P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie. Drop: Detecting return-oriented programming malicious code. In A. Prakash and I. Sen Gupta, editors, Information Systems Security, volume 5905 of Lecture Notes in Computer Science, pages 163-177.
    • Lecture Notes in Computer Science , vol.5905 , pp. 163-177
    • Chen, P.1    Xiao, H.2    Shen, X.3    Yin, X.4    Mao, B.5    Xie, L.6
  • 14
    • 76549111997 scopus 로고    scopus 로고
    • Mitigating driveby download attacks: Challenges and open problems
    • J. Camenisch and D. Kesdogan, editors, iNetSec 2009 C Open Research Problems in Network Security
    • M. Egele, E. Kirda, and C. Kruegel. Mitigating driveby download attacks: Challenges and open problems. In J. Camenisch and D. Kesdogan, editors, iNetSec 2009 C Open Research Problems in Network Security, volume 309 of IFIP Advances in Information and Communication Technology, pages 52-62.
    • IFIP Advances in Information and Communication Technology , vol.309 , pp. 52-62
    • Egele, M.1    Kirda, E.2    Kruegel, C.3
  • 15
    • 70350626575 scopus 로고    scopus 로고
    • Defending browsers against drive-by downloads: Mitigating heapspraying code injection attacks
    • U. Flegel and D. Bruschi, editors, Detection of Intrusions and Malware, and Vulnerability Assessment
    • M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda. Defending browsers against drive-by downloads: Mitigating heapspraying code injection attacks. In U. Flegel and D. Bruschi, editors, Detection of Intrusions and Malware, and Vulnerability Assessment, volume 5587 of Lecture Notes in Computer Science, pages 88-106.
    • Lecture Notes in Computer Science , vol.5587 , pp. 88-106
    • Egele, M.1    Wurzinger, P.2    Kruegel, C.3    Kirda, E.4
  • 16
    • 77949446893 scopus 로고    scopus 로고
    • Bubble: A javascript engine level countermeasure against heap-spraying attacks
    • F. Massacci, D. Wallach, and N. Zannone, editors, Engineering Secure Software and Systems
    • F. Gadaleta, Y. Younan, and W. Joosen. Bubble: A javascript engine level countermeasure against heap-spraying attacks. In F. Massacci, D. Wallach, and N. Zannone, editors, Engineering Secure Software and Systems, volume 5965 of Lecture Notes in Computer Science, pages 1-17.
    • Lecture Notes in Computer Science , vol.5965 , pp. 1-17
    • Gadaleta, F.1    Younan, Y.2    Joosen, W.3
  • 17
    • 84870645163 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation. On the effectiveness of DEP and ASLR. http://blogs.technet.com/b/srd/archive/2010/12/08/onthe-effectiveness-of-dep- and-aslr.aspx.
    • On the Effectiveness of DEP and ASLR
  • 18
    • 84870633476 scopus 로고    scopus 로고
    • The Pax team. http://pax.grsecurity.net/docs/aslr.txt.
  • 19
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • New York, NY, USA, ACM
    • H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security, CCS '07, pages 552-561, New York, NY, USA, 2007. ACM.
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07 , pp. 552-561
    • Shacham, H.1
  • 20
    • 84869404004 scopus 로고    scopus 로고
    • Writing JITspray shellcode for fun and profit
    • Sintsov. In Technical Report of Digital, 2010. Writing JITspray shellcode for fun and profit.
    • (2010) Technical Report of Digital
    • Sintsov1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.