메뉴 건너뛰기




Volumn 9, Issue 4, 2013, Pages

Feedback-driven binary code diversification

Author keywords

Binary doffing; Compiler transformations; Patches; Program matching; Software diversity

Indexed keywords

BINARY DOFFING; COMPILER TRANSFORMATIONS; PATCHES; PROGRAM MATCHING; SOFTWARE DIVERSITY;

EID: 84872981876     PISSN: 15443566     EISSN: 15443973     Source Type: Journal    
DOI: 10.1145/2400682.2400683     Document Type: Article
Times cited : (32)

References (60)
  • 7
    • 84872954196 scopus 로고    scopus 로고
    • BARTHEN. [WoW] [3.0.9] Symbolic info
    • BARTHEN. 2009. [WoW] [3.0.9] Symbolic info. http://www.mmowned.com/ forums/world-of-warcraft/botsprograms/memory-editing/219320-wow-3-0-9-symbolic- info.html.
    • (2009)
  • 9
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • BHATKAR, S., DUVARNEY, D., AND SEKAR, R. 2003. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium. 105-120.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    Duvarney, D.2    Sekar, R.3
  • 10
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-Secure fingerprinting for digital data
    • BONEH, D. AND SHAW, J. 1998. Collusion-Secure fingerprinting for digital data. IEEE Trans. Info. Theory 44, 5, 1897-1905.
    • (1998) IEEE Trans. Info. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 12
    • 0027684663 scopus 로고
    • Operating system evolution through program evolution
    • COHEN, F. 1993. Operating system evolution through program evolution. Comput. Secur. 12, 6, 565-584.
    • (1993) Comput. Secur. , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 37
    • 0022161646 scopus 로고
    • A file comparison program
    • MILLER, W. AND MYERS, E. 1985. A file comparison program. Softw. Pract. Exper. 15, 11, 1025-1040.
    • (1985) Softw. Pract. Exper. , vol.15 , Issue.11 , pp. 1025-1040
    • Miller, W.1    Myers, E.2
  • 38
    • 84872971161 scopus 로고    scopus 로고
    • MOORE, H. 2008. Exploiting IIS via HTMLEncode (MS08-006). https://strikecenter.bpointsys.com/articles/permalink?month=02&year= 2008&title=Exploiting-lis-via-html-encode-ms08-006&day=13.
    • (2008) Exploiting IIS Via HTMLEncode (MS08-006)
    • Moore, H.1
  • 41
    • 84872969630 scopus 로고    scopus 로고
    • Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries
    • OH, J. 2009. Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries. In BlackHat USA. http://www.blackhat.com/html/bh-usa-09/ bh-usa-09-archives.html.
    • (2009) BlackHat USA
    • H, J.O.1
  • 47
    • 84872920384 scopus 로고    scopus 로고
    • SLAWLERGUY
    • SLAWLERGUY. 2008. Reversing the ms08-067 patch. http:// dontstoffbearsuppurpose.com/2008/10/23/lookingat-ms08-067/.
    • (2008) Reversing the ms08-067 Patch
  • 51
    • 0015960104 scopus 로고
    • The string-to-string correction problem
    • WAGNER, R. AND FISCHER, M. 1974. The string-to-string correction problem. J. ACM 21, 1, 168-173.
    • (1974) J. ACM , vol.21 , Issue.1 , pp. 168-173
    • Wagner, R.1    Fischer, M.2
  • 55
    • 0013143403 scopus 로고    scopus 로고
    • Bmat-A binary matching tools for stale profile propagation
    • WANG, Z., PIERCE, K., AND MCFARLING, S. 2000. Bmat-a binary matching tools for stale profile propagation. J. Instruct. Level Parallel. 2, 1-20.
    • (2000) J. Instruct. Level Parallel. , vol.2 , pp. 1-20
    • Wang, Z.1    Pierce, K.2    McFarling, S.3
  • 57
    • 84997350878 scopus 로고    scopus 로고
    • Whole execution traces and their applications
    • ZHANG, X. AND GUPTA, R. 2005b. Whole execution traces and their applications. ACM Trans. Archit. Code Optim. 2, 3, 301-334.
    • (2005) ACM Trans. Archit. Code Optim. , vol.2 , Issue.3 , pp. 301-334
    • Zhang, X.1    Gupta, R.2
  • 58
    • 34547467422 scopus 로고    scopus 로고
    • Diversity via code transformations: A solution for NGNA renewable security
    • ZHOU, Y. AND MAIN, A. 2006. Diversity via code transformations: A solution for NGNA renewable security. In NCTA-The National Show.
    • (2006) NCTA-The National Show
    • Zhou, Y.1    Main, A.2
  • 59
    • 84872942112 scopus 로고    scopus 로고
    • ZYNAMICS BinDiff
    • ZYNAMICS. 2012a. BinDiff. http://www.zynamics.com/bindiff.html.
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.