메뉴 건너뛰기




Volumn , Issue , 2013, Pages

String oriented programming: When ASLR is not enough

Author keywords

[No Author keywords available]

Indexed keywords

ADDRESS SPACE LAYOUT RANDOMIZATIONS; ATTACK VECTOR; DATA EXECUTION PREVENTIONS; FORMAT STRING; MEMORY REGION; RETURN-ORIENTED PROGRAMMING; RUNNING APPLICATIONS; SOFTWARE SYSTEMS; STATIC MEMORY; STATIC PROGRAM ANALYSIS;

EID: 84874142484     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2430553.2430555     Document Type: Conference Paper
Times cited : (15)

References (26)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • ALEPH1. Nov.
    • ALEPH1. Smashing the stack for fun and profit. Phrack 7, 49 (Nov. 1996), http://phrack.com/issues.html?issue=49&id=14.
    • (1996) Phrack , vol.7 , pp. 49
  • 3
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack smashing attacks
    • BARATLOO, A., SINGH, N., AND TSAI, T. Transparent run-time defense against stack smashing attacks. In Proc. USENIX ATC (2000), pp. 251-262.
    • Proc. USENIX ATC (2000) , pp. 251-262
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 6
    • 84874170056 scopus 로고    scopus 로고
    • The house of lore: Reloaded
    • Nov.
    • BLACKNGEL. The house of lore: Reloaded. Phrack 14, 67 (Nov. 2010), http://phrack.com/issues.html?issue=67&id=8.
    • (2010) Phrack , vol.14 , pp. 67
    • Blackngel1
  • 13
    • 34748842480 scopus 로고    scopus 로고
    • Advances in format string exploitation
    • GERA, AND RIQ. Advances in format string exploitation. Phrack 11, 59 (2002), http://phrack.com/issues.html?issue=59&id=7.
    • (2002) Phrack , vol.11 , pp. 59
    • Gera1    Riq2
  • 14
    • 84874177500 scopus 로고    scopus 로고
    • Advanced format string attacks
    • HAAS, P. Advanced format string attacks. https://www.defcon.org/images/ defcon-18/dc-18-presentations/Haas/DEFCON-18-Haas-Adv-Format-String-Attacks.pdf, DEFCON 18 2010.
    • (2010) DEFCON , vol.18
    • Haas, P.1
  • 15
    • 14844332687 scopus 로고    scopus 로고
    • ProPolice: Improved stack-smashing attack detection
    • HIROAKI, E., AND KUNIKAZU, Y. ProPolice: Improved stack-smashing attack detection. IPSJ SIG Notes (2001), 181- 188.
    • (2001) IPSJ SIG Notes , pp. 181-188
    • Hiroaki, E.1    Kunikazu, Y.2
  • 16
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits
    • Nov.
    • NERGAL. The advanced return-into-lib(c) exploits. Phrack 11, 58 (Nov. 2007), http://phrack.com/issues.html?issue=67&id=8.
    • (2007) Phrack , vol.11 , pp. 58
    • Nergal1
  • 20
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • PINCUS, J., AND BAKER, B. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy 2 (2004), 20-27.
    • (2004) IEEE Security and Privacy , vol.2 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 21
    • 84914134690 scopus 로고    scopus 로고
    • A eulogy for format strings
    • PLANET, C. A eulogy for format strings. Phrack 14, 67 (2010), http://phrack.com/issues.html?issue=67&id=8.
    • (2010) Phrack , vol.14 , pp. 67
    • Planet, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.