메뉴 건너뛰기




Volumn , Issue , 2012, Pages 601-615

Smashing the gadgets: Hindering return-oriented programming using in-place code randomization

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); COSINE TRANSFORMS; PROGRAM DEBUGGING;

EID: 84878363772     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2012.41     Document Type: Conference Paper
Times cited : (300)

References (69)
  • 27
    • 85175132064 scopus 로고    scopus 로고
    • Corelan Team, "Mona," http://redmine.corelan.be/projects/mona.
    • Mona
  • 30
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PaX case study
    • Dec.
    • Nergal, "The advanced return-into-lib(c) exploits: PaX case study," Phrack, vol. 11, no. 58, Dec. 2001.
    • (2001) Phrack , vol.11 , Issue.58
    • Nergal1
  • 34
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • Oct.
    • F. B. Cohen, "Operating system protection through program evolution," Computers and Security, vol. 12, pp. 565-584, Oct. 1993.
    • (1993) Computers and Security , vol.12 , pp. 565-584
    • Cohen, F.B.1
  • 43
    • 84878374701 scopus 로고    scopus 로고
    • Locreate: An anagram for relocate
    • Skape, "Locreate: An anagram for relocate," Uninformed, vol. 6, 2007.
    • (2007) Uninformed , vol.6
    • Skape1
  • 47
  • 50
    • 52349096066 scopus 로고    scopus 로고
    • Practical analysis of stripped binary code
    • December
    • L. C. Harris and B. P. Miller, "Practical analysis of stripped binary code," SIGARCH Comput. Archit. News, vol. 33, pp. 63-68, December 2005.
    • (2005) SIGARCH Comput. Archit. News , vol.33 , pp. 63-68
    • Harris, L.C.1    Miller, B.P.2
  • 55
    • 85175130874 scopus 로고    scopus 로고
    • (2A & 2B): Instruction Set Reference, A-Z
    • ser.
    • Intel 64 and IA-32 Architectures Software Developer's Manual, ser. Volume 2 (2A & 2B): Instruction Set Reference, A-Z, 2011, http://www.intel.com/ Assets/PDF/manual/325383.pdf.
    • (2011) Intel 64 and IA-32 Architectures Software Developer's Manual , vol.2
  • 57
    • 0019530514 scopus 로고
    • ALGORITHM TO GENERATE ALL TOPOLOGICAL SORTING ARRANGEMENTS.
    • Y. L. Varol and D. Rotem, "An algorithm to generate all topological sorting arrangements," Comput. J., vol. 24, no. 1, pp. 83-84, 1981. (Pubitemid 11505179)
    • (1981) Computer Journal , vol.24 , Issue.1 , pp. 83-84
    • Varol, Y.L.1    Rotem, D.2
  • 59
    • 77957355973 scopus 로고    scopus 로고
    • Bypassing Windows hardware-enforced DEP
    • Sep.
    • Skape and Skywing, "Bypassing Windows hardware-enforced DEP," Uninformed, vol. 2, Sep. 2005.
    • (2005) Uninformed , vol.2
    • Skape1    Skywing2
  • 61
    • 85175132052 scopus 로고    scopus 로고
    • "Wine," http://www.winehq.org.
    • Wine
  • 65
    • 84878361127 scopus 로고    scopus 로고
    • Corelan Team, "Corelan ROPdb," https://www.corelan.be/index. php/security/corelan-ropdb/.
    • Corelan ROPdb
  • 66
    • 84878376442 scopus 로고    scopus 로고
    • "Immunity Debugger," http://www.immunityinc.com/products- immdbg.shtml.
    • Immunity Debugger


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.