메뉴 건너뛰기




Volumn 7, Issue 4, 2013, Pages 283-292

JITSafe: A framework against Just-in-time spraying attacks

Author keywords

[No Author keywords available]

Indexed keywords

ADDRESS SPACE; CODE INJECTION ATTACKS; DATA EXECUTION PREVENTIONS; JUST-IN-TIME; OPERATION SYSTEM; RANDOMISATION; TIME WINDOWS; VIRTUAL MACHINES;

EID: 84890631913     PISSN: 17518709     EISSN: 17518717     Source Type: Journal    
DOI: 10.1049/iet-ifs.2012.0142     Document Type: Article
Times cited : (18)

References (32)
  • 1
    • 84890627155 scopus 로고    scopus 로고
    • Windows xp service pack 2
    • Data Execution Prevention (DEP) Available at
    • Data Execution Prevention (DEP) in Windows XP Service Pack 2, Microsoft Corporation, 2006. Available at: Http://www.support. microsoft.com/kb/875352
    • (2006) Microsoft Corporation
  • 2
    • 84890785260 scopus 로고    scopus 로고
    • The Pax project Pax Team 2004 Available at
    • The Pax project, Pax Team, 2004. Available at: Http://www.pax. grsecurity.net/
  • 4
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • New York, NY, USA, ACM
    • Shacham, H.: 'The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)'. Proc. 14th ACM Conf. Computer and Communications Security (CCS), New York, NY, USA, ACM, 2007, pp. 552-561
    • (2007) Proc. 14th ACM Conf. Computer and Communications Security (CCS) , pp. 552-561
    • Shacham, H.1
  • 5
    • 84890609000 scopus 로고    scopus 로고
    • Address Space Layout Randomization in Windows Vista Microsoft Corporation 2006 Available at
    • Address Space Layout Randomization in Windows Vista, Microsoft Corporation, 2006. Available at: Http://www.blogs.msdn.com/b/michaelhoward/ archive/2006/05/26/address-space-layout-randomizationin-windows-vista.aspx
  • 6
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Bhatkar, E., Duvarney, D.C., Sekar, R.: 'Address obfuscation: An efficient approach to combat a broad range of memory error exploits'. Proc. 12th USENIX Security Symp., 2003, pp. 105-120
    • (2003) Proc. 12th USENIX Security Symp , pp. 105-120
    • Bhatkar, E.1    Duvarney, D.C.2    Sekar, R.3
  • 8
    • 78649982227 scopus 로고    scopus 로고
    • Writing jit-spray shellcode for fun and profit
    • Available at
    • Sintsov, A.: 'Writing jit-spray shellcode for fun and profit,' Digital Security Research Group, Tech. Rep., 2010. Available at: Http://www.dsecrg.com/ files/pub/pdf/Writing%20JIT-Spray%20Shellcode%20for% 20fun%20and%20profit.pdf
    • (2010) Digital Security Research Group, Tech. Rep
    • Sintsov, A.1
  • 9
    • 84890750885 scopus 로고    scopus 로고
    • Sintsov: 'Jit-sprary attacks & advanced shellcode,' Digital Security Research Group, Technical Report, 2010. Available at:
    • Sintsov: 'Jit-sprary attacks & advanced shellcode,' Digital Security Research Group, Technical Report, 2010. Available at: Http://www.dsecrg.com/ files/pub/pdf/HITB%20-%20JIT-Spray%20Attacks%20and %20Advanced%20Shellcode.pdf
  • 10
    • 84890742514 scopus 로고    scopus 로고
    • It spraying
    • Available at
    • Liebowitz, M.: 'it spraying': Hackers find new ways to hi-jack applications,' 2011. Available at: Http://www.securitynewsdaily.com/921-jit- spraying-hackers-find-new-ways-to-hijack-documents.html
    • (2011) Hackers Find New Ways to Hi-jack Applications
    • Liebowitz, M.1
  • 11
    • 84890615522 scopus 로고    scopus 로고
    • Wikipedia Heap spraying Available at
    • Wikipedia: 'Heap spraying,' 2010. Available at: Http://www.en. wikipedia.org/wiki/Heap-spraying
    • (2010)
  • 12
    • 84859457954 scopus 로고    scopus 로고
    • Return-oriented programming: Systems, languages, and applications
    • Available at
    • Roemer, R., Buchanan, E., Shacham, H., Savage, S.: 'Return-oriented programming: Systems, languages, and applications', ACM Trans. Inf. Syst. Secur. (TISSEC), 2012, 15, (1), pp. 1-34. Available at: Http ://www.cseweb.ucsd.edu/ ~hovav/papers/rbss12.html
    • (2012) ACM Trans. Inf. Syst. Secur. (TISSEC) , vol.15 , Issue.1 , pp. 1-34
    • Roemer, R.1    Buchanan, E.2    Shacham, H.3    Savage, S.4
  • 14
    • 84890680282 scopus 로고    scopus 로고
    • The WebKit Open Source Project Webkit 2010 Available at
    • The WebKit Open Source Project, Webkit, 2010. Available at: Http ://www.webkit.org/
  • 15
    • 84890754469 scopus 로고    scopus 로고
    • V8 JavaScript Engine Google Inc 2010 Available at
    • V8 JavaScript Engine, Google Inc., 2010. Available at: Http://www.code.google.com/apis/v8/intro.html
  • 16
    • 84890656944 scopus 로고    scopus 로고
    • Google Chrome 0.2.149.27 'SaveAs' Function Buffer Overflow Vulnerability, Security Vulnerability Research Team, 2008. Available at
    • Google Chrome 0.2.149.27 'SaveAs' Function Buffer Overflow Vulnerability, Security Vulnerability Research Team, 2008. Available at: Http://www.seclists. org/bugtraq/2008/Sep/70
  • 17
    • 84890763328 scopus 로고    scopus 로고
    • SAP GUI 7.10 WebViewer3D ActiveX-JIT-Spray Exploit Digital Security Research Group 2010 Available at
    • SAP GUI 7.10 WebViewer3D ActiveX-JIT-Spray Exploit, Digital Security Research Group, 2010. Available at: Http://www.dsecrg.com/files/exploits/SAP- Logon7-System.zip
  • 18
    • 84890623044 scopus 로고    scopus 로고
    • Oracle Document Capture (EasyMail Objects EMSMTP.DLL 6.0.1) ActiveX Control BOF-JIT-Spray Exploit Digital Security Research Group 2010 Available at
    • Oracle Document Capture (EasyMail Objects EMSMTP.DLL 6.0.1) ActiveX Control BOF-JIT-Spray Exploit, Digital Security Research Group, 2010. Available at: Http://www.dsecrg.com/files/exploits/QuikSoft-reverse.zip
  • 21
    • 85084160243 scopus 로고    scopus 로고
    • Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • Berkeley, CA, USA, USENIX Association
    • Cowan, C., Pu, C., Maier, D., et al.: 'Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks'. Proc. Seventh Conf. on USENIX Security Symp. (USENIX), Berkeley, CA, USA, USENIX Association, 1998, pp. 63-78
    • (1998) Proc. Seventh Conf. on USENIX Security Symp. (USENIX) , pp. 63-78
    • Cowan, C.1    Pu, C.2    Maier, D.3
  • 23
  • 24
    • 70350669095 scopus 로고    scopus 로고
    • Available at
    • Sotirov, A.: 'Heap feng shui in javascript,' 2007. Available at: Https ://www.blackhat.com/presentations/bh-europe-07/Sotirov/Presentation/ bh-eu-07-sotirov-apr19.pdf
    • (2007) Heap Feng Shui in Javascript
    • Sotirov, A.1
  • 27
    • 84890686652 scopus 로고    scopus 로고
    • Libemu: 'X86 shellcode detection and emulation,' 2010. Available at
    • Libemu: 'X86 shellcode detection and emulation,' 2010. Available at: Http://www.libemu.mwcollect.org/
  • 28
    • 84924734121 scopus 로고    scopus 로고
    • Nozzle: A defense against heap-spraying code injection attacks
    • Berkeley, CA, USA, USENIX Association
    • Ratanaworabhan, P., Livshits, B., Zorn, B.: 'Nozzle: A defense against heap-spraying code injection attacks'. Proc. 18th Conf. on USENIX Security Symp. (SSYM), Berkeley, CA, USA, USENIX Association, 2009, pp. 169-186
    • (2009) Proc. 18th Conf. on USENIX Security Symp. (SSYM) , pp. 169-186
    • Ratanaworabhan, P.1    Livshits, B.2    Zorn, B.3
  • 31
    • 77949446893 scopus 로고    scopus 로고
    • Bubble: A javascript engine level countermeasure against heap-spraying attacks
    • Massacci, F., Wallach, D., Zannone, N. (Ed.) Springer-Berlin, Heidelberg
    • Gadaleta, F., Younan, Y., Joosen, W.: 'Bubble: A javascript engine level countermeasure against heap-spraying attacks', in Massacci, F., Wallach, D., Zannone, N. (Ed.): 'Engineering Secure Software and Systems' (Springer-Berlin, Heidelberg, 2010), vol. 5965, pp. 1-17
    • (2010) Engineering Secure Software and Systems , vol.5965 , pp. 1-17
    • Gadaleta, F.1    Younan, Y.2    Joosen, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.