메뉴 건너뛰기




Volumn , Issue , 2014, Pages 129-140

A platform for secure static binary instrumentation

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; BINARY SEQUENCES;

EID: 84897515810     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2576195.2576208     Document Type: Conference Paper
Times cited : (62)

References (38)
  • 2
    • 72449145808 scopus 로고    scopus 로고
    • Controlflow integrity principles, implementations, and applications
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Controlflow integrity principles, implementations, and applications. ACM TISSEC, 2009.
    • (2009) ACM TISSEC
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 4
    • 84877692058 scopus 로고    scopus 로고
    • A compiler-level intermediate representation based binary analysis and rewriting system
    • K. Anand, M. Smithson, K. Elwazeer, A. Kotha, and J. Gruen et al. A compiler-level intermediate representation based binary analysis and rewriting system. In EuroSys, 2013.
    • (2013) EuroSys
    • Anand, K.1    Smithson, M.2    Elwazeer, K.3    Kotha, A.4    Gruen, J.5
  • 6
    • 84897489745 scopus 로고    scopus 로고
    • Mitigating code-reuse attacks with control-flow locking
    • T. Bletsch, X. Jiang, and V. Freeh. Mitigating code-reuse attacks with control-flow locking. In ACSAC, 2011.
    • (2011) ACSAC
    • Bletsch, T.1    Jiang, X.2    Freeh, V.3
  • 7
    • 84886049933 scopus 로고    scopus 로고
    • Software-based transparent and comprehensive control-flow error detection
    • E. Borin, C. Wang, Y. Wu, and G. Araujo. Software-based transparent and comprehensive control-flow error detection. In CGO, 2006.
    • (2006) CGO
    • Borin, E.1    Wang, C.2    Wu, Y.3    Araujo, G.4
  • 11
    • 79956023817 scopus 로고    scopus 로고
    • DROP: Detecting return-oriented programming malicious code
    • P. Chen, H. Xiao, X. Shen, X. Yin, and B. Mao et al. DROP: detecting return-oriented programming malicious code. In ICISS, 2009.
    • (2009) ICISS
    • Chen, P.1    Xiao, H.2    Shen, X.3    Yin, X.4    Mao, B.5
  • 12
    • 79956032720 scopus 로고    scopus 로고
    • ROPdefender: A detection tool to defend against return-oriented programming attacks
    • L. Davi, A.-R. Sadeghi, and M. Winandy. ROPdefender: a detection tool to defend against return-oriented programming attacks. In ASIACCS, 2011.
    • (2011) ASIACCS
    • Davi, L.1    Sadeghi, A.-R.2    Winandy, M.3
  • 13
    • 84883093655 scopus 로고    scopus 로고
    • Scalable variable and data type detection in a binary rewriter
    • K. ElWazeer, K. Anand, A. Kotha, M. Smithson, and R. Barua. Scalable variable and data type detection in a binary rewriter. In PLDI, 2013.
    • (2013) PLDI
    • Elwazeer, K.1    Anand, K.2    Kotha, A.3    Smithson, M.4    Barua, R.5
  • 15
    • 84858758065 scopus 로고    scopus 로고
    • Vx32: Lightweight user-level sandboxing on the x86
    • B. Ford and R. Cox. Vx32: lightweight user-level sandboxing on the x86. In USENIX ATC, 2008.
    • (2008) USENIX ATC
    • Ford, B.1    Cox, R.2
  • 19
    • 31944440969 scopus 로고    scopus 로고
    • Pin: Building customized program analysis tools with dynamic instrumentation
    • C.-K. Luk, R. Cohn, R. Muth, H. Patil, and A. Klauser et al. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI, 2005.
    • (2005) PLDI
    • Luk, C.-K.1    Cohn, R.2    Muth, R.3    Patil, H.4    Klauser, A.5
  • 21
    • 84886067644 scopus 로고    scopus 로고
    • BIRD: Binary interpretation using runtime disassembly
    • S. Nanda, W. Li, L.-C. Lam, and T.-c. Chiueh. BIRD: binary interpretation using runtime disassembly. In CGO, 2006.
    • (2006) CGO
    • Nanda, S.1    Li, W.2    Lam, L.-C.3    Chiueh, T.-C.4
  • 22
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: A framework for heavyweight dynamic binary instrumentation
    • N. Nethercote and J. Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. In PLDI, 2007.
    • (2007) PLDI
    • Nethercote, N.1    Seward, J.2
  • 23
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1
  • 24
    • 78751484536 scopus 로고    scopus 로고
    • G-Free: Defeating return-oriented programming through gadget-less binaries
    • K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-Free: defeating return-oriented programming through gadget-less binaries. In ACSAC, 2010.
    • (2010) ACSAC
    • Onarlioglu, K.1    Bilge, L.2    Lanzi, A.3    Balzarotti, D.4    Kirda, E.5
  • 25
    • 84878363772 scopus 로고    scopus 로고
    • Smashing the gadgets: Hindering return-oriented programming using inplace code randomization
    • V. Pappas, M. Polychronakis, and A. Keromytis. Smashing the gadgets: Hindering return-oriented programming using inplace code randomization. In S&P, 2012.
    • (2012) S&P
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.3
  • 26
    • 79953214068 scopus 로고    scopus 로고
    • Fine-grained user-space security through virtualization
    • M. Payer and T. Gross. Fine-grained user-space security through virtualization. In VEE, 2011.
    • (2011) VEE
    • Payer, M.1    Gross, T.2
  • 27
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack based overflow attacks
    • M. Prasad and T.-c. Chiueh. A binary rewriting defense against stack based overflow attacks. In USENIX ATC, 2003.
    • (2003) USENIX ATC
    • Prasad, M.1    Chiueh, T.-C.2
  • 28
    • 40349087553 scopus 로고    scopus 로고
    • LIFT: A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin, C. Wang, Z. Li, H.-s. Kim, and Y. Zhou et al. LIFT: a low-overhead practical information flow tracking system for detecting security attacks. In MICRO, 2006.
    • (2006) MICRO
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.-S.4    Zhou, Y.5
  • 29
    • 43449135047 scopus 로고    scopus 로고
    • Efficient fine-grained binary instrumentation with applications to taint-tracking
    • P. Saxena, R. Sekar, and V. Puranik. Efficient fine-grained binary instrumentation with applications to taint-tracking. In CGO, 2008.
    • (2008) CGO
    • Saxena, P.1    Sekar, R.2    Puranik, V.3
  • 30
    • 84943385283 scopus 로고    scopus 로고
    • Retargetable and reconfigurable software dynamic translation
    • K. Scott, N. Kumar, S. Velusamy, B. Childers, and J. Davidson et al. Retargetable and reconfigurable software dynamic translation. In CGO, 2003.
    • (2003) CGO
    • Scott, K.1    Kumar, N.2    Velusamy, S.3    Childers, B.4    Davidson, J.5
  • 31
    • 70449684394 scopus 로고    scopus 로고
    • BitBlaze: A new approach to computer security via binary analysis
    • D. Song, D. Brumley, H. Yin, J. Caballero, and I. Jager et al. BitBlaze: a new approach to computer security via binary analysis. In ICISS, 2008.
    • (2008) ICISS
    • Song, D.1    Brumley, D.2    Yin, H.3    Caballero, J.4    Jager, I.5
  • 33
    • 84872114405 scopus 로고    scopus 로고
    • Securing untrusted code via compiler-agnostic binary rewriting
    • R. Wartell, V. Mohan, K. Hamlen, and Z. Lin. Securing untrusted code via compiler-agnostic binary rewriting. In ACSAC, 2012.
    • (2012) ACSAC
    • Wartell, R.1    Mohan, V.2    Hamlen, K.3    Lin, Z.4
  • 34
    • 84869451043 scopus 로고    scopus 로고
    • Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
    • R.Wartell, V. Mohan, K. Hamlen, and Z. Lin. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. In CCS, 2012.
    • (2012) CCS
    • Wartell, R.1    Mohan, V.2    Hamlen, K.3    Lin, Z.4
  • 35
    • 69149106605 scopus 로고    scopus 로고
    • Native Client: A sandbox for portable, untrusted x86 native code
    • B. Yee, D. Sehr, G. Dardyk, J. B. Chen, and R. Muth et al. Native Client: a sandbox for portable, untrusted x86 native code. In S&P, 2009.
    • (2009) S&P
    • Yee, B.1    Sehr, D.2    Dardyk, G.3    Chen, J.B.4    Muth, R.5
  • 37
    • 84881218812 scopus 로고    scopus 로고
    • Practical control flow integrity & randomization for binary executables
    • C. Zhang, T. Wei, Z. Chen, L. Duan, and L. Szekeres et al. Practical control flow integrity & randomization for binary executables. In S&P, 2013.
    • (2013) S&P
    • Zhang, C.1    Wei, T.2    Chen, Z.3    Duan, L.4    Szekeres, L.5
  • 38
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for COTS binaries
    • M. Zhang and R. Sekar. Control flow integrity for COTS binaries. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.