메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1342-1353

You can run but you can't read: Preventing disclosure exploits in executable code

Author keywords

Buffer overflows; Code reuse attacks; Information leaks; Memory disclosure exploits; Return oriented programming

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE REUSABILITY; JUST IN TIME PRODUCTION;

EID: 84910680268     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660378     Document Type: Conference Paper
Times cited : (126)

References (51)
  • 7
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the Stack for Fun and Profit. Phrack Magazine 49, 14 (1996).
    • (1996) Phrack Magazine , vol.49 , pp. 14
    • One, A.1
  • 8
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • USENIX Association
    • Bhatkar, S., Sekar, R., and DuVarney, D. C. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security Symposium (2005), USENIX Association.
    • (2005) USENIX Security Symposium
    • Bhatkar, S.1    Sekar, R.2    Duvarney, D.C.3
  • 11
    • 26844531642 scopus 로고    scopus 로고
    • Basic integer overflows
    • blexim. Basic Integer Overflows. Phrack Magazine 60, 10 (2002).
    • (2002) Phrack Magazine , vol.60 , pp. 10
    • blexim1
  • 17
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • Davi, L., Lehmann, D., Sadeghi, A.-R., and Monrose, F. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium (2014).
    • (2014) USENIX Security Symposium
    • Davi, L.1    Lehmann, D.2    Sadeghi, A.-R.3    Monrose, F.4
  • 20
    • 34748842480 scopus 로고    scopus 로고
    • Advances in format string exploitation
    • gera. Advances in Format String Exploitation. Phrack Magazine 59, 12 (2002).
    • (2002) Phrack Magazine , vol.59 , pp. 12
    • gera1
  • 34
    • 84910650736 scopus 로고    scopus 로고
    • PaX Team. http://pax.grsecurity.net/.
  • 38
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86
    • Shacham, H. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In ACM Conference on Computer and Communications Security (CCS) (2007).
    • (2007) ACM Conference on Computer and Communications Security (CCS)
    • Shacham, H.1
  • 43
    • 77952405499 scopus 로고    scopus 로고
    • ShadowWalker: Raising the bar for rootkit detection
    • Sparks, S., and Butler, J. ShadowWalker: Raising the Bar for Rootkit detection. In Black Hat Japan (2005).
    • (2005) Black Hat Japan
    • Sparks, S.1    Butler, J.2
  • 48
    • 68149145720 scopus 로고    scopus 로고
    • Address-space layout randomization using code islands
    • IOS Press
    • Xu, H., and Chapin, S. Address-space layout randomization using code islands. In Journal of Computer Security (2009), IOS Press, pp. 331-362.
    • (2009) Journal of Computer Security , pp. 331-362
    • Xu, H.1    Chapin, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.