메뉴 건너뛰기




Volumn , Issue , 2014, Pages 1317-1328

RockJIT: Securing Just-In-Time compilation using modular Control-Flow Integrity

Author keywords

Control Flow Integrity; Just In Time Compilation; Modularity

Indexed keywords

CODES (SYMBOLS); DATA FLOW ANALYSIS; FLOW GRAPHS; GRAPHIC METHODS; JUST IN TIME PRODUCTION; PROGRAM COMPILERS;

EID: 84910681910     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660281     Document Type: Conference Paper
Times cited : (82)

References (38)
  • 1
    • 84910627299 scopus 로고    scopus 로고
    • Google V8 vulnerabilities. http://www.cvedetails.com/product/17734/Google-V8.html?vendor-id=1224.
    • Google V8 Vulnerabilities
  • 2
    • 84871337216 scopus 로고    scopus 로고
    • Itanium c++ abi. http://mentorembedded.github.io/cxx-abi/abi.html.
    • Itanium C++ Abi
  • 5
    • 84910684630 scopus 로고    scopus 로고
    • Personal communication March
    • ANSEL, J. Personal communication, March 2014.
    • (2014)
    • Ansel, J.1
  • 11
    • 84890631913 scopus 로고    scopus 로고
    • JITSafe: A framework against just-in-time spraying attacks
    • December
    • CHEN, P., WU, R., AND MAO, B. JITSafe: A Framework Against Just-In-Time Spraying Attacks. Information Security, IET 7, 4 (December 2013), 283-292.
    • (2013) Information Security, IET , vol.7 , Issue.4 , pp. 283-292
    • Chen, P.1    Wu, R.2    Mao, B.3
  • 13
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • Aug USENIX Association
    • DAVI, L., LEHMANN, D., SADEGHI, A., AND MONROSE, F. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium (USENIX Security 14) (Aug. 2014), USENIX Association.
    • (2014) 23rd USENIX Security Symposium (USENIX Security 14)
    • Davi, L.1    Lehmann, D.2    Sadeghi, A.3    Monrose, F.4
  • 17
    • 84945709825 scopus 로고
    • Trie memory
    • Sept
    • FREDKIN, E. Trie Memory. Communications of ACM 3, 9 (Sept. 1960), 490-499.
    • (1960) Communications of ACM , vol.3 , Issue.9 , pp. 490-499
    • Fredkin, E.1
  • 19
    • 85006805669 scopus 로고
    • Optimizing dynamically-typed object-oriented languages with polymorphic inline caches
    • P. America, Ed., 512 of Lecture Notes in Computer Science Springer Berlin Heidelberg
    • HÖLZLE, U., CHAMBERS, C., AND UNGAR, D. Optimizing Dynamically-Typed Object-Oriented Languages with Polymorphic Inline Caches. In ECOOP'91 European Conference on Object-Oriented Programming, P. America, Ed., vol. 512 of Lecture Notes in Computer Science. Springer Berlin Heidelberg, 1991, pp. 21-38.
    • (1991) ECOOP'91 European Conference on Object-Oriented Programming , pp. 21-38
    • Hölzle, U.1    Chambers, C.2    Ungar, D.3
  • 33
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • May
    • WANG, Z., AND JIANG, X. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In Security and Privacy (SP), 2010 IEEE Symposium on (May 2010), pp. 380-395.
    • (2010) Security and Privacy (Sp), 2010 IEEE Symposium on , pp. 380-395
    • Wang, Z.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.