메뉴 건너뛰기




Volumn , Issue , 2014, Pages 145-152

On the effectiveness of NX, SSP, RenewSSP, and ASLR against stack buffer overflows

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY; OPEN SOURCE SOFTWARE; SECURITY OF DATA;

EID: 84911162009     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NCA.2014.28     Document Type: Conference Paper
Times cited : (27)

References (13)
  • 4
    • 7244258833 scopus 로고    scopus 로고
    • New chips stop buffer overflow attacks
    • L. D. Paulson, "New chips stop buffer overflow attacks," Computer, vol. 37, no. 10, pp. 28-30, 2004.
    • (2004) Computer , vol.37 , Issue.10 , pp. 28-30
    • Paulson, L.D.1
  • 6
    • 84889014187 scopus 로고    scopus 로고
    • A. 'pi3' Zabrocki, November, [Online]
    • A. 'pi3' Zabrocki, "Scraps of notes on remote stack overflow exploitation," November 2010. [Online]. Available: http://www.phrack.org/issues.html?issue=67&id=13#article
    • (2010) Scraps of Notes on Remote Stack Overflow Exploitation
  • 9
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PaX case study
    • Nergal
    • Nergal, "The advanced return-into-lib(c) exploits: PaX case study," Phrack, no. 58, 2001.
    • (2001) Phrack , Issue.58
  • 10
    • 84859457954 scopus 로고    scopus 로고
    • Return-oriented programming: Systems, languages, and applications
    • Mar., [Online]
    • R. Roemer, E. Buchanan, H. Shacham, and S. Savage, "Return-oriented programming: Systems, languages, and applications," ACM Trans. Inf. Syst. Secur., vol. 15, no. 1, pp. 2:1-2:34, Mar. 2012. [Online]. Available: http://doi.acm.org/10.1145/2133375.2133377
    • (2012) ACM Trans. Inf. Syst. Secur. , vol.15 , Issue.1 , pp. 21-234
    • Roemer, R.1    Buchanan, E.2    Shacham, H.3    Savage, S.4
  • 11
    • 84889011675 scopus 로고    scopus 로고
    • Bypassing stackguard and stackshield
    • Bulba and Kil3r
    • Bulba and Kil3r, "Bypassing stackguard and stackshield," Phrack, 56, 2002.
    • (2002) Phrack , vol.56
  • 12
    • 84911032889 scopus 로고    scopus 로고
    • NIST, September, [Online]
    • NIST. (2011, September) Vulnerability Summary for CVE-2010-3867. [Online]. Available: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3867
    • (2011) Vulnerability Summary for CVE-2010-3867
  • 13
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • E. Bhatkar, D. C. Duvarney, and R. Sekar, "Address obfuscation: an efficient approach to combat a broad range of memory error exploits," in In Proceedings of the 12th USENIX Security Symposium, 2003, pp. 105-120.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, E.1    Duvarney, D.C.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.