메뉴 건너뛰기




Volumn , Issue , 2014, Pages 227-242

Hacking blind

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; PERSONAL COMPUTING;

EID: 84914132233     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.22     Document Type: Conference Paper
Times cited : (258)

References (35)
  • 1
    • 84859457954 scopus 로고    scopus 로고
    • Return-oriented programming: Systems, languages, and applications
    • Mar. [Online]
    • R. Roemer, E. Buchanan, H. Shacham, and S. Savage, "Return-oriented programming: Systems, languages, and applications," ACM Trans. Inf. Syst. Secur., vol. 15, no. 1, pp. 2:1-2:34, Mar. 2012. [Online]. Available: http://doi.acm.org/10.1145/2133375.2133377
    • (2012) ACM Trans. Inf. Syst. Secur. , vol.15 , Issue.1 , pp. 1-34
    • Roemer, R.1    Buchanan, E.2    Shacham, H.3    Savage, S.4
  • 2
    • 84914126478 scopus 로고    scopus 로고
    • [Online]
    • mitre. Cve-2013-2028. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2028
    • Mitre. Cve-2013-2028
  • 3
    • 84914126478 scopus 로고    scopus 로고
    • Cve-2008-0226. [Online]
    • -. Cve-2008-0226. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226
    • Mitre. Cve-2013-2028
  • 4
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Nov. [Online]
    • A. One, "Smashing The Stack For Fun And Profit," Phrack, vol. 7, no. 49, Nov. 1996. [Online]. Available: http://phrack.com/issues.html?issue=49&id=14#article
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 8
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a board range of memory error exploits
    • ser. SSYM'03. Berkeley, CA, USA: USENIX Association, [Online]
    • S. Bhatkar, D. C. DuVarney, and R. Sekar, "Address obfuscation: an efficient approach to combat a board range of memory error exploits," in Proceedings of the 12th conference on USENIX Security Symposium - Volume 12, ser. SSYM'03. Berkeley, CA, USA: USENIX Association, 2003, pp. 8-8. [Online]. Available: http://dl.acm.org/citation.cfm?id=1251353.1251361
    • (2003) Proceedings of the 12th Conference on USENIX Security Symposium , vol.12 , pp. 8-8
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 10
    • 84914126476 scopus 로고    scopus 로고
    • gera and riq. [Online]
    • gera and riq. Advances in format string exploitation. [Online]. Available: http://www.phrack.org/archives/59/p59 0x07 Advances% 20in%20format%20string%20exploitation by riq%20&%20gera.txt
    • Advances in Format String Exploitation
  • 13
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing stackguard and stackshield
    • May [Online]
    • Bulba and Kil3r, "Bypassing stackguard and stackshield," Phrack Magazine, May 2000. [Online]. Available: http://phrack.org/issues.html?issue=56&id=5#article
    • (2000) Phrack Magazine
  • 16
    • 84914126474 scopus 로고    scopus 로고
    • [Online]
    • Ubuntu security features. [Online]. Available: https://wiki.ubuntu.com/Security/Features
    • Ubuntu Security Features
  • 17
    • 84914158456 scopus 로고    scopus 로고
    • [Online]
    • Peach fuzzer. [Online]. Available: http://peachfuzzer.com/
    • Peach Fuzzer
  • 18
    • 84914126473 scopus 로고    scopus 로고
    • mitre. Cve-2002-0392. [Online]
    • mitre. Cve-2002-0392. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0392
  • 19
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • ser. Security'12. Berkeley, CA, USA: USENIX Association, [Online]
    • C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, "Enhanced operating system security through efficient and fine-grained address space randomization," in Proceedings of the 21st USENIX conference on Security symposium, ser. Security'12. Berkeley, CA, USA: USENIX Association, 2012, pp. 40-40. [Online]. Available: http://dl.acm.org/citation.cfm?id=2362793.2362833
    • (2012) Proceedings of the 21st USENIX Conference on Security Symposium , pp. 40-40
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A.S.3
  • 21
    • 84914126471 scopus 로고    scopus 로고
    • grsecurity. [Online]
    • grsecurity. Deter exploit bruteforcing. [Online]. Available: http://en.wikibooks.org/wiki/Grsecurity/Appendix/Grsecurity and PaX Configuration Options#Deter exploit bruteforcing
    • Deter Exploit Bruteforcing
  • 23
    • 84977859802 scopus 로고    scopus 로고
    • Transparent ROP exploit mitigation using indirect branch tracing
    • ser. SEC'13. Berkeley, CA, USA: USENIX Association, [Online]
    • V. Pappas, M. Polychronakis, and A. D. Keromytis, "Transparent ROP exploit mitigation using indirect branch tracing," in Proceedings of the 22nd USENIX conference on Security, ser. SEC'13. Berkeley, CA, USA: USENIX Association, 2013, pp. 447-462. [Online]. Available: http://dl.acm.org/citation.cfm?id=2534766.2534805
    • (2013) Proceedings of the 22nd USENIX Conference on Security , pp. 447-462
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 24
    • 84869451043 scopus 로고    scopus 로고
    • Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
    • ser. CCS '12. New York, NY, USA: ACM, [Online]
    • R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, "Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code," in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS '12. New York, NY, USA: ACM, 2012, pp. 157-168. [Online]. Available: http://doi.acm.org/10.1145/2382196.2382216
    • (2012) Proceedings of the 2012 ACM Conference on Computer and Communications Security , pp. 157-168
    • Wartell, R.1    Mohan, V.2    Hamlen, K.W.3    Lin, Z.4
  • 26
    • 84878363772 scopus 로고    scopus 로고
    • Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
    • ser. SP '12. Washington, DC, USA: IEEE Computer Society, [Online]
    • V. Pappas, M. Polychronakis, and A. D. Keromytis, "Smashing the gadgets: Hindering return-oriented programming using in-place code randomization," in Proceedings of the 2012 IEEE Symposium on Security and Privacy, ser. SP '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 601-615. [Online]. Available: http://dx.doi.org/10.1109/SP.2012.41
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy , pp. 601-615
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 31
    • 85084164484 scopus 로고    scopus 로고
    • Half-blind attacks: Mask ROM bootloaders are dangerous
    • T. Goodspeed and A. Francillon, "Half-Blind Attacks: Mask ROM Bootloaders are Dangerous," in WOOT, 2009.
    • (2009) WOOT
    • Goodspeed, T.1    Francillon, A.2
  • 32
    • 84906818067 scopus 로고    scopus 로고
    • Where's the feeb?: The effectiveness of instruction set randomization
    • A. N. Sovarel, D. Evans, and N. Paul, "Where's the feeb?: The effectiveness of instruction set randomization," in Usenix Security, 2005.
    • (2005) Usenix Security
    • Sovarel, A.N.1    Evans, D.2    Paul, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.