메뉴 건너뛰기




Volumn , Issue , 2014, Pages 243-258

Framing signals - A return to portable shellcode

Author keywords

backdoors; exploits; Operatings system security

Indexed keywords

SECURITY OF DATA;

EID: 84914165357     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.23     Document Type: Conference Paper
Times cited : (83)

References (32)
  • 4
    • 84914110149 scopus 로고    scopus 로고
    • January
    • Bulba and Kil3r. Bypassing StackGuard and Stack-Shield. http://www.phrack.org/issues.html?issue=56&id= 5article, January 2000.
    • (2000) Bypassing StackGuard and Stack-Shield
  • 7
    • 84914110148 scopus 로고    scopus 로고
    • Exploitation and state machines: Programming the 'weird machine', revisited
    • Miami, FLA, April
    • Thomas Dullien. Exploitation and state machines: Programming the 'weird machine', revisited. In Infiltrate Conference, Miami, FLA, April 2011.
    • (2011) Infiltrate Conference
    • Dullien, T.1
  • 8
    • 84914110147 scopus 로고    scopus 로고
    • (asterisk exploit related to cve-2012-5976)
    • Brandon Edwards. Dos? then who was phone? (asterisk exploit related to cve-2012-5976). http://blog.exodusintel.com/tag/asterisk-exploit/.
    • Dos? Then Who Was Phone?
    • Edwards, B.1
  • 10
    • 39049113465 scopus 로고    scopus 로고
    • Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
    • Washington, DC, USA, IEEE Computer Society
    • Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, and Peng Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Proceedings of the 22nd Annual Computer Security Applications Conference, ACSAC '06, pages 339-348, Washington, DC, USA, 2006. IEEE Computer Society.
    • (2006) Proceedings of the 22nd Annual Computer Security Applications Conference, ACSAC '06 , pp. 339-348
    • Kil, C.1    Jun, J.2    Bookholt, C.3    Xu, J.4    Ning, P.5
  • 15
    • 84914110144 scopus 로고    scopus 로고
    • Preventing the exploitation of seh overwrites
    • Matt Miller. Preventing the exploitation of seh overwrites. Uninformed Journal, 5, 2006.
    • (2006) Uninformed Journal , vol.5
    • Miller, M.1
  • 19
    • 84878363772 scopus 로고    scopus 로고
    • Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
    • Washington, DC, USA, IEEE Computer Society
    • Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 601-615, Washington, DC, USA, 2012. IEEE Computer Society.
    • (2012) Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12 , pp. 601-615
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 21
  • 30
    • 84987620538 scopus 로고    scopus 로고
    • The automated exploitation grand challenge, tales of weird machines
    • Sao Paulo, Brazil, October
    • Julien Vanegue. The automated exploitation grand challenge, tales of weird machines. In H2C2 conference, Sao Paulo, Brazil, October 2013.
    • (2013) H2C2 Conference
    • Vanegue, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.