메뉴 건너뛰기




Volumn , Issue , 2015, Pages 325-336

HideM: Protecting the contents of userspace memory in the face of disclosure vulnerabilities

Author keywords

Code reuse attacks; Information leaks; Memory disclosure exploits; Memory protection; Return oriented programming

Indexed keywords

PROGRAM PROCESSORS;

EID: 84928142971     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2699026.2699107     Document Type: Conference Paper
Times cited : (80)

References (37)
  • 1
    • 84928147285 scopus 로고    scopus 로고
    • 0vercl0k
    • 0vercl0k. Rp++ tool. https://github.com/0vercl0k/rp.
    • Rp++ Tool
  • 3
    • 33846321458 scopus 로고
    • Proposed automatic calculating machine
    • Howard Aiken, AG Oettinger, and TC Bartee. Proposed automatic calculating machine. Spectrum, IEEE, 1(8):62-69, 1964.
    • (1964) Spectrum, IEEE , vol.1 , Issue.8 , pp. 62-69
    • Aiken, H.1    Oettinger, A.G.2    Bartee, T.C.3
  • 6
    • 84928101958 scopus 로고    scopus 로고
    • Specification, Unix System Laboratories
    • Tool Interface Standards Committee et al. Executable and linkable format (ELF). Specification, Unix System Laboratories, 2001.
    • (2001) Executable and Linkable Format (ELF)
  • 10
    • 84914159903 scopus 로고    scopus 로고
    • Out of control: Overcoming control-ow integrity
    • IEEE Symposium on, San Jose, CA, USA, May 2014. IEEE
    • Enes Göktas, Elias Athanasopoulos, Herbert Bos, and Gerogios Portokalidis. Out of control: Overcoming control-ow integrity. In Security and Privacy (SP), 2014 IEEE Symposium on, San Jose, CA, USA, May 2014. IEEE.
    • (2014) Security and Privacy (SP)
    • Göktas, E.1    Athanasopoulos, E.2    Bos, H.3    Portokalidis, G.4
  • 12
    • 85084161742 scopus 로고    scopus 로고
    • Microgadgets: Size does matter in turing-complete return-oriented programming
    • Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, and Michael Franz. Microgadgets: Size does matter in turing-complete return-oriented programming. In WOOT, pages 64-76, 2012.
    • (2012) WOOT , pp. 64-76
    • Homescu, A.1    Stewart, M.2    Larsen, P.3    Brunthaler, S.4    Franz, M.5
  • 13
    • 84928147282 scopus 로고    scopus 로고
    • Intel System Programming Guide, Part, 1
    • Intel. Intel architectures manual. Volume 3A: System Programming Guide, Part, 1, 64.
    • Intel Architectures Manual , vol.3 A , pp. 64
  • 17
    • 84928147281 scopus 로고    scopus 로고
    • MWR labs pwn2own 2013 write-up
    • MWR labs pwn2own 2013 write-up. MWR Labs. https://labs.mwrinfosecurity.com/blog/2013/04/19/mwr-labs-pwn2own-2013-write-up-webkit-exploit/.
    • MWR Labs
  • 18
    • 78149470447 scopus 로고    scopus 로고
    • An architectural approach to preventing code injection attacks. Dependable and Secure Computing
    • Ryan Riley, Xuxian Jiang, and Dongyan Xu. An architectural approach to preventing code injection attacks. Dependable and Secure Computing, IEEE Transactions on, 7(4):351-365, 2010.
    • (2010) IEEE Transactions on , vol.7 , Issue.4 , pp. 351-365
    • Riley, R.1    Jiang, X.2    Xu, D.3
  • 22
    • 70349444399 scopus 로고    scopus 로고
    • ARM architecture reference manual
    • David Seal. ARM architecture reference manual. Pearson Education, 2001.
    • (2001) Pearson Education
    • Seal, D.1
  • 25
    • 77952405499 scopus 로고    scopus 로고
    • Shadow walker: Raising the bar for rootkit detection
    • Sherri Sparks and Jamie Butler. Shadow walker: Raising the bar for rootkit detection. Black Hat Japan, pages 504-533, 2005.
    • (2005) Black Hat Japan , pp. 504-533
    • Sparks, S.1    Butler, J.2
  • 30
    • 24344453452 scopus 로고    scopus 로고
    • Hardware-assisted circumvention of self-hashing software tamper resistance. Dependable and Secure Computing
    • Paul C. Van Oorschot, Anil Somayaji, and Glenn Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. Dependable and Secure Computing, IEEE Transactions on, 2(2):82-92, 2005.
    • (2005) IEEE Transactions on , vol.2 , Issue.2 , pp. 82-92
    • Van Oorschot, P.C.1    Somayaji, A.2    Wurster, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.