메뉴 건너뛰기




Volumn , Issue , 2015, Pages 555-566

The performance cost of shadow stacks and stack canaries

Author keywords

Shadow stack; Stack canary; Stack cookie

Indexed keywords

COMPUTERS;

EID: 84942543728     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2714576.2714635     Document Type: Conference Paper
Times cited : (207)

References (55)
  • 1
    • 84942540009 scopus 로고    scopus 로고
    • Itanium(R) Processor Family Performance Advantages: Register Stack Architecture October
    • Itanium(R) Processor Family Performance Advantages: Register Stack Architecture. https://software.intel.com/en-us/articles/itaniumr-processor-family-performance-advantages-register-stack-architecture, October 2008.
    • (2008)
  • 2
    • 84883075478 scopus 로고    scopus 로고
    • September
    • SPEC CPU2006: Read Me First. http://www.spec.org/cpu2006/Docs/readme1st.html, September 2011.
    • (2011) SPEC CPU2006: Read Me First.
  • 4
    • 84892460413 scopus 로고    scopus 로고
    • September
    • ARM Information Center. http://infocenter.arm.com/help/index.jsp? topic=/com.arm.doc.ddi0439d/Chdedegj.html, September 2013.
    • (2013) ARM Information Center.
  • 7
    • 72449145808 scopus 로고    scopus 로고
    • Control-ow integrity principles, implementations, and applications
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-ow integrity principles, implementations, and applications. TISSEC, 2009.
    • (2009) TISSEC
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 8
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack-smashing attacks
    • A. Baratloo, N. Singh, and T. K. Tsai. Transparent Run-Time Defense Against Stack-Smashing Attacks. In USENIX ATC, 2000.
    • (2000) USENIX ATC
    • Baratloo, A.1    Singh, N.2    Tsai, T.K.3
  • 9
    • 84954188728 scopus 로고    scopus 로고
    • Eficient techniques for comprehensive protection from memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Eficient Techniques for Comprehensive Protection from Memory Error Exploits. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 10
    • 47349088877 scopus 로고    scopus 로고
    • Performance characterization of spec cpu benchmarks on intel's core microarchitecture based processor
    • S. Bird, A. Phansalkar, L. K. John, A. Mericas, and R. Indukuru. Performance Characterization of SPEC CPU Benchmarks on Intel's Core Microarchitecture Based Processor. In SPEC Benchmark Workshop, 2007.
    • (2007) SPEC Benchmark Workshop
    • Bird, S.1    Phansalkar, A.2    John, L.K.3    Mericas, A.4    Indukuru, R.5
  • 11
    • 79955994779 scopus 로고    scopus 로고
    • Jump-oriented programming: A new class of code-reuse attack
    • T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang. Jump-oriented programming: a new class of code-reuse attack. In CCS, 2011.
    • (2011) CCS
    • Bletsch, T.1    Jiang, X.2    Freeh, V.W.3    Liang, Z.4
  • 13
    • 85076293126 scopus 로고    scopus 로고
    • Rop is still dangerous: Breaking modern defenses
    • N. Carlini and D. Wagner. ROP is still dangerous: Breaking modern defenses. In USENIX Security, 2014.
    • (2014) USENIX Security
    • Carlini, N.1    Wagner, D.2
  • 15
    • 0035017559 scopus 로고    scopus 로고
    • Rad: A compile-time solution to buér overow attacks
    • T.-c. Chiueh and F.-H. Hsu. RAD: A compile-time solution to buér overow attacks. In ICDCS, 2001.
    • (2001) ICDCS
    • Chiueh, T.-C.1    Hsu, F.-H.2
  • 18
    • 84903161773 scopus 로고    scopus 로고
    • Hardware-assisted fine-grained control-flow integrity: Towards eficient protection of embedded systems against software exploitation
    • L. Davi, P. Koeberl, and A.-R. Sadeghi. Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Eficient Protection of Embedded Systems Against Software Exploitation. In DAC, 2014.
    • (2014) DAC
    • Davi, L.1    Koeberl, P.2    Sadeghi, A.-R.3
  • 19
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-ow integrity protection
    • L. Davi, D. Lehmann, A.-R. Sadeghi, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-ow integrity protection. In USENIX Security, 2014.
    • (2014) USENIX Security
    • Davi, L.1    Lehmann, D.2    Sadeghi, A.-R.3    Monrose, F.4
  • 20
    • 79956032720 scopus 로고    scopus 로고
    • Ropdefender: A detection tool to defend against return-oriented programming attacks
    • L. Davi, A.-R. Sadeghi, and M. Winandy. ROPdefender: A detection tool to defend against return-oriented programming attacks. In CCS, 2011.
    • (2011) CCS
    • Davi, L.1    Sadeghi, A.-R.2    Winandy, M.3
  • 23
    • 85084163372 scopus 로고    scopus 로고
    • Stackghost: Hardware facilitated stack protection
    • M. Frantzen and M. Shuey. StackGhost: Hardware Facilitated Stack Protection. In USENIX Security, 2001.
    • (2001) USENIX Security
    • Frantzen, M.1    Shuey, M.2
  • 26
    • 47349111332 scopus 로고    scopus 로고
    • Lock and unlock: A data management algorithm for a security-aware cache
    • K. Inoue. Lock and Unlock: A Data Management Algorithm for A Security-Aware Cache. In ICECS, 2006.
    • (2006) ICECS
    • Inoue, K.1
  • 27
    • 84942540017 scopus 로고    scopus 로고
    • On the object orientedness of c++ programs in spec cpu
    • C. Isen and L. John. On the object orientedness of c++ programs in spec cpu 2006. In SPEC Benchmark Workshop, 2008.
    • (2008) 2006 SPEC Benchmark Workshop
    • Isen, C.1    John, L.2
  • 32
    • 84976840279 scopus 로고
    • Superoptimizer: A look at the smallest program
    • H. Massalin. Superoptimizer: a look at the smallest program. In ACM SIGPLAN Notices, 1987.
    • (1987) ACM SIGPLAN Notices
    • Massalin, H.1
  • 34
    • 67650046387 scopus 로고    scopus 로고
    • Producing wrong data without doing anything obviously wrong!
    • T. Mytkowicz, A. Diwan, M. Hauswirth, and P. F. Sweeney. Producing wrong data without doing anything obviously wrong! In ASPLOS, 2009.
    • (2009) ASPLOS
    • Mytkowicz, T.1    Diwan, A.2    Hauswirth, M.3    Sweeney, P.F.4
  • 36
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profft
    • A. One. Smashing the stack for fun and profft. Phrack magazine, 1996.
    • (1996) Phrack Magazine
    • One, A.1
  • 40
    • 79953214068 scopus 로고    scopus 로고
    • Fine-grained user-space security through virtualization
    • M. Payer and T. R. Gross. Fine-grained user-space security through virtualization. In VEE, 2011.
    • (2011) VEE
    • Payer, M.1    Gross, T.R.2
  • 41
    • 84877697492 scopus 로고    scopus 로고
    • Safe loading-A foundation for secure execution of untrusted programs
    • M. Payer, T. Hartmann, and T. R. Gross. Safe loading-A foundation for secure execution of untrusted programs. In IEEE S&P, 2012.
    • (2012) IEEE S&P
    • Payer, M.1    Hartmann, T.2    Gross, T.R.3
  • 42
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack based buér overow attacks
    • M. Prasad and T.-c. Chiueh. A Binary Rewriting Defense Against Stack based Buér Overow Attacks. In USENIX ATC, 2003.
    • (2003) USENIX ATC
    • Prasad, M.1    Chiueh, T.-C.2
  • 44
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent ESH on the bone: Return-into-libc without function calls (on the x86
    • H. Shacham. The geometry of innocent esh on the bone: Return-into-libc without function calls (on the x86). In CCS, 2007.
    • (2007) CCS
    • Shacham, H.1
  • 49
    • 27644592979 scopus 로고    scopus 로고
    • Vendicator
    • Vendicator. Stack Shield. http://www.angelfire.com/sk/stackshield/info.html, 2000.
    • (2000) Stack Shield
  • 50
    • 32344441314 scopus 로고    scopus 로고
    • Stackguard: Simple stack smash protection for GCC
    • P. Wagle and C. Cowan. Stackguard: Simple stack smash protection for gcc. In GCC Developers Summit, 2003.
    • (2003) GCC Developers Summit
    • Wagle, P.1    Cowan, C.2
  • 54
    • 84897515810 scopus 로고    scopus 로고
    • A platform for secure static binary instrumentation
    • M. Zhang, R. Qiao, N. Hasabnis, and R. Sekar. A platform for secure static binary instrumentation. In VEE, 2014.
    • (2014) VEE
    • Zhang, M.1    Qiao, R.2    Hasabnis, N.3    Sekar, R.4
  • 55
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for cots binaries
    • M. Zhang and R. Sekar. Control Flow Integrity for COTS Binaries. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.