메뉴 건너뛰기




Volumn 2015-July, Issue , 2015, Pages 745-762

Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications

Author keywords

C++; CFI; code reuse attacks; ROP

Indexed keywords

C++ (PROGRAMMING LANGUAGE); CESIUM; COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE REUSABILITY; CRIME; SEMANTICS;

EID: 84945184526     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2015.51     Document Type: Conference Paper
Times cited : (320)

References (60)
  • 4
    • 85076276275 scopus 로고    scopus 로고
    • Cling: A memory allocator to mitigate dangling pointers
    • P. Akritidis. Cling: A memory allocator to mitigate dangling pointers. In USENIX Security Symposium, 2010.
    • (2010) USENIX Security Symposium
    • Akritidis, P.1
  • 6
    • 85049220056 scopus 로고    scopus 로고
    • Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
    • P. Akritidis, M. Costa, M. Castro, and S. Hand. Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors. In USENIX Security Symposium, 2009.
    • (2009) USENIX Security Symposium
    • Akritidis, P.1    Costa, M.2    Castro, M.3    Hand, S.4
  • 15
    • 84903161773 scopus 로고    scopus 로고
    • Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation
    • L. Davi, P. Koeberl, and A.-R. Sadeghi. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation. In DAC, 2014.
    • (2014) DAC
    • Davi, L.1    Koeberl, P.2    Sadeghi, A.-R.3
  • 16
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • L. Davi, D. Lehmann, A.-R. Sadeghi, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security Symposium, 2014.
    • (2014) USENIX Security Symposium
    • Davi, L.1    Lehmann, D.2    Sadeghi, A.-R.3    Monrose, F.4
  • 33
    • 34548146785 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft. Data Execution Prevention (DEP). http://support.microsoft.com/kb/875352/EN-US/, 2006.
    • (2006) Data Execution Prevention (DEP)
  • 35
    • 84906737402 scopus 로고    scopus 로고
    • Microsoft Developer Network.
    • Microsoft Developer Network. Argument passing and naming conventions. http://msdn.microsoft.com/en-us/library/984x0h58.aspx.
    • Argument Passing and Naming Conventions
  • 60
    • 84945216596 scopus 로고    scopus 로고
    • HDROP: Detecting ROP attacks using performance monitoring counters
    • Springer International Publishing
    • H. Zhou, X. Wu, W. Shi, J. Yuan, and B. Liang. HDROP: Detecting ROP attacks using performance monitoring counters. In Information Security Practice and Experience. Springer International Publishing, 2014.
    • (2014) Information Security Practice and Experience
    • Zhou, H.1    Wu, X.2    Shi, W.3    Yuan, J.4    Liang, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.