메뉴 건너뛰기




Volumn 2015-October, Issue , 2015, Pages 927-940

Practical context-sensitive CFI

Author keywords

Context sensitive CFI; Control flow integrity

Indexed keywords

DATA PRIVACY;

EID: 84954175453     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2810103.2813673     Document Type: Conference Paper
Times cited : (218)

References (55)
  • 1
    • 84970894949 scopus 로고    scopus 로고
    • Apache benchmark. http://httpd.apache.org/docs/2.0/programs/ab.html.
    • Apache Benchmark
  • 4
    • 84970901598 scopus 로고    scopus 로고
    • pyftpdlib. https://code.google.com/p/pyftpdlib.
    • Pyftpdlib
  • 5
    • 84970908588 scopus 로고    scopus 로고
    • SendEmail. http://caspian.dotconf.net/menu/Software/SendEmail.
    • SendEmail
  • 8
    • 72449145808 scopus 로고    scopus 로고
    • Control-flow integrity: Principles, implementations, and applications
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. ACM TISSEC, 13(1), 2009.
    • (2009) ACM TISSEC , vol.13 , pp. 1
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 10
    • 80053209171 scopus 로고    scopus 로고
    • Anywhere, any-time binary instrumentation
    • A. R. Bernat and B. P. Miller. Anywhere, any-time binary instrumentation. In PASTE, 2011.
    • (2011) PASTE
    • Bernat, A.R.1    Miller, B.P.2
  • 11
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX SEC, 2005.
    • (2005) USENIX SEC
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.C.3
  • 12
    • 84897489745 scopus 로고    scopus 로고
    • Mitigating code-reuse attacks with control-flow locking
    • T. Bletsch, X. Jiang, and V. Freeh. Mitigating code-reuse attacks with control-flow locking. In ACSAC, 2011.
    • (2011) ACSAC
    • Bletsch, T.1    Jiang, X.2    Freeh, V.3
  • 13
    • 84970885912 scopus 로고    scopus 로고
    • Framing signals-A return to portable shellcode
    • E. Bosman and H. Bos. Framing signals-A return to portable shellcode. In IEEE S&P, 2014.
    • (2014) IEEE S&P
    • Bosman, E.1    Bos, H.2
  • 14
    • 0034543798 scopus 로고    scopus 로고
    • An API for runtime code patching
    • B. Buck and J. K. Hollingsworth. An API for runtime code patching. IJHPCA, 14(4), 2000.
    • (2000) IJHPCA , vol.14 , pp. 4
    • Buck, B.1    Hollingsworth, J.K.2
  • 16
    • 85076293126 scopus 로고    scopus 로고
    • ROP is still dangerous: Breaking modern defenses
    • N. Carlini and D. Wagner. ROP is still dangerous: Breaking modern defenses. In USENIX SEC, 2014.
    • (2014) USENIX SEC
    • Carlini, N.1    Wagner, D.2
  • 18
    • 84977850020 scopus 로고    scopus 로고
    • StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries
    • X. Chen, A. Slowinska, D. Andriesse, H. Bos, and C. Giuffrida. StackArmor: Comprehensive protection from stack-based memory error vulnerabilities for binaries. In NDSS, 2015.
    • (2015) NDSS
    • Chen, X.1    Slowinska, A.2    Andriesse, D.3    Bos, H.4    Giuffrida, C.5
  • 19
    • 84910672622 scopus 로고    scopus 로고
    • ROPecker: A generic and practical approach for defending against ROP attacks
    • Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. Deng. ROPecker: A generic and practical approach for defending against ROP attacks. In NDSS, 2014.
    • (2014) NDSS
    • Cheng, Y.1    Zhou, Z.2    Yu, M.3    Ding, X.4    Deng, R.5
  • 20
    • 0035017559 scopus 로고    scopus 로고
    • RAD: A compile-time solution to buffer overflow attacks
    • T.-C. Chiueh and F.-H. Hsu. RAD: A compile-time solution to buffer overflow attacks. In ICDCS, 2001.
    • (2001) ICDCS
    • Chiueh, T.-C.1    Hsu, F.-H.2
  • 21
    • 29144508720 scopus 로고    scopus 로고
    • Using DISE to protect return addresses from attack
    • M. L. Corliss, E. C. Lewis, and A. Roth. Using DISE to protect return addresses from attack. In ASSAV, 2004.
    • (2004) ASSAV
    • Corliss, M.L.1    Lewis, E.C.2    Roth, A.3
  • 22
    • 84945222685 scopus 로고    scopus 로고
    • KCoFI: Complete control-flow integrity for commodity operating system kernels
    • J. Criswell, N. Dautenhahn, and V. Adve. KCoFI: Complete control-flow integrity for commodity operating system kernels. In IEEE S&P, 2014.
    • (2014) IEEE S&P
    • Criswell, J.1    Dautenhahn, N.2    Adve, V.3
  • 23
    • 84942543728 scopus 로고    scopus 로고
    • The performance cost of shadow stacks and stack canaries
    • T. H. Dang, P. Maniatis, and D. Wagner. The performance cost of shadow stacks and stack canaries. In ASIACCS, 2015.
    • (2015) ASIACCS
    • Dang, T.H.1    Maniatis, P.2    Wagner, D.3
  • 24
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX SEC, 2014.
    • (2014) USENIX SEC
    • Davi, L.1    Sadeghi, A.-R.2    Lehmann, D.3    Monrose, F.4
  • 30
    • 84970891960 scopus 로고    scopus 로고
    • Tackling the path explosion problem in symbolic execution-driven test generation for programs
    • S. Krishnamoorthy, M. Hsiao, and L. Lingappan. Tackling the path explosion problem in symbolic execution-driven test generation for programs. In IEEE ATS, 2010.
    • (2010) IEEE ATS
    • Krishnamoorthy, S.1    Hsiao, M.2    Lingappan, L.3
  • 32
    • 35448971430 scopus 로고    scopus 로고
    • Making context-sensitive points-to analysis with heap cloning practical for the real world
    • C. Lattner, A. Lenharth, and V. Adve. Making context-sensitive points-to analysis with heap cloning practical for the real world. In PLDI, pages 278-289, 2007.
    • (2007) PLDI , pp. 278-289
    • Lattner, C.1    Lenharth, A.2    Adve, V.3
  • 33
    • 84889065012 scopus 로고    scopus 로고
    • Monitor integrity protection with space efficiency and separate compilation
    • B. Niu and G. Tan. Monitor integrity protection with space efficiency and separate compilation. In ACM CCS, 2013.
    • (2013) ACM CCS
    • Niu, B.1    Tan, G.2
  • 34
    • 84901593819 scopus 로고    scopus 로고
    • Modular control-flow integrity
    • B. Niu and G. Tan. Modular control-flow integrity. In PLDI, 2014.
    • (2014) PLDI
    • Niu, B.1    Tan, G.2
  • 35
    • 84910681910 scopus 로고    scopus 로고
    • RockJIT: Securing just-in-time compilation using modular control-flow integrity
    • B. Niu and G. Tan. RockJIT: Securing just-in-time compilation using modular control-flow integrity. In ACM CCS, 2014.
    • (2014) ACM CCS
    • Niu, B.1    Tan, G.2
  • 36
    • 84977859802 scopus 로고    scopus 로고
    • Transparent ROP exploit mitigation using indirect branch tracing
    • V. Pappas, M. Polychronakis, and A. D. Keromytis. Transparent ROP exploit mitigation using indirect branch tracing. In USENIX SEC, 2013.
    • (2013) USENIX SEC
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 37
    • 84977835464 scopus 로고    scopus 로고
    • Fine-grained control-flow integrity through binary hardening
    • M. Payer, A. Barresi, and T. R. Gross. Fine-grained control-flow integrity through binary hardening. In DIMVA, 2015.
    • (2015) DIMVA
    • Payer, M.1    Barresi, A.2    Gross, T.R.3
  • 38
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack-based buffer overflow attacks
    • M. Prasad and T. Cker Chiueh. A binary rewriting defense against stack-based buffer overflow attacks. In USENIX ATC, 2003.
    • (2003) USENIX ATC
    • Prasad, M.1    Cker Chiueh, T.2
  • 39
    • 80455144708 scopus 로고    scopus 로고
    • Implicit buffer overflow protection using memory segregation
    • B. G. Roth and E. H. Spafford. Implicit buffer overflow protection using memory segregation. In ARES, 2011.
    • (2011) ARES
    • Roth, B.G.1    Spafford, E.H.2
  • 42
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM CCS, 2007.
    • (2007) ACM CCS
    • Shacham, H.1
  • 44
    • 84865304839 scopus 로고    scopus 로고
    • Howard: A dynamic excavator for reverse engineering data structures
    • A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engineering data structures. In NDSS, 2011.
    • (2011) NDSS
    • Slowinska, A.1    Stancescu, T.2    Bos, H.3
  • 45
    • 84954177142 scopus 로고    scopus 로고
    • Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization
    • May
    • K. Z. Snow, L. Davi, A. Dmitrienko, C. Liebchen, F. Monrose, and A.-R. Sadeghi. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In IEEE S&P, May 2013.
    • (2013) IEEE S&P
    • Snow, K.Z.1    Davi, L.2    Dmitrienko, A.3    Liebchen, C.4    Monrose, F.5    Sadeghi, A.-R.6
  • 46
    • 79959884555 scopus 로고    scopus 로고
    • Exploiting hardware advances for software testing and debugging (nier track)
    • M. L. Soffa, K. R. Walcott, and J. Mars. Exploiting hardware advances for software testing and debugging (nier track). In ICSE, 2011.
    • (2011) ICSE
    • Soffa, M.L.1    Walcott, K.R.2    Mars, J.3
  • 48
    • 35048812546 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • D. Wagner and D. Dean. Intrusion detection via static analysis. In IEEE S&P, 2001.
    • (2001) IEEE S&P
    • Wagner, D.1    Dean, D.2
  • 49
    • 84869420078 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Z. Wang and X. Jiang. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In IEEE S&P, 2010.
    • (2010) IEEE S&P
    • Wang, Z.1    Jiang, X.2
  • 50
    • 84970908791 scopus 로고    scopus 로고
    • CFIMon: Detecting violation of control flow integrity using performance counters
    • Y. Xia, Y. Liu, H. Chen, and B. Zang. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE DSN, 2012.
    • (2012) IEEE DSN
    • Xia, Y.1    Liu, Y.2    Chen, H.3    Zang, B.4
  • 51
    • 39049133983 scopus 로고    scopus 로고
    • Extended protection against stack smashing attacks without performance loss
    • Y. Younan, D. Pozza, F. Piessens, and W. Joosen. Extended protection against stack smashing attacks without performance loss. In ACSAC, 2006.
    • (2006) ACSAC
    • Younan, Y.1    Pozza, D.2    Piessens, F.3    Joosen, W.4
  • 52
    • 84901619881 scopus 로고    scopus 로고
    • Strato: A retargetable framework for low-level inlined-reference monitors
    • B. Zeng, G. Tan, and U. Erlingsson. Strato: A retargetable framework for low-level inlined-reference monitors. In USENIX SEC, 2013.
    • (2013) USENIX SEC
    • Zeng, B.1    Tan, G.2    Erlingsson, U.3
  • 54
    • 84897515810 scopus 로고    scopus 로고
    • A platform for secure static binary instrumentation
    • M. Zhang, R. Qiao, N. Hasabnis, and R. Sekar. A platform for secure static binary instrumentation. In VEE, 2014.
    • (2014) VEE
    • Zhang, M.1    Qiao, R.2    Hasabnis, N.3    Sekar, R.4
  • 55
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for COTS binaries
    • M. Zhang and R. Sekar. Control flow integrity for COTS binaries. In USENIX SEC, 2013.
    • (2013) USENIX SEC
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.