메뉴 건너뛰기




Volumn 2014-December, Issue December, 2014, Pages 396-405

Towards automated integrity protection of C++ virtual function tables in binary programs

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; BINS; COMPUTER SOFTWARE; SECURITY OF DATA; SECURITY SYSTEMS; WEB BROWSERS;

EID: 84954564343     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2664243.2664249     Document Type: Conference Paper
Times cited : (49)

References (48)
  • 2
    • 78650616819 scopus 로고    scopus 로고
    • Dangling pointer: Smashing the pointer for fun and profit
    • J. Afek and A. Sharabani. Dangling pointer: Smashing the pointer for fun and profit. Black Hat USA, 2007.
    • (2007) Black Hat USA
    • Afek, J.1    Sharabani, A.2
  • 3
    • 84954556400 scopus 로고    scopus 로고
    • Apple
    • Apple. Sunspider 1.0.2. https://www.webkit.org/perf/sunspider/sunspider.html, 2014.
    • (2014) Sunspider 1.0.2
  • 4
    • 0034449842 scopus 로고    scopus 로고
    • Dynamo: A transparent dynamic optimization system
    • V. Bala, E. Duesterwald, and S. Banerjia. Dynamo: A transparent dynamic optimization system. ACM SIGPLAN Notices, 35(5):1-12, 2000.
    • (2000) ACM SIGPLAN Notices , vol.35 , Issue.5 , pp. 1-12
    • Bala, V.1    Duesterwald, E.2    Banerjia, S.3
  • 6
    • 67650259451 scopus 로고    scopus 로고
    • Working draft, standard for programming language c++
    • P. Becker et al. Working draft, standard for programming language c++. Technical report, Technical Report, 2011.
    • (2011) Technical Report, Technical Report
    • Becker, P.1
  • 7
    • 21144446241 scopus 로고    scopus 로고
    • A survey of empirical results on program slicing
    • D. Binkley and M. Harman. A Survey of Empirical Results on Program Slicing. Advances in Computing, 62:105-178, 2003.
    • (2003) Advances in Computing , vol.62 , pp. 105-178
    • Binkley, D.1    Harman, M.2
  • 12
    • 84914171884 scopus 로고    scopus 로고
    • Practical return-oriented programming
    • D. Dai Zovi. Practical return-oriented programming. SOURCE Boston, 2010.
    • (2010) SOURCE Boston
    • Dai Zovi, D.1
  • 14
    • 0030259788 scopus 로고    scopus 로고
    • The direct cost of virtual function calls in c++
    • K. Driesen U. Hölzle The direct cost of virtual function calls in c++.. ACM Sigplan Notices 31( 10) 306-323 1996.
    • (1996) ACM Sigplan Notices , vol.31 , Issue.10 , pp. 306-323
    • Driesen, K.1    Hölzle, U.2
  • 15
    • 77955173824 scopus 로고    scopus 로고
    • REIL: A platform-independent intermediate representation of disassembled code for static code analysis
    • T. Dullien and S. Porst. REIL: A platform-independent intermediate representation of disassembled code for static code analysis. CanSecWest, 2009.
    • (2009) CanSecWest
    • Dullien, T.1    Porst, S.2
  • 16
    • 84954468307 scopus 로고    scopus 로고
    • FireEye
    • FireEye. Operation SnowMan. http://goo.gl/NL0ZmV, 2014.
    • (2014) Operation SnowMan
  • 18
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security Symposium, 2012.
    • (2012) USENIX Security Symposium
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A.S.3
  • 24
    • 84954533785 scopus 로고    scopus 로고
    • Using virtual table protections to prevent the exploitation of object corruption vulnerabilities 2010
    • K. D. Johnson and M. R. Miller. Using virtual table protections to prevent the exploitation of object corruption vulnerabilities, 2010. US Patent App. 12/958,668.
    • Johnson, K.D.1    Miller, M.R.2
  • 31
    • 84979252604 scopus 로고    scopus 로고
    • Exec shield, new lin ux security feature
    • May
    • I. Molnar. Exec shield, new lin ux security feature. News-Forge, May, 2003.
    • (2003) News-Forge
    • Molnar, I.1
  • 33
    • 84954498627 scopus 로고    scopus 로고
    • Mozilla
    • Moz illa. Kraken Benchmark Suite. http://krakenbenchmark.mozilla.org/, 2014.
    • (2014) Kraken Benchmark Suite
  • 35
    • 0034197208 scopus 로고    scopus 로고
    • Rose: Compiler support for object-oriented frameworks
    • D. Quinlan. ROSE: Compiler Support for Object-oriented Frameworks. Parallel Processing Letters, 10(02/03), 2000.
    • (2000) Parallel Processing Letters , vol.10 , Issue.2-3
    • Quinlan, D.1
  • 37
    • 84881254045 scopus 로고    scopus 로고
    • The info leak era on software exploitation
    • F. J. Serna. The info leak era on software exploitation. Black Hat USA, 2012.
    • (2012) Black Hat USA
    • Serna, F.J.1
  • 38
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM Conference on Computer and Communications Security (CCS), 2007.
    • (2007) ACM Conference on Computer and Communications Security (CCS
    • Shacham, H.1
  • 39
    • 84863836286 scopus 로고    scopus 로고
    • A vocabulary of program slicing-based techniques
    • J. Silva. A vocabulary of program slicing-based techniques. ACM Computing Surveys (CSUR), 44(3):12, 2012.
    • (2012) ACM Computing Surveys (CSUR , vol.44 , Issue.3 , pp. 12
    • Silva, J.1
  • 40
    • 78649987048 scopus 로고    scopus 로고
    • Heap feng shui in javascript
    • A. Sotirov. Heap Feng Shui in JavaScript. Black Hat Europe, 2007.
    • (2007) Black Hat Europe
    • Sotirov, A.1
  • 42
    • 84954558278 scopus 로고    scopus 로고
    • John Wiley and Sons Ltd
    • B. Stroustrup. C++. John Wiley and Sons Ltd., 2003.
    • (2003) C++
    • Stroustrup, B.1
  • 46
    • 84954500767 scopus 로고    scopus 로고
    • Dep/aslr bypass witho ut rop/jit
    • Y. Yang. DEP/ASLR bypass witho ut ROP/JIT. CanSecWest, 2013.
    • (2013) CanSecWest
    • Yang, Y.1
  • 48
    • 85041451135 scopus 로고    scopus 로고
    • Bincfi: Control flow integrity for cots binaries
    • M. Zhang and R. Sekar. BinCFI: Control Flow Integrity for COTS Binaries. In USENIX Security Symposium, 2013.
    • (2013) USENIX Security Symposium
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.