메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Opaque Control-Flow Integrity

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); DATA FLOW ANALYSIS; FLOW GRAPHS; RANDOM PROCESSES;

EID: 84959417310     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23271     Document Type: Conference Paper
Times cited : (142)

References (50)
  • 2
    • 85025171717 scopus 로고    scopus 로고
    • Oxymoron: Making fine-grained memory randomization practical by allowing code sharing
    • M. Backes and S. Nürnberger, “Oxymoron: Making fine-grained memory randomization practical by allowing code sharing, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 433-447.
    • (2014) Proc. 23rd Usenix Security Sym , pp. 433-447
    • Backes, M.1    Nürnberger, S.2
  • 6
    • 85076293126 scopus 로고    scopus 로고
    • ROP is still dangerous: Breaking modern defenses
    • N. Carlini and D. Wagner, “ROP is still dangerous: Breaking modern defenses, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 385-399.
    • (2014) Proc. 23rd Usenix Security Sym , pp. 385-399
    • Carlini, N.1    Wagner, D.2
  • 8
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • F. Cohen, “Operating system protection through program evolution, ” Computers and Security, vol. 12, no. 6, pp. 565-584, 1993.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 9
    • 85180555739 scopus 로고    scopus 로고
    • Corelan Team, “Mona, ” 2014, https://github.com/corelan/mona.
    • (2014) Mona
  • 11
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose, “Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, ” in Proc. 23rd Usenix Security Sym., 2014, pp. 401-416.
    • (2014) Proc. 23rd Usenix Security Sym , pp. 401-416
    • Davi, L.1    Sadeghi, A.-R.2    Lehmann, D.3    Monrose, F.4
  • 12
    • 85180547518 scopus 로고    scopus 로고
    • Bypassing EMET 4.1
    • J. DeMott, “Bypassing EMET 4.1, ” Bromium Labs, 2014, http://labs.bromium.com/2014/02/24/bypassing-emet-4-1.
    • (2014) Bromium Labs
    • DeMott, J.1
  • 17
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, “Enhanced operating system security through efficient and fine-grained address space randomization, ” in Proc. 21st USENIX Security Sym., 2012, pp. 475-490.
    • (2012) Proc. 21st USENIX Security Sym , pp. 475-490
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A. S.3
  • 23
    • 0019049469 scopus 로고
    • An approach to the problem of detranslation of computer programs
    • R. N. Horspool and N. Marovac, “An approach to the problem of detranslation of computer programs, ” The Computer J., vol. 23, no. 3, pp. 223-229, 1980.
    • (1980) The Computer J , vol.23 , Issue.3 , pp. 223-229
    • Horspool, R. N.1    Marovac, N.2
  • 26
    • 84914171887 scopus 로고    scopus 로고
    • Advanced exploitation of Internet Explorer 10/Windows 8 overflow (Pwn2Own 2013)
    • N. Joly, “Advanced exploitation of Internet Explorer 10/Windows 8 overflow (Pwn2Own 2013), ” VUPEN Vulnerability Research Team (VRT), 2013, http://www.vupen.com/blog/20130522.Advanced_Exploitation_of_IE10_Windows8_Pwn2Own_2013.php.
    • (2013) VUPEN Vulnerability Research Team (VRT)
    • Joly, N.1
  • 32
    • 84910681910 scopus 로고    scopus 로고
    • RockJIT: Securing just-in-time compilation using modular control-flow integrity
    • B. Niu and G. Tan, “RockJIT: Securing just-in-time compilation using modular control-flow integrity, ” in Proc. 21st ACM Conf. Computer and Communications Security (CCS), 2014, pp. 1317-1328.
    • (2014) Proc. 21st ACM Conf. Computer and Communications Security (CCS) , pp. 1317-1328
    • Niu, B.1    Tan, G.2
  • 36
    • 84937679667 scopus 로고    scopus 로고
    • The info leak era on software exploitation
    • F. J. Serna, “The info leak era on software exploitation, ” Black Hat USA, 2012.
    • (2012) Black Hat USA
    • Serna, F. J.1
  • 37
    • 85180548416 scopus 로고    scopus 로고
    • CVE-2012-0769, the case of the perfect info leak
    • F. J. Serna, “CVE-2012-0769, the case of the perfect info leak, ” Google Security Team, 2012, http://zhodiac.hispahack.com/my-stuff/security/Flash_ASLR_bypass.pdf.
    • (2012) Google Security Team
    • Serna, F. J.1
  • 38
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), ” in Proc. 14th ACM Conf. Computer and Communications Security (CCS), 2007, pp. 552-561.
    • (2007) Proc. 14th ACM Conf. Computer and Communications Security (CCS) , pp. 552-561
    • Shacham, H.1
  • 41
    • 78649987048 scopus 로고    scopus 로고
    • Heap feng shui in JavaScript
    • A. Sotirov, “Heap feng shui in JavaScript, ” Black Hat Europe, 2007, https://www.blackhat.com/presentations/bh-europe07/Sotirov/Presentation/bh-eu-07-sotirov-apr19.pdf.
    • (2007) Black Hat Europe
    • Sotirov, A.1
  • 50
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for COTS binaries
    • M. Zhang and R. Sekar, “Control flow integrity for COTS binaries, ” in Proc. 22nd USENIX Security Sym., 2013, pp. 337-352.
    • (2013) Proc. 22nd USENIX Security Sym , pp. 337-352
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.