메뉴 건너뛰기




Volumn 05-09-December-2015, Issue , 2015, Pages 115-127

Locking down insecure indirection with hardware-based control-data isolation

Author keywords

CFG inegrity; control data isolation; control flow attack; indirect control flow; program transformation; secure computation; security architectures; security policies; software vulnerabilities

Indexed keywords

COMPUTER ARCHITECTURE; LOCKS (FASTENERS); PROGRAM COMPILERS; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 84959886547     PISSN: 10724451     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2830772.2830801     Document Type: Conference Paper
Times cited : (5)

References (29)
  • 2
    • 84959915583 scopus 로고    scopus 로고
    • Gartner [online] 2013
    • Gartner [online], " 2013.
  • 5
    • 85009448253 scopus 로고    scopus 로고
    • Pointguardtm: Protecting pointers from buffer overow vulnerabilities
    • SSYM'03, (Berkeley, CA, USA), USENIX Association
    • C. Cowan, S. Beattie, J. Johansen, and P. Wagle, "Pointguardtm: Protecting pointers from buffer overow vulnerabilities, " in Proceedings of the 12th Conference on USENIX Security Symposium-Volume 12, SSYM'03, (Berkeley, CA, USA), pp. 7-7, USENIX Association, 2003.
    • (2003) Proceedings of the 12th Conference on USENIX Security Symposium , vol.12 , pp. 7
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 11
    • 84977859802 scopus 로고    scopus 로고
    • Transparent rop exploit mitigation using indirect branch tracing
    • V. Pappas, M. Polychronakis, and A. D. Keromytis, "Transparent rop exploit mitigation using indirect branch tracing., " in USENIX Security, pp. 447-462, 2013.
    • (2013) USENIX Security , pp. 447-462
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 19
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffiective ness of coarse-grained control-ow integrity protection
    • USENIX Association, Aug., (San Diego, CA)
    • L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose, "Stitching the gadgets: On the ineffiective ness of coarse-grained control-ow integrity protection, " in 23rd USENIX Security Symposium (USENIX Security 14), (San Diego, CA), pp. 401-416, USENIX Association, Aug. 2014.
    • (2014) 23rd USENIX Security Symposium (USENIX Security 14) , pp. 401-416
    • Davi, L.1    Sadeghi, A.-R.2    Lehmann, D.3    Monrose, F.4
  • 21
    • 68949189664 scopus 로고    scopus 로고
    • Virtual program counter (vpc) prediction: Very low cost indirect branch prediction using conditional branch prediction hardware
    • Sept
    • H. Kim, J. Joao, O. Mutlu, C. J. Lee, Y. Patt, and R. Cohn, "Virtual program counter (vpc) prediction: Very low cost indirect branch prediction using conditional branch prediction hardware, " Computers, IEEE Transactions on, vol. 58, pp. 1153-1170, Sept 2009.
    • (2009) Computers, IEEE Transactions on , vol.58 , pp. 1153-1170
    • Kim, H.1    Joao, J.2    Mutlu, O.3    Lee, C.J.4    Patt, Y.5    Cohn, R.6
  • 25
    • 85026955891 scopus 로고    scopus 로고
    • Standard performance evaluation corporation[online]
    • Standard performance evaluation corporation[online]. "
  • 29
    • 84903161773 scopus 로고    scopus 로고
    • Hardware-assisted fine-grained control-ow integrity: Towards efficient protection of embedded systems against software exploitation
    • June
    • L. Davi, P. Koeberl, and A.-R. Sadeghi, "Hardware-assisted fine-grained control-ow integrity: Towards efficient protection of embedded systems against software exploitation, " in Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE, pp. 1-6, June 2014.
    • (2014) Design Automation Conference (DAC), 2014 51st ACM/EDAC/IEEE , pp. 1-6
    • Davi, L.1    Koeberl, P.2    Sadeghi, A.-R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.