메뉴 건너뛰기




Volumn 64, Issue 2, 2015, Pages 533-546

Signature-Based Protection from Code Reuse Attacks

Author keywords

code reuse attacks; Processor architectures; support for security

Indexed keywords

BINS; CORROSION RESISTANT ALLOYS;

EID: 84960462471     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2013.230     Document Type: Article
Times cited : (11)

References (63)
  • 1
    • 34250009730 scopus 로고    scopus 로고
    • Cyberinsurance in IT security management
    • May/Jun.
    • W. Baer and A. Parkinson, "Cyberinsurance in IT security management," IEEE Secur. Privacy, vol. 5, no. 3, pp. 50-56, May/Jun. 2007.
    • (2007) IEEE Secur. Privacy , vol.5 , Issue.3 , pp. 50-56
    • Baer, W.1    Parkinson, A.2
  • 2
    • 59449108823 scopus 로고    scopus 로고
    • National Institute of Standards and Technology [Online]. Available
    • National Institute of Standards and Technology. (2012). NIST National Vulnerability Database [Online]. Available: http://nvd.nist.gov.
    • (2012) NIST National Vulnerability Database
  • 3
    • 34247170052 scopus 로고    scopus 로고
    • Backwards-compatible array bounds checking forCwith very low overhead
    • [Online]. Available
    • D. Dhurjati and V. Adve, "Backwards-compatible array bounds checking forCwith very low overhead," in Proc. Int. Conf. Softw. Eng. (ICSE), 2006, pp. 162-171 [Online]. Available: http://doi.acm.org/10.1145/1134285.1134309.
    • (2006) Proc. Int. Conf. Softw. Eng. (ICSE) , pp. 162-171
    • Dhurjati, D.1    Adve, V.2
  • 6
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible information flow architecture for software security
    • [Online]. Available http://doi.acm.org/10.1145/1250662.1250722
    • M. Dalton, H. Kannan, C. Kozyrakis, "Raksha: A flexible information flow architecture for software security," in Proc. Ann. Int. Symp. Comput. Archit. (ISCA), 2007, pp. 482-493 [Online]. Available: http://doi.acm.org/10.1145/1024393.1024404http://doi.acm.org/10.1145/1250662.1250722.
    • (2007) Proc. Ann. Int. Symp. Comput. Archit. (ISCA) , pp. 482-493
    • Dalton, M.1    Kannan, H.2    Kozyrakis, C.3
  • 7
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Nov. [Online]. Available
    • Aleph One. (1996, Nov.) "Smashing the Stack for Fun and Profit," Phrack Magazine, vol. 7, no. 49, pp. 14-16 [Online]. Available: http://phrack.org/issues/49/14.html
    • (1996) Phrack Magazine , vol.7 , Issue.49 , pp. 14-16
    • One, A.1
  • 8
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • Jul. [Online]. Available
    • J. Pincus and B. Baker, "Beyond stack smashing: Recent advances in exploiting buffer overruns," IEEE Secur. Privacy, vol. 2, no. 4, pp. 20-27, Jul. 2004 [Online]. Available: http://dl.acm.org/citation. cfm?id=1018027.1018271.
    • (2004) IEEE Secur. Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 10
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack smashing attacks
    • A. Baratloo, N. Singh, T. Tsai, "Transparent run-time defense against stack smashing attacks," in Proc. USENIX Ann. Tech. Conf., 2000, pp. 251-262.
    • (2000) Proc. USENIX Ann. Tech. Conf. , pp. 251-262
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 12
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack based overflow attacks
    • M. Prasad and T. cker Chiueh, "A binary rewriting defense against stack based overflow attacks," in Proc. USENIX Ann. Tech. Conf., 2003, pp. 211-224.
    • (2003) Proc. USENIX Ann. Tech. Conf. , pp. 211-224
    • Prasad, M.1    Cker Chiueh, T.2
  • 14
    • 84864849849 scopus 로고    scopus 로고
    • Part 3: Memory protection technologies
    • Microsoft Corp [Online]. Available
    • S. Andersen, "Part 3: Memory protection technologies," Changes to Functionality in Microsoft WindowsXPService Pack 2. Microsoft Corp., 2004 [Online]. Available: http://technet.microsoft.com/en-us/library/bb457155.aspx.
    • (2004) Changes to Functionality in Microsoft Windows XP Service Pack 2
    • Andersen, S.1
  • 15
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Returninto-libc without function calls (on the x86)
    • Oct.
    • H. Shacham, "The geometry of innocent flesh on the bone: Returninto-libc without function calls (on the x86)," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), Oct. 2007, pp. 552-561.
    • (2007) Proc. ACM Conf. Comput. Commun. Secur. (CCS) , pp. 552-561
    • Shacham, H.1
  • 16
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • [Online]. Available
    • E. Buchanan, R. Roemer, H. Shacham, S. Savage, "When good instructions go bad: Generalizing return-oriented programming to RISC," in Proc. ACM Conf. Comput. Commun. Secur. (CCS), 2008, pp. 27-38 [Online]. Available: http://doi.acm.org/10.1145/1455770.1455776.
    • (2008) Proc. ACM Conf. Comput. Commun. Secur. (CCS) , pp. 27-38
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 18
    • 79956057382 scopus 로고    scopus 로고
    • Developments in Cisco IOs forensics
    • [Online] Available
    • F. Lindner. (2009). Developments in Cisco IOs forensics. Confidence 2.0. Presentation. [Online]. Available: http://www.recurity-labs.com/content/pub/FX-Router-Exploitation.pdf.
    • (2009) Confidence 2.0. Presentation
    • Lindner, F.1
  • 20
    • 78650024047 scopus 로고    scopus 로고
    • Syst. Secur. Lab, Ruhr University Bochum, Bochum, Germany, Tech. Rep. HGI-TR-2010-002 [Online]. Available
    • L. Davi, A. Dmitrienko, A.-R. Sadeghi, M. Winandy, "Returnoriented programming without returns on ARM," Syst. Secur. Lab, Ruhr University Bochum, Bochum, Germany, Tech. Rep. HGI-TR-2010-002, 2010 [Online]. Available: http://www.ei.rub.de/media/trust/veroeffentlichungen/2010/07/21/ROP-without-Returnson-ARM.pdf.
    • (2010) Returnoriented Programming Without Returns on ARM
    • Davi, L.1    Dmitrienko, A.2    Sadeghi, A.-R.3    Winandy, M.4
  • 22
    • 85029681162 scopus 로고    scopus 로고
    • Returnoriented rootkits: Bypassing kernel code integrity protection mechanisms
    • R. Hund, T. Holz, F. C. Freiling, "Returnoriented rootkits: Bypassing kernel code integrity protection mechanisms," in Proc. USENIX Secur., 2009, pp. 383-398.
    • (2009) Proc. USENIX Secur. , pp. 383-398
    • Hund, R.1    Holz, T.2    Freiling, F.C.3
  • 25
    • 74049136385 scopus 로고    scopus 로고
    • Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks
    • [Online]. Available
    • L. Davi, A.-R. Sadeghi, M. Winandy, "Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks," in Proc. ACM Workshop Scalable Trusted Comput. (STC), 2009, pp. 49-54 [Online]. Available: http://doi. acm.org/10.1145/1655108.1655117.
    • (2009) Proc. ACM Workshop Scalable Trusted Comput. (STC) , pp. 49-54
    • Davi, L.1    Sadeghi, A.-R.2    Winandy, M.3
  • 26
    • 71549162538 scopus 로고    scopus 로고
    • Drop: Detecting return-oriented programming malicious code
    • [Online]. Available
    • P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, L. Xie, "Drop: Detecting return-oriented programming malicious code," in Proc. Int. Conf. Inf. Syst. Secur. (ICISS), 2009, pp. 163-177 [Online]. Available: http://dx.doi.org/10.1007/978-3-642-10772-6-13.
    • (2009) Proc. Int. Conf. Inf. Syst. Secur. (ICISS) , pp. 163-177
    • Chen, P.1    Xiao, H.2    Shen, X.3    Yin, X.4    Mao, B.5    Xie, L.6
  • 27
    • 77954614533 scopus 로고    scopus 로고
    • Defeating returnoriented rootkits with 'return-less' kernels
    • [Online]. Available
    • J. Li, Z. Wang, X. Jiang, M. Grace, S. Bahram, "Defeating returnoriented rootkits with 'return-less' kernels," in Proc. EuroSys, 2010, pp. 195-208 [Online]. Available: http://doi.acm.org/10.1145/1755913.1755934.
    • (2010) Proc. EuroSys , pp. 195-208
    • Li, J.1    Wang, Z.2    Jiang, X.3    Grace, M.4    Bahram, S.5
  • 30
    • 84900988059 scopus 로고    scopus 로고
    • M.S. thesis, Dept. Comput. Sci., Nat. Univ. Singapore, Singapore
    • S. Sinnadurai, "Runtime binary analysis for security," M.S. thesis, Dept. Comput. Sci., Nat. Univ. Singapore, Singapore, 2007.
    • (2007) Runtime Binary Analysis for Security
    • Sinnadurai, S.1
  • 33
    • 79956058308 scopus 로고    scopus 로고
    • Automatic construction of jump-oriented programming shellcode (on the x86)
    • [Online]. Available
    • P. Chen, X. Xing, B. Mao, L. Xie, X. Shen, X. Yin, "Automatic construction of jump-oriented programming shellcode (on the x86)," in Proc. ACM Symp. Inf. Comput. Commun. Secur. (ASIACCS), 2011, pp. 20-29 [Online]. Available: http://doi.acm.org/10.1145/1966913.1966918.
    • (2011) Proc. ACM Symp. Inf. Comput. Commun. Secur. (ASIACCS) , pp. 20-29
    • Chen, P.1    Xing, X.2    Mao, B.3    Xie, L.4    Shen, X.5    Yin, X.6
  • 34
    • 84871361154 scopus 로고    scopus 로고
    • Apple Inc [Online]. Available retrieved Oct. 2013
    • Apple Inc. (2012). iOS Security [Online]. Available: http://www. apple.com/ipad/business/docs/iOS-Security-Oct12.pdf, retrieved Oct. 2013.
    • (2012) IOS Security
  • 35
    • 85019242830 scopus 로고    scopus 로고
    • SOGETI ESEC R&D Lab [Online]. Available retrieved Sept. 2012
    • SOGETI ESEC R&D Lab. (2012). Analysis of the Jailbreakme v3 Font Exploit [Online]. Available: http://esec-lab.sogeti.com/post/Analysis-of-the-jailbreakme-v3-font-exploit, retrieved Sept. 2012.
    • (2012) Analysis of the Jailbreakme v3 Font Exploit
  • 37
    • 84855737396 scopus 로고    scopus 로고
    • Mitigating code-reuse attacks with control-flow locking
    • [Online]. Available
    • T. Bletsch, X. Jiang, V. Freeh, "Mitigating code-reuse attacks with control-flow locking," in Proc. 27th Ann. Comput. Secur. Appl. Conf. (ACSAC'11), 2011, pp. 353-362 [Online]. Available: http://doi. acm.org/10.1145/2076732.2076783.
    • (2011) Proc. 27th Ann. Comput. Secur. Appl. Conf. (ACSAC'11) , pp. 353-362
    • Bletsch, T.1    Jiang, X.2    Freeh, V.3
  • 40
    • 84960424279 scopus 로고    scopus 로고
    • The Open Group IEEE Std 10031 [Online]. Available
    • The Open Group. (2004). IEEE Std 10031 [Online]. Available: http://pubs.opengroup.org/onlinepubs/009695399/functions/setjmp.html.
    • (2004)
  • 42
    • 36949014308 scopus 로고    scopus 로고
    • Ptlsim: A cycle accurate full system x86-64 microarchitectural simulator
    • M. T. Yourst, "Ptlsim: A cycle accurate full system x86-64 microarchitectural simulator," in Proc. Int. Symp. Perform. Anal. Syst. Softw. (ISPASS), 2007, pp. 23-34.
    • (2007) Proc. Int. Symp. Perform. Anal. Syst. Softw. (ISPASS) , pp. 23-34
    • Yourst, M.T.1
  • 43
    • 78149242271 scopus 로고    scopus 로고
    • Spec cpu2006 benchmark tools
    • C. D. Spradling, "Spec cpu2006 benchmark tools," SIGARCH Comput. Archit. News, vol. 35, no. 1, pp. 130-134, 2007.
    • (2007) SIGARCH Comput. Archit. News , vol.35 , Issue.1 , pp. 130-134
    • Spradling, C.D.1
  • 45
    • 84962595439 scopus 로고    scopus 로고
    • [Online]. Available accessed Sep. 2012
    • J. Salwan. (2012). The Shell Storm Linux Shellcode Repository [Online]. Available: http://www.shell-storm.org/shellcode/shellcode-linux. php, accessed Sep. 2012.
    • (2012) The Shell Storm Linux Shellcode Repository
    • Salwan, J.1
  • 46
    • 85009448253 scopus 로고    scopus 로고
    • Pointguardtm: Protecting pointers from buffer overflow vulnerabilities
    • [Online]. Available
    • C. Cowan, S. Beattie, J. Johansen, P. Wagle, "Pointguardtm: Protecting pointers from buffer overflow vulnerabilities," in Proc. USENIX Secur., 2003, p. 7 [Online]. Available: http://dl.acm.org/citation.cfm?id=1251353.1251360.
    • (2003) Proc. USENIX Secur. , pp. 7
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 47
    • 14844332687 scopus 로고    scopus 로고
    • Propolice: Improved stack-smashing attack detection
    • Oct.
    • H. Etoh and K. Yoda, "Propolice: Improved stack-smashing attack detection," in Proc. IPSJ SIG Notes Comput. Secur., Oct. 2001, pp. 4034-4041.
    • (2001) Proc. IPSJ SIG Notes Comput. Secur , pp. 4034-4041
    • Etoh, H.1    Yoda, K.2
  • 48
    • 79960882939 scopus 로고    scopus 로고
    • Vendicator Jan. [Online]. Available
    • Vendicator. (2001, Jan.) Stack shield technical info file v0.7 [Online]. Available: http://www.angelfire.com/sk/stackshield/.
    • (2001) Stack Shield Technical Info File v0.7
  • 49
    • 85084163372 scopus 로고    scopus 로고
    • StackGhost: Hardware facilitated stack protection
    • [Online]. Available
    • M. Frantzen and M. Shuey, "StackGhost: Hardware facilitated stack protection," in Proc. USENIX Secur., 2001, p. 5 [Online]. Available: http://dl.acm.org/citation.cfm?id=1251327.1251332.
    • (2001) Proc. USENIX Secur. , pp. 5
    • Frantzen, M.1    Shuey, M.2
  • 53
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, signature generation of exploits on commodity software
    • Feb.
    • J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, signature generation of exploits on commodity software," in Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS), Feb. 2005.
    • (2005) Proc. Symp. Netw. Distrib. Syst. Secur. (NDSS)
    • Newsome, J.1    Song, D.2
  • 54
    • 40349087553 scopus 로고    scopus 로고
    • Lift: A lowoverhead practical information flow tracking system for detecting security attacks
    • [Online]. Available
    • F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, Y. Wu, "Lift: A lowoverhead practical information flow tracking system for detecting security attacks," in Proc. Ann. IEEE/ACM Int. Symp. Microarchit. (MICRO), 2006, pp. 135-148 [Online]. Available: http://dx.doi.org/10.1109/MICRO.2006.29.
    • (2006) Proc. Ann IEEE/ACM Int. Symp. Microarchit. (MICRO) , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.-S.4    Zhou, Y.5    Wu, Y.6
  • 55
    • 84991997276 scopus 로고    scopus 로고
    • Securing software by enforcing data-flow integrity
    • [Online]. Available
    • M. Castro, M. Costa, T. Harris, "Securing software by enforcing data-flow integrity," in Proc. Symp. Oper. Syst. Des. Implementation (OSDI), 2006, pp. 147-160 [Online]. Available: http://dl.acm.org/citation.cfm?id=1298455.1298470.
    • (2006) Proc. Symp. Oper. Syst. Des. Implementation (OSDI) , pp. 147-160
    • Castro, M.1    Costa, M.2    Harris, T.3
  • 56
    • 77950832584 scopus 로고    scopus 로고
    • [Online]. Available
    • S. Designer. (1997). "Return-to-Libc" Attack [Online]. Available: http://insecure.org/sploits/linux.libc.return.lpr.sploit.html
    • (1997) Return-to-Libc Attack
    • Designer, S.1
  • 57
    • 84960427928 scopus 로고    scopus 로고
    • Negral [Online]. Available retrieved Jun. 2012
    • Negral. (2001). The Advanced Return-Into-Lib(C) Attacks [Online]. Available: http://www.phrack.org/issues.html?issue=58 id=4, retrieved Jun. 2012.
    • (2001) The Advanced Return-Into-Lib(C) Attacks
  • 60
    • 34547545970 scopus 로고    scopus 로고
    • P. Team Mar. [Online] Available
    • P. Team. (2003, Mar.). Pax Address Space Layout Randomization (ASLR) [Online]. Available: http://pax.grsecurity.net/docs/aslr. txt.
    • (2003) Pax Address Space Layout Randomization (ASLR)
  • 61
    • 33746101822 scopus 로고    scopus 로고
    • Diehard: Probabilistic memory safety for unsafe languages
    • [Online]. Available
    • E. D. Berger and B. G. Zorn, "Diehard: Probabilistic memory safety for unsafe languages," in Proc. Conf. Program. Language Des. Implementation (PLDI), 2006, pp. 158-168 [Online]. Available: http://doi. acm.org/10.1145/1133981.1134000.
    • (2006) Proc. Conf. Program. Language Des. Implementation (PLDI) , pp. 158-168
    • Berger, E.D.1    Zorn, B.G.2
  • 62
    • 78649988672 scopus 로고    scopus 로고
    • An analysis of address space layout randomization on windows vista
    • 2007 [Online]. Available
    • O. Whitehouse. (2007). "An analysis of address space layout randomization on windows vista," Symantec Adv. Threat Res., pp. 1-14, 2007 [Online]. Available: http://www.symantec.com/avcenter/reference/Address-Space-Layout-Randomization.pdf
    • (2007) Symantec Adv. Threat Res. , pp. 1-14
    • Whitehouse, O.1
  • 63
    • 12344288334 scopus 로고    scopus 로고
    • Sep.) [Online] Available
    • T. Newsham. (2000, Sep.) Format String Attacks [Online]. Available: http://julianor.tripod.com/bc/tn-usfs.pdf.
    • (2000) Format String Attacks
    • Newsham, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.