메뉴 건너뛰기




Volumn , Issue , 2015, Pages 79-90

Getting in control of your control flow with control-data isolation

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; SECURITY OF DATA;

EID: 84961288130     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CGO.2015.7054189     Document Type: Conference Paper
Times cited : (22)

References (35)
  • 2
    • 84877692058 scopus 로고    scopus 로고
    • A compiler-level intermediate representation based binary analysis and rewriting system
    • K. Anand et al., A compiler-level intermediate representation based binary analysis and rewriting system, Proc. of the 8th ACM European Conf. on Computer Systems, 2013, pp. 295-308.
    • (2013) Proc. of the 8th ACM European Conf. on Computer Systems , pp. 295-308
    • Anand, K.1
  • 8
    • 84961376832 scopus 로고    scopus 로고
    • c0ntext. (2012, April) Bypassing non-executable stack during exploitation using return-to-libc
    • c0ntext. (2012, April) Bypassing non-executable stack during exploitation using return-to-libc. [Online]. http://css.csail.mit.edu/6.858/2012/readings/return-to-libc.pdf
  • 9
    • 84961374878 scopus 로고    scopus 로고
    • c0ntext. (2011) How to Hijack the Global Offset Table with pointers
    • c0ntext. (2011) How to Hijack the Global Offset Table with pointers. [Online]. http://www.exploit-db.com/papers/13203/
  • 11
    • 85008010113 scopus 로고    scopus 로고
    • Melissa virus creates a new type of threat
    • L. Garber, Melissa Virus Creates a New Type of Threat, Computer, vol. 32, no. 6, pp. 16-19, 1999.
    • (1999) Computer , vol.32 , Issue.6 , pp. 16-19
    • Garber, L.1
  • 12
    • 84961292425 scopus 로고    scopus 로고
    • Gartner
    • Gartner. (2013) Gartner. [Online]. http://www.gartner.com/technology/home.jsp
    • (2013)
    • Gartner1
  • 16
    • 35348819332 scopus 로고    scopus 로고
    • VPC prediction: Reducing the cost of indirect branches via hardware-based dynamic devirtualization
    • H. Kim et al., VPC prediction: reducing the cost of indirect branches via hardware-based dynamic devirtualization, Proceed. of the Interntl. Symp. on Computer Architecture, 2007, pp. 424-435.
    • (2007) Proceed. of the Interntl. Symp. on Computer Architecture , pp. 424-435
    • Kim, H.1
  • 20
    • 84961331206 scopus 로고    scopus 로고
    • (2014, February) musl-libc
    • (2014, February) musl-libc. [Online]. http://www.musl-libc.org/
  • 24
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack based buffer overflow attacks
    • M. Prasad and T. Chiueh, A binary rewriting defense against stack based buffer overflow attacks, Proc. of Usenix Tech. Conf., 2003, pp. 211-224.
    • (2003) Proc. of Usenix Tech. Conf. , pp. 211-224
    • Prasad, M.1    Chiueh, T.2
  • 29
    • 85021046176 scopus 로고    scopus 로고
    • Enforcing forward-edge control-flow integrity in gcc & llvm
    • C. Tice et al., Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM, 23rd USENIX Security Symposium, 2014.
    • (2014) 23rd USENIX Security Symposium
    • Tice, C.1
  • 33
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for cots binaries
    • M. Zhang and R. Sekar, Control Flow Integrity for COTS Binaries, USENIX Security Symposium, 2013, pp. 337-352.
    • (2013) USENIX Security Symposium , pp. 337-352
    • Zhang, M.1    Sekar, R.2
  • 34
    • 84881218812 scopus 로고    scopus 로고
    • Practical control flow integrity and randomization for binary executables
    • C. Zhang et al., Practical Control Flow Integrity and Randomization for Binary Executables, IEEE Symposium on Security and Privacy (S&P), 2013, pp. 559-573.
    • (2013) IEEE Symposium on Security and Privacy (S&P) , pp. 559-573
    • Zhang, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.