메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Protecting C++ Dynamic Dispatch Through VTable Interleaving

Author keywords

[No Author keywords available]

Indexed keywords

C++ (PROGRAMMING LANGUAGE); COMPUTER SOFTWARE;

EID: 85025134274     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2016.23421     Document Type: Conference Paper
Times cited : (59)

References (44)
  • 1
    • 85180744477 scopus 로고    scopus 로고
    • MITRE, CWE-ID CWE-122. [Online]. Available
    • “CWE-122.” Available from MITRE, CWE-ID CWE-122. [Online]. Available: https://cwe.mitre.org/data/definitions/122.html
    • CWE-122
  • 2
    • 85180783359 scopus 로고    scopus 로고
    • MITRE, CVE-ID CVE-2014-0160., [Online]. Available
    • “CVE-2012-0167.” Available from MITRE, CVE-ID CVE-2014-0160., 2011. [Online]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2012-0167
    • (2011) CVE-2012-0167
  • 4
  • 6
    • 85084160243 scopus 로고    scopus 로고
    • Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • A. D. Rubin, Ed
    • C. Cowan, “Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks,” in USENIX Security, A. D. Rubin, Ed., 1998.
    • (1998) USENIX Security
    • Cowan, C.1
  • 7
    • 85009448253 scopus 로고    scopus 로고
    • PointguardTM: Protecting pointers from buffer overflow vulnerabilities
    • C. Cowan, S. Beattie, J. Johansen, and P. Wagle, “PointguardTM: Protecting pointers from buffer overflow vulnerabilities,” in USENIX Security, 2003.
    • (2003) USENIX Security
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 16
    • 85180403748 scopus 로고    scopus 로고
    • SafeDispatch: Securing C++ virtual calls from memory corruption attacks
    • D. Jang, Z. Tatlock, and S. Lerner, “SafeDispatch: Securing C++ virtual calls from memory corruption attacks,” in NDSS, 2014.
    • (2014) NDSS
    • Jang, D.1    Tatlock, Z.2    Lerner, S.3
  • 18
    • 85076313142 scopus 로고    scopus 로고
    • Type casting verification: Stopping an emerging attack vector
    • B. Lee, C. Song, T. Kim, and W. Lee, “Type casting verification: Stopping an emerging attack vector,” in USENIX Security, 2015.
    • (2015) USENIX Security
    • Lee, B.1    Song, C.2    Kim, T.3    Lee, W.4
  • 20
    • 85180798431 scopus 로고    scopus 로고
    • http://clang.llvm.org docs/SafeStack.html
    • LLVM Team, “http://clang.llvm.org/docs/safestack.html,” http://clang.llvm.org/ docs/SafeStack.html, 2014.
    • (2014)
  • 23
    • 85072935637 scopus 로고    scopus 로고
    • Evaluating SFI for a CISC architecture
    • S. McCamant and G. Morrisett, “Evaluating SFI for a CISC architecture,” in In USENIX, 2006.
    • (2006) USENIX
    • McCamant, S.1    Morrisett, G.2
  • 25
    • 84881252577 scopus 로고    scopus 로고
    • Microsoft Visual Studio, “Image has safe exception handlers,” http: //msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx, 2005.
    • (2005) Image has safe exception handlers
  • 28
    • 84901593819 scopus 로고    scopus 로고
    • Modular control-flow integrity
    • B. Niu and G. Tan, “Modular control-flow integrity,” in PLDI, 2014.
    • (2014) PLDI
    • Niu, B.1    Tan, G.2
  • 30
    • 85119250464 scopus 로고    scopus 로고
    • vfguard: Strict protection for virtual function calls in COTS C++ binaries
    • A. Prakash, X. Hu, and H. Yin, “vfguard: Strict protection for virtual function calls in COTS C++ binaries,” in NDSS, 2015.
    • (2015) NDSS
    • Prakash, A.1    Hu, X.2    Yin, H.3
  • 32
    • 84945184526 scopus 로고    scopus 로고
    • Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications
    • F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A. Sadeghi, and T. Holz, “Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications,” in S&P, 2015, pp. 745-762.
    • (2015) S&P , pp. 745-762
    • Schuster, F.1    Tendyck, T.2    Liebchen, C.3    Davi, L.4    Sadeghi, A.5    Holz, T.6
  • 33
    • 85094171206 scopus 로고    scopus 로고
    • Misfit: A tool for constructing safe extensible C++ systems
    • S. Vinoski, Ed
    • C. Small, “Misfit: A tool for constructing safe extensible C++ systems,” in USENIX Conference on Object-Oriented Technologies (COOTS), S. Vinoski, Ed., 1997, pp. 175-184.
    • (1997) USENIX Conference on Object-Oriented Technologies (COOTS) , pp. 175-184
    • Small, C.1
  • 38
    • 85105238769 scopus 로고
    • Efficient software-based fault isolation
    • R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, “Efficient software-based fault isolation,” in SOSP, 1993, pp. 203-216.
    • (1993) SOSP , pp. 203-216
    • Wahbe, R.1    Lucco, S.2    Anderson, T. E.3    Graham, S. L.4
  • 39
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Z. Wang and X. Jiang, “Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity,” in S&P, 2010.
    • (2010) S&P
    • Wang, Z.1    Jiang, X.2
  • 41
    • 80755144046 scopus 로고    scopus 로고
    • Combining control-flow integrity and static analysis for efficient and validated data sandboxing
    • B. Zeng, G. Tan, and G. Morrisett, “Combining control-flow integrity and static analysis for efficient and validated data sandboxing,” in CCS, 2011, pp. 29-40.
    • (2011) CCS , pp. 29-40
    • Zeng, B.1    Tan, G.2    Morrisett, G.3
  • 42
    • 85114493450 scopus 로고    scopus 로고
    • Vtint: Protecting virtual function tables’ integrity
    • C. Zhang, C. Song, K. Z. Chen, Z. Chen, and D. Song, “Vtint: Protecting virtual function tables’ integrity,” in NDSS, 2015.
    • (2015) NDSS
    • Zhang, C.1    Song, C.2    Chen, K. Z.3    Chen, Z.4    Song, D.5
  • 43
    • 84881218812 scopus 로고    scopus 로고
    • Practical control flow integrity and randomization for binary executables
    • C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, “Practical control flow integrity and randomization for binary executables,” in S&P, 2013, pp. 559-573.
    • (2013) S&P , pp. 559-573
    • Zhang, C.1    Wei, T.2    Chen, Z.3    Duan, L.4    Szekeres, L.5    McCamant, S.6    Song, D.7    Zou, W.8
  • 44
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for COTS binaries
    • M. Zhang and R. Sekar, “Control flow integrity for COTS binaries,” in USENIX Security, 2013, pp. 337-352.
    • (2013) USENIX Security , pp. 337-352
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.