메뉴 건너뛰기




Volumn , Issue , 2019, Pages 125-137

Body armor for binaries: Preventing buffer overflows without recompilation

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER OVERFLOWS; COMPETING TECHNOLOGIES; FALSE POSITIVE; MEMORY CORRUPTION ATTACKS; NON-CONTROL DATA ATTACKS; NOVEL TECHNIQUES; RECOMPILATION; SOURCE CODES;

EID: 85077121004     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (33)
  • 4
    • 85049220056 scopus 로고    scopus 로고
    • Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
    • USENIX-SS'09
    • AKRITIDIS, P., COSTA, M., CASTRO, M., AND HAND, S. Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors. In Proc. of the 18th Usenix Security Symposium (2009), USENIX-SS'09.
    • (2009) Proc. Of the 18th Usenix Security Symposium
    • Akritidis, P.1    Costa, M.2    Castro, M.3    Hand, S.4
  • 18
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • ELIAS LEVY (ALEPH ONE). Smashing the stack for fun and profit. Phrack 7, 49 (1996).
    • (1996) Phrack , vol.7 , pp. 49
    • Levy, E.1
  • 29
    • 84951736831 scopus 로고    scopus 로고
    • Howard: A dynamic excavator for reverse engineering data structures
    • SLOWINSKA, A., STANCESCU, T., AND BOS, H. Howard: a dynamic excavator for reverse engineering data structures. In Proceedings of NDSS (2011).
    • (2011) Proceedings of NDSS
    • Slowinska, A.1    Stancescu, T.2    Bos, H.3
  • 30
    • 85077126800 scopus 로고    scopus 로고
    • Modern exploitation and memory protection bypasses
    • August
    • SOTIROV, A. Modern exploitation and memory protection bypasses. USENIX Security invited talk, www.usenix.org/events/sec09/tech/slides/sotirov.pdf, August 2009.
    • (2009) USENIX Security Invited Talk
    • Sotirov, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.