메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); JUST IN TIME PRODUCTION; RANDOM PROCESSES;

EID: 85080743214     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23262     Document Type: Conference Paper
Times cited : (144)

References (58)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack magazine, 7(49):365, 1996.
    • (1996) Phrack magazine , vol.7 , Issue.49 , pp. 365
    • One, Aleph1
  • 3
    • 85025171717 scopus 로고    scopus 로고
    • Oxymoron - making fine-grained memory randomization practical by allowing code sharing
    • M. Backes and S. Nürnberger. Oxymoron - making fine-grained memory randomization practical by allowing code sharing. In USENIX Security Symposium, 2014.
    • (2014) USENIX Security Symposium
    • Backes, M.1    Nürnberger, S.2
  • 5
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security Symposium, 2005.
    • (2005) USENIX Security Symposium
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D. C.3
  • 12
    • 85180547504 scopus 로고    scopus 로고
    • and w00w00 Security Team
    • M. Conover and w00w00 Security Team. w00w00 on heap overflows. http://www.cgsecurity.org/exploit/heaptut.txt, 1999.
    • (1999) w00w00 on heap overflows
    • Conover, M.1
  • 15
    • 85062385228 scopus 로고    scopus 로고
    • Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection
    • L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In USENIX Security Symposium, 2014.
    • (2014) USENIX Security Symposium
    • Davi, L.1    Sadeghi, A.-R.2    Lehmann, D.3    Monrose, F.4
  • 16
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • T. Durden. Bypassing PaX ASLR protection. Phrack magazine, 11(59), 2002.
    • (2002) Phrack magazine , vol.11 , Issue.59
    • Durden, T.1
  • 18
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security Symposium, 2012.
    • (2012) USENIX Security Symposium
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A. S.3
  • 30
    • 85180554872 scopus 로고    scopus 로고
    • libdasm. libdasm
    • libdasm. libdasm. https://code.google.com/p/libdasm/, 2014.
    • (2014)
  • 33
    • 85180545707 scopus 로고    scopus 로고
    • Accessed: 2014-07-14
    • Metasploit. Metasploit. http://www.metasploit.com/. Accessed: 2014-07-14.
    • Metasploit
  • 35
    • 84893320590 scopus 로고    scopus 로고
    • Dynamic test generation to find integer bugs in x86 binary linux programs
    • D. Molnar, X. C. Li, and D. A. Wagner. Dynamic test generation to find integer bugs in x86 binary linux programs. In USENIX Security Symposium, 2009.
    • (2009) USENIX Security Symposium
    • Molnar, D.1    Li, X. C.2    Wagner, D. A.3
  • 44
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In ACM Conference on Computer and Communications Security (CCS), 2007.
    • (2007) ACM Conference on Computer and Communications Security (CCS)
    • Shacham, H.1
  • 49
    • 78649987048 scopus 로고    scopus 로고
    • Heap Feng Shui in JavaScript
    • A. Sotirov. Heap Feng Shui in JavaScript. In Black Hat Europe, 2007.
    • (2007) Black Hat Europe
    • Sotirov, A.1
  • 50
    • 84906818067 scopus 로고    scopus 로고
    • Wheres the feeb? the effectiveness of instruction set randomization
    • A. N. Sovarel, D. Evans, and N. Paul. Wheres the feeb? the effectiveness of instruction set randomization. In USENIX Security Symposium, 2005.
    • (2005) USENIX Security Symposium
    • Sovarel, A. N.1    Evans, D.2    Paul, N.3
  • 54
    • 77955183968 scopus 로고    scopus 로고
    • Taintscope: A checksumaware directed fuzzing tool for automatic software vulnerability detection
    • T. Wang, T. Wei, G. Gu, and W. Zou. Taintscope: A checksumaware directed fuzzing tool for automatic software vulnerability detection. In IEEE Symposium on Security and Privacy, 2010.
    • (2010) IEEE Symposium on Security and Privacy
    • Wang, T.1    Wei, T.2    Gu, G.3    Zou, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.