메뉴 건너뛰기




Volumn , Issue , 2013, Pages

“Weird machines” in ELF: A spotlight on the underappreciated metadata

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL STORAGE; METADATA; STATIC ANALYSIS;

EID: 85084161911     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (32)

References (45)
  • 1
    • 85080614622 scopus 로고    scopus 로고
    • Brainfuck. http://esolangs.org/wiki/brainfuck
    • Brainfuck. http://esolangs.org/wiki/brainfuck.
  • 2
    • 85080586842 scopus 로고    scopus 로고
    • ERESI Project. http://www.eresi-project.org
    • ERESI Project. http://www.eresi-project.org.
  • 4
    • 85077797416 scopus 로고    scopus 로고
    • Once upon a free()
    • ANONYMOUS AUTHOR
    • ANONYMOUS AUTHOR. Once upon a free(). Phrack 57:9. http://phrack.org/issues.html?issue=57&id=9.
    • Phrack , vol.57 , pp. 9
  • 5
    • 85080515929 scopus 로고    scopus 로고
    • Heap exploitation. Abstraction by example
    • ARGYROUDIS, P., AND KARAMITAS, C. Heap Exploitation. Abstraction by Example. OWASP AppSecResearch, 2012. http://census- labs.com/media/ heap- owasp- appsec- 2012.pdf.
    • (2012) OWASP AppSecResearch
    • Argyroudis, P.1    Karamitas, C.2
  • 6
    • 85080602519 scopus 로고    scopus 로고
    • Hackers and computer science: What hacker research taught me
    • December
    • BRATUS, S. Hackers and Computer Science: What Hacker Research Taught Me. 27th Chaos Communications Congress, December 2010. http://events.ccc.de/congress/2010/Fahrplan/events/3983.en.html.
    • (2010) 27th Chaos Communications Congress
    • Bratus, S.1
  • 13
    • 85080529588 scopus 로고    scopus 로고
    • CODE FOX
    • CODE FOX. SignElf. http://sourceforge.net/projects/signelf/.
    • SignElf
  • 14
    • 84914110148 scopus 로고    scopus 로고
    • Exploitation and state machines: Programming the”weird machine”, revisited
    • Apr
    • DULLIEN, T. Exploitation and state machines: Programming the”weird machine”, revisited. In Infiltrate Conference (Apr 2011).
    • (2011) Infiltrate Conference
    • Dullien, T.1
  • 15
    • 85095128397 scopus 로고    scopus 로고
    • A framework for automated architecture-independent gadget search
    • August
    • DULLIEN, T., KORNAU, T., AND WEINMANN, R.-P. A Framework for Automated Architecture-Independent Gadget Search. In USENIX WOOT (August 2010).
    • (2010) USENIX WOOT
    • Dullien, T.1    Kornau, T.2    Weinmann, R.-P.3
  • 16
    • 85080565125 scopus 로고    scopus 로고
    • Ripples in the gene pool - creating genetic: Mutations to survive the vulerability window
    • August
    • EAGLE, C. Ripples in the Gene Pool - Creating Genetic: Mutations to Survive the Vulerability Window. Defcon 14, August 2006.
    • (2006) Defcon , vol.14
    • Eagle, C.1
  • 17
    • 85080574543 scopus 로고    scopus 로고
    • ELITHEELI
    • ELITHEELI. “stupid machines”. https://github.com/elitheeli/stupid-machines.
    • Stupid Machines
  • 20
    • 85080577311 scopus 로고    scopus 로고
    • Injecting custom payload into signed windows executables analysis of the CVE-2012-0151 vulnerability
    • June
    • GLÜCKSMANN, I. Injecting custom payload into signed Windows executables Analysis of the CVE-2012-0151 vulnerability. ReCON, June 2012. http://recon.cx/2012/schedule/events/246.en.html.
    • (2012) ReCON
    • Glücksmann, I.1
  • 21
    • 85080478370 scopus 로고    scopus 로고
    • Armouring the ELF: Binary encryption on the UNIX platform
    • GRUGQ, AND SCUT
    • GRUGQ, AND SCUT. Armouring the ELF: Binary encryption on the UNIX platform. Phrack 58:5. http://phrack.org/issues.html?issue=58&id=5.
    • Phrack , vol.58 , pp. 5
  • 22
    • 85080492188 scopus 로고    scopus 로고
    • The art of exploitation: Exploiting VLC, a jemalloc case stud y
    • HUKU, AND ARGP. Apr
    • HUKU, AND ARGP. The Art of Exploitation: Exploiting VLC, a jemalloc Case Stud y. Phrack Magazine 68, 13 (Apr 2012).
    • (2012) Phrack Magazine , vol.68 , pp. 13
  • 23
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • USENIX Association
    • HUND, R., HOLZ, T., AND FREILING, F. C. Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th USENIX Security Symposium (2009), USENIX Association, pp. 383–398.
    • (2009) Proceedings of the 18th USENIX Security Symposium , pp. 383-398
    • Hund, R.1    Holz, T.2    Freiling, F.C.3
  • 24
    • 84954487367 scopus 로고    scopus 로고
    • Advanced doug lea’s malloc exploits
    • JP
    • JP. Advanced Doug Lea’s malloc Exploits. Phrack 61:6. http://phrack.org/issues.html?issue=61&id=6.
    • Phrack , vol.61 , pp. 6
  • 25
    • 85080538873 scopus 로고    scopus 로고
    • Backdooring binary objects
    • KLOG
    • KLOG. Backdooring Binary Objects. Phrack 56:9. http://phrack.org/issues.html?issue=56&id=9.
    • Phrack , vol.56 , pp. 9
  • 29
    • 85077789359 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • MAXX
    • MAXX. Vudo malloc Tricks. Phrack 57:8. http://phrack.org/issues.html?issue=57&id=8.
    • Phrack , vol.57 , pp. 8
  • 30
    • 85080497502 scopus 로고    scopus 로고
    • The cerberus ELF interface
    • MAYHEM
    • MAYHEM. The Cerberus ELF Interface. Phrack 61:8. http://phrack.org/issues.html?issue=61&id=8.
    • Phrack , vol.61 , pp. 8
  • 32
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PAX case study
    • NERGAL. Dec
    • NERGAL. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 58, 4 (Dec 2001).
    • (2001) Phrack Magazine , vol.58 , pp. 4
  • 33
    • 85084161804 scopus 로고    scopus 로고
    • Exploiting the hard-working dwarf: Trojan and exploit techniques with no native executable code
    • OAKLEY, J., AND BRATUS, S. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code. In USENIX WOOT (2011), pp. 91–102.
    • (2011) USENIX WOOT , pp. 91-102
    • Oakley, J.1    Bratus, S.2
  • 34
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • ONE, A. Smashing the Stack for Fun and Profit. Phrack 49:14. http://phrack.org/issues.html?issue=49&id=14.
    • Phrack , vol.49 , pp. 14
    • One, A.1
  • 36
    • 84930441153 scopus 로고    scopus 로고
    • The art of exploitation: MS IIS 7.5 remote heap overflow
    • REDPANTZ. Apr
    • REDPANTZ. The Art of Exploitation: MS IIS 7.5 Remote Heap Overflow. Phrack Magazine 68, 12 (Apr 2012).
    • (2012) Phrack Magazine , vol.68 , pp. 12
  • 38
    • 84859457954 scopus 로고    scopus 로고
    • Return-oriented programming: Systems, languages, and applications
    • Mar
    • ROEMER, R., BUCHANAN, E., SHACHAM, H., AND SAVAGE, S. Return-oriented programming: Systems, languages, and applications. ACM Trans. Inf. Syst. Secur. 15, 1 (Mar. 2012), 2:1–2:34.
    • (2012) ACM Trans. Inf. Syst. Secur. , vol.15 , Issue.1 , pp. 21-234
    • Roemer, R.1    Buchanan, E.2    Shacham, H.3    Savage, S.4
  • 40
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls
    • SHACHAM, H. The Geometry of Innocent Flesh on the Bone: return-into-libc without Function Calls. In ACM Conference on Computer and Communications Security (2007), pp. 552–561.
    • (2007) ACM Conference on Computer and Communications Security , pp. 552-561
    • Shacham, H.1
  • 41
    • 85080563744 scopus 로고    scopus 로고
    • Embedded ELF debugging: The middle head of cerberus
    • T. E
    • SHELL CREW, T. E. Embedded ELF Debugging: the middle head of Cerberus. Phrack 63:9. http://phrack.org/issues.html?issue=63&id=9.
    • Phrack , vol.63 , pp. 9
    • Crew, S.1
  • 42
    • 85080534756 scopus 로고    scopus 로고
    • SKAPE. January
    • SKAPE. ELF binary signing and verification. ttp://www.hick.org/code/skape/papers/elfsign.txt, January 2003.
    • (2003) ELF Binary Signing and Verification
  • 43
    • 84878374701 scopus 로고    scopus 로고
    • Locreate: An anagram for relocate
    • SKAPE. Jan
    • SKAPE. Locreate: an Anagram for Relocate. Uninformed 6 (Jan 2007).
    • (2007) Uninformed , vol.6
  • 45
    • 18144415290 scopus 로고    scopus 로고
    • Indiana University Computer Science
    • VELDHUIZEN, T. L. C++ Templates are Turing Complete. http://ubietylab.net/ubigraph/content/Papers/pdf/CppTuring.pdf. Indiana University Computer Science.
    • C++ Templates Are Turing Complete
    • Veldhuizen, T.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.