메뉴 건너뛰기




Volumn , Issue , 2013, Pages

The page-fault weird machine: Lessons in instruction-less computation

Author keywords

[No Author keywords available]

Indexed keywords

MEMORY ARCHITECTURE;

EID: 85084162701     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (27)

References (28)
  • 2
    • 85077797416 scopus 로고    scopus 로고
    • Once upon a free()
    • anonymous author
    • anonymous author. Once upon a free(). Phrack 57:9. http://phrack.org/issues.html?issue=57&id=9.
    • Phrack , vol.57 , pp. 9
  • 3
    • 85080323197 scopus 로고    scopus 로고
    • What hacker research taught me
    • Sergey Bratus. What Hacker Research Taught Me. In RSS, 2009. http://www.cs.dartmouth.edu/~sergey/hc/rss-hacker-research.pdf.
    • (2009) RSS
    • Bratus, S.1
  • 4
    • 84889728202 scopus 로고    scopus 로고
    • Exploit programming: From buffer overflows to weird machines and theory of computation
    • Sergey Bratus, Michael E Locasto, Meredith L Patterson, Len Sassaman, and Anna Shubina. Exploit Programming: From Buffer Overflows to Weird Machines and Theory of Computation. USENIX; login, pages 13–21, 2011.
    • (2011) USENIX; Login , pp. 13-21
    • Bratus, S.1    Locasto, M.E.2    Patterson, M.L.3    Sassaman, L.4    Shubina, A.5
  • 5
    • 84914110148 scopus 로고    scopus 로고
    • Exploitation and state machines: Programming the weird machine, revisited
    • April
    • Thomas Dullien. Exploitation and State Machines: Programming the Weird Machine, Revisited. In Infiltrate, April 2011. http://www.immunityinc.com/infiltrate/2011/presentations/Fundamentals_of_exploitation_revisited.pdf.
    • (2011) Infiltrate
    • Dullien, T.1
  • 8
    • 85080416599 scopus 로고    scopus 로고
    • The innerHTML apocalypse - how mXSS attacks change everything we believed we knew so far
    • Mario Heiderich. The innerHTML Apocalypse - How mXSS attacks change everything we believed we knew so far. In SysCan conference, 2013.
    • (2013) SysCan Conference
    • Heiderich, M.1
  • 10
    • 84954487367 scopus 로고    scopus 로고
    • Advanced Doug Lea’s malloc exploits
    • jp
    • jp. Advanced Doug Lea’s malloc Exploits. Phrack 61:6. http://phrack.org/issues.html?issue=61&id=6.
    • Phrack , vol.61 , pp. 6
  • 11
    • 85077789359 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • MaXX
    • MaXX. Vudo malloc Tricks. Phrack 57:8. http://phrack.org/issues.html?issue=57&id=8.
    • Phrack , vol.57 , pp. 8
  • 13
    • 84863454556 scopus 로고    scopus 로고
    • RockSalt: Better, faster, atronger SFI for the x86
    • Greg Morrisett, Gang Tan, Joseph Tassarotti, Jean-Baptiste Tristan, and Edward Gan. RockSalt: Better, Faster, Atronger SFI for the x86. In PLDI, pages 395–404, 2012.
    • (2012) PLDI , pp. 395-404
    • Morrisett, G.1    Tan, G.2    Tassarotti, J.3    Tristan, J.-B.4    Gan, E.5
  • 14
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits: PAX case study
    • Dec
    • Nergal. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 58(4), Dec 2001.
    • (2001) Phrack Magazine , vol.58 , Issue.4
    • Nergal1
  • 15
    • 85084161804 scopus 로고    scopus 로고
    • Exploiting the ward-working DWARF: Trojan and exploit techniques with no native executable code
    • Berkeley, CA, USA, USENIX Association
    • James Oakley and Sergey Bratus. Exploiting the Ward-working DWARF: Trojan and Exploit Techniques with no Native Executable Code. In Proceedings of the 5th USENIX conference on Offensive technologies, WOOT’11, pages 11–11, Berkeley, CA, USA, 2011. USENIX Association.
    • (2011) Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT’11 , pp. 11
    • Oakley, J.1    Bratus, S.2
  • 17
    • 85077789287 scopus 로고    scopus 로고
    • PaX Team, http://pax.grsecurity.net/docs/pageexec.old.txt. PAGEEXEC, 2003.
    • (2003) PAGEEXEC
  • 18
    • 85080432318 scopus 로고    scopus 로고
    • PaxTeam, http://pax.grsecurity.net/docs/pageexec.old.txt. PAGEEXEC implementation, 2000.
    • (2000) PAGEEXEC Implementation
  • 19
    • 85080442352 scopus 로고    scopus 로고
    • Programming weird machines with ELF metadata
    • Rebecca Shapiro. Programming Weird Machines with ELF Metadata. In DEFCON 20, 2012.
    • (2012) DEFCON , vol.20
    • Shapiro, R.1
  • 21
    • 84930431842 scopus 로고    scopus 로고
    • About exploits writing
    • Title as indicated
    • Gerardo Richarte. About Exploits Writing. Technical report, Core Security Technologies, http://corelabs.coresecurity.com/index.php?module=Wiki&action=attachment&type=researcher&page=Gerardo_Richarte&file=publication%2FAbout_Exploits_Writing%2F2002.gera.About_Exploits_Writing.pdf, 2002. [Title as indicated.].
    • (2002) Technical Report, Core Security Technologies
    • Richarte, G.1
  • 24
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls
    • Hovav Shacham. The Geometry of Innocent Flesh on the Bone: return-into-libc without Function Calls. In ACM Conference on Computer and Communications Security, pages 552–561, 2007.
    • (2007) ACM Conference on Computer and Communications Security , pp. 552-561
    • Shacham, H.1
  • 25
    • 84878374701 scopus 로고    scopus 로고
    • LOCREATE: An anagram for relocate
    • Skape
    • Skape. LOCREATE: an Anagram for Relocate. Uninformed, 6, 2007. http://uninformed.org/?v=6&a=3&t=pdf.
    • (2007) Uninformed , vol.6
  • 26
    • 57349167955 scopus 로고    scopus 로고
    • ShadowWalker: Raising the bar for rootkit detection
    • Sherri Sparks and Jamie Butler. ShadowWalker: Raising the Bar for Rootkit detection. In DEFCON 13, 2005.
    • (2005) DEFCON , vol.13
    • Sparks, S.1    Butler, J.2
  • 27
    • 80053624333 scopus 로고    scopus 로고
    • OllyBone: Semi-automatic unpacking on IA-32
    • Joe Stewart. OllyBone: Semi-Automatic Unpacking on IA-32. In DEFCON 14, 2006.
    • (2006) DEFCON , vol.14
    • Stewart, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.