메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Effective entropy: Security-centric metric for memory randomization techniques

Author keywords

[No Author keywords available]

Indexed keywords

ENTROPY;

EID: 85084163668     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (25)
  • 1
    • 49949115783 scopus 로고    scopus 로고
    • Data space randomization
    • Springer-Verlag
    • BHATKAR, S., AND SEKAR, R. Data space randomization. DIMVA’08, Springer-Verlag, pp. 1–22.
    • DIMVA’08 , pp. 1-22
    • Bhatkar, S.1    Sekar, R.2
  • 2
    • 79955994779 scopus 로고    scopus 로고
    • Jump-oriented programming: A new class of code-reuse attack
    • ACM
    • BLETSCH, T., JIANG, X., FREEH, V. W., AND LIANG, Z. Jump-oriented programming: a new class of code-reuse attack. ASIACCS’11, ACM, pp. 30–40.
    • ASIACCS’11 , pp. 30-40
    • Bletsch, T.1    Jiang, X.2    Freeh, V.W.3    Liang, Z.4
  • 3
    • 84976685912 scopus 로고    scopus 로고
    • Space efficient conservative garbage collection
    • ACM
    • BOEHM, H.-J. Space efficient conservative garbage collection. PLDI’93, ACM, pp. 197–206.
    • PLDI’93 , pp. 197-206
    • Boehm, H.-J.1
  • 8
    • 78751539789 scopus 로고    scopus 로고
    • Heap taichi: Exploiting memory allocation granularity in heap-spraying attacks
    • ACM
    • DING, Y., WEI, T., WANG, T., LIANG, Z., AND ZOU, W. Heap taichi: exploiting memory allocation granularity in heap-spraying attacks. ACSAC’10, ACM, pp. 327–336.
    • ACSAC’10 , pp. 327-336
    • Ding, Y.1    Wei, T.2    Wang, T.3    Liang, Z.4    Zou, W.5
  • 9
    • 14844332687 scopus 로고    scopus 로고
    • Propolice: Improved stacksmashing attack detection
    • ETOH, H., AND YODA, K. Propolice: Improved stacksmashing attack detection. IPSJ SIG Notes 75 (2001), 181–188.
    • (2001) IPSJ SIG Notes , vol.75 , pp. 181-188
    • Etoh, H.1    Yoda, K.2
  • 10
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • GIUFFRIDA, C., KUIJSTEN, A., AND TANENBAUM, A. S. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security’12.
    • USENIX Security’12
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A.S.3
  • 14
    • 39049113465 scopus 로고    scopus 로고
    • Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
    • KIL, C., JIM, J., BOOKHOLT, C., XU, J., AND NING, P. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. ACSAC’06, pp. 339–348.
    • ACSAC’06 , pp. 339-348
    • Kil, C.1    Jim, J.2    Bookholt, C.3    Xu, J.4    Ning, P.5
  • 15
    • 84878363772 scopus 로고    scopus 로고
    • Smashing the gadgets: Hindering return-oriented programming using in-place code randomization
    • PAPPAS, V., POLYCHRONAKIS, M., AND KEROMYTIS, A. D. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In IEEE S&P’12, pp. 601–615.
    • IEEE S&P’12 , pp. 601-615
    • Pappas, V.1    Polychronakis, M.2    Keromytis, A.D.3
  • 17
    • 84937679667 scopus 로고    scopus 로고
    • The info leak era on software exploitation
    • SERNA, F. J. The info leak era on software exploitation. In Black Hat USA (2012).
    • (2012) Black Hat USA
    • Serna, F.J.1
  • 18
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • ACM
    • SHACHAM, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). CCS’07, ACM, pp. 552–561.
    • CCS’07 , pp. 552-561
    • Shacham, H.1
  • 21
    • 78650018752 scopus 로고    scopus 로고
    • Bypassing browser memory protections in windows vista
    • SOTIROV, A., AND DOWD, M. Bypassing browser memory protections in windows vista. Blackhat USA (2008).
    • (2008) Blackhat USA
    • Sotirov, A.1    Dowd, M.2
  • 23
    • 85080628271 scopus 로고    scopus 로고
    • Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
    • WANG, T., WEI, T., LIN, Z., AND ZOU, W. Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution. In NDSS’09.
    • NDSS’09
    • Wang, T.1    Wei, T.2    Lin, Z.3    Zou, W.4
  • 24
    • 84869451043 scopus 로고    scopus 로고
    • Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code
    • ACM
    • WARTELL, R., MOHAN, V., HAMLEN, K. W., AND LIN, Z. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. CCS’12, ACM, pp. 157–168.
    • CCS’12 , pp. 157-168
    • Wartell, R.1    Mohan, V.2    Hamlen, K.W.3    Lin, Z.4
  • 25
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib (c) exploits: Pax case study
    • Phile# 0x04 of 0x0e
    • WOJTCZUK, R. The advanced return-into-lib (c) exploits: Pax case study. Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile# 0x04 of 0x0e (2001).
    • (2001) Phrack Magazine , vol.x0b , Issue.x3a
    • Wojtczuk, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.