메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Persistent Data-only Malware: Function Hooks without Code

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); HOOKS;

EID: 85089583900     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23019     Document Type: Conference Paper
Times cited : (31)

References (39)
  • 1
  • 5
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing stackguard and stackshield
    • January [Online]. Available
    • Bulba and Kil3r, “Bypassing stackguard and stackshield,” Phrack, vol. 56, no. 5, January 2000. [Online]. Available: http://www.phrack.org/issues.html?issue=56&id=5
    • (2000) Phrack , vol.56 , Issue.5
  • 10
    • 84925350246 scopus 로고    scopus 로고
    • corelanc0d3r, Corelan Team, Tech. Rep., December [Online]. Available
    • corelanc0d3r, “Exploit writing tutorial part 11: Heap spraying demystified,” Corelan Team, Tech. Rep., December 2011. [Online]. Available: https://www.corelan.be/index.php/2011/12/31/exploit-writing-tutorial-part-11-heap-spraying-demystified/
    • (2011) Exploit writing tutorial part 11: Heap spraying demystified
  • 17
    • 84964862930 scopus 로고    scopus 로고
    • Enhanced operating system security through efficient and fine-grained address space randomization
    • USENIX Association
    • C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, “Enhanced operating system security through efficient and fine-grained address space randomization,” in Proceedings of the 21st USENIX Security symposium. USENIX Association, 2012.
    • (2012) Proceedings of the 21st USENIX Security symposium
    • Giuffrida, C.1    Kuijsten, A.2    Tanenbaum, A. S.3
  • 18
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • USENIX Association
    • R. Hund, T. Holz, and F. C. Freiling, “Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms,” in Proceedings of the 18th USENIX Security Symposium. USENIX Association, 2009.
    • (2009) Proceedings of the 18th USENIX Security Symposium
    • Hund, R.1    Holz, T.2    Freiling, F. C.3
  • 21
    • 85056904897 scopus 로고    scopus 로고
    • Secfence, Tech. Rep., September [Online]. Available
    • V. Katoch, “Whitepaper on bypassing aslr/dep,” Secfence, Tech. Rep., September 2011. [Online]. Available: http://www.exploit-db.com/wp-content/themes/exploit/docs/17914.pdf
    • (2011) Whitepaper on bypassing aslr/dep
    • Katoch, V.1
  • 23
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits
    • December [Online]. Available
    • Nergal, “The advanced return-into-lib(c) exploits,” Phrack, vol. 58, no. 4, December 2001. [Online]. Available: http://www.phrack.org/issues.html?issue=58&id=4
    • (2001) Phrack , vol.58 , Issue.4
    • Nergal1
  • 25
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • November [Online]. Available
    • A. One, “Smashing the stack for fun and profit,” Phrack, vol. 49, no. 14, November 1996. [Online]. Available: http://www.phrack.org/issues.html?issue=49&id=14
    • (1996) Phrack , vol.49 , Issue.14
    • One, A.1
  • 28
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker, “Beyond stack smashing: recent advances in exploiting buffer overruns,” Security & Privacy, vol. 2, no. 4, pp. 20–27, 2004.
    • (2004) Security & Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 35
    • 76949101487 scopus 로고    scopus 로고
    • Getting around non-executable stack (and fix)
    • Aug
    • Solar Designer, “Getting around non-executable stack (and fix),” Bugtraq Mailing List, Aug. 1997.
    • (1997) Bugtraq Mailing List
    • Designer, Solar1
  • 36
    • 85180630038 scopus 로고    scopus 로고
    • 2nd ed., UEFI Inc., July [Online]. Available
    • UEFI Specification, 2nd ed., UEFI Inc., July 2013. [Online]. Available: http://www.uefi.org/specs/download/UEFI_2_4.pdf
    • (2013) UEFI Specification
  • 37


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.