메뉴 건너뛰기




Volumn , Issue , 2015, Pages

VTint: Protecting Virtual Function Tables' Integrity

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CODES; CONTROL DATA; CONTROL-FLOW; DEFENSE SOLUTIONS; FUNCTION CALLS; FUNCTION POINTERS; HEAP OVERFLOW; VIRTUAL FUNCTION TABLES; VIRTUAL FUNCTIONS; VIRTUAL TABLES;

EID: 85114493450     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23099     Document Type: Conference Paper
Times cited : (90)

References (53)
  • 4
    • 33745217853 scopus 로고    scopus 로고
    • Diehard: probabilistic memory safety for unsafe languages
    • ACM
    • E. D. Berger and B. G. Zorn, “Diehard: probabilistic memory safety for unsafe languages, ” in PLDI, vol. 41, no. 6. ACM, 2006, pp. 158-168.
    • (2006) PLDI , vol.41 , Issue.6 , pp. 158-168
    • Berger, E. D.1    Zorn, B. G.2
  • 9
    • 85180814356 scopus 로고    scopus 로고
    • Static detection of c++ vtable escape vulnerabilities in binary code
    • D. Dewey and J. T. Giffin, “Static detection of c++ vtable escape vulnerabilities in binary code.” in NDSS, 2012.
    • (2012) NDSS
    • Dewey, D.1    Giffin, J. T.2
  • 16
    • 0034226001 scopus 로고    scopus 로고
    • SPEC CPU2000: Measuring CPU Performance in the New Millennium
    • Jul
    • J. L. Henning, “SPEC CPU2000: Measuring CPU Performance in the New Millennium, ” Computer, Jul. 2000.
    • (2000) Computer
    • Henning, J. L.1
  • 17
    • 36849034066 scopus 로고    scopus 로고
    • SPEC CPU2006 benchmark descriptions
    • Sep
    • J. L. Henning, “SPEC CPU2006 benchmark descriptions, ” SIGARCH Comput. Archit. News, vol. 34, pp. 1-17, Sep. 2006.
    • (2006) SIGARCH Comput. Archit. News , vol.34 , pp. 1-17
    • Henning, J. L.1
  • 21
    • 85076902948 scopus 로고    scopus 로고
    • Code-pointer integrity
    • [Online]. Available
    • V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song, “Code-pointer integrity, ” OSDI'14, 2014, 00000. [Online]. Available: https://www.usenix.org/system/files/conference/osdi14/osdi14-paper-kuznetsov.pdf?utm_source= dlvr.it&utm_medium=tumblr
    • (2014) OSDI'14 , pp. 00000
    • Kuznetsov, V.1    Szekeres, L.2    Payer, M.3    Candea, G.4    Sekar, R.5    Song, D.6
  • 27
    • 84881252577 scopus 로고    scopus 로고
    • Microsoft Visual Studio 2005, “Image has safe exception handlers, ” http://msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx.
    • (2005) Image has safe exception handlers
  • 30
  • 36
    • 0030836322 scopus 로고    scopus 로고
    • Low-cost, concurrent checking of pointer and array accesses in c programs
    • H. Patil and C. Fischer, “Low-cost, concurrent checking of pointer and array accesses in c programs, ” Softw., Pract. Exper., vol. 27, no. 1, pp. 87-110, 1997.
    • (1997) Softw., Pract. Exper , vol.27 , Issue.1 , pp. 87-110
    • Patil, H.1    Fischer, C.2
  • 39
    • 2642520196 scopus 로고    scopus 로고
    • A binary rewriting defense against stack based buffer overflow attacks
    • M. Prasad and T.-c. Chiueh, “A binary rewriting defense against stack based buffer overflow attacks, ” in USENIX Annual Technical Conference, 2003.
    • (2003) USENIX Annual Technical Conference
    • Prasad, M.1    Chiueh, T.-c.2
  • 41
    • 85066348691 scopus 로고    scopus 로고
    • RightWare
    • RightWare, “Browsermark 2.1 benchmark, ” http://browsermark.rightware.com/, 2014.
    • (2014) Browsermark 2.1 benchmark
  • 42
    • 85180546932 scopus 로고    scopus 로고
    • rix
    • rix, “Smashing C++ VPTRs, ” http://phrack.org/issues/56/8.html, 2000.
    • (2000) Smashing C++ VPTRs
  • 45
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86), ” in ACM Conference on Computer and Communications Security (CCS), 2007.
    • (2007) ACM Conference on Computer and Communications Security (CCS)
    • Shacham, H.1
  • 49
    • 84970915820 scopus 로고    scopus 로고
    • Improving function pointer security for virtual method dispatches
    • C. Tice, “Improving function pointer security for virtual method dispatches, ” in GNU Tools Cauldron Workshop, 2012.
    • (2012) GNU Tools Cauldron Workshop
    • Tice, C.1
  • 50
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Z. Wang and X. Jiang, “HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity, ” in IEEE Symposium on Security and Privacy, 2010.
    • (2010) IEEE Symposium on Security and Privacy
    • Wang, Z.1    Jiang, X.2
  • 51
    • 20344383014 scopus 로고    scopus 로고
    • An efficient and backwards-compatible transformation to ensure memory safety of c programs
    • ACM
    • W. Xu, D. C. DuVarney, and R. Sekar, “An efficient and backwards-compatible transformation to ensure memory safety of c programs, ” in ACM SIGSOFT Software Engineering Notes, vol. 29, no. 6. ACM, 2004, pp. 117-126.
    • (2004) ACM SIGSOFT Software Engineering Notes , vol.29 , Issue.6 , pp. 117-126
    • Xu, W.1    DuVarney, D. C.2    Sekar, R.3
  • 53
    • 85041451135 scopus 로고    scopus 로고
    • Control flow integrity for cots binaries
    • M. Zhang and R. Sekar, “Control flow integrity for cots binaries.” in USENIX Security, 2013, pp. 337-352.
    • (2013) USENIX Security , pp. 337-352
    • Zhang, M.1    Sekar, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.