메뉴 건너뛰기




Volumn , Issue , 2014, Pages

SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

Author keywords

[No Author keywords available]

Indexed keywords

C++ (PROGRAMMING LANGUAGE); COMPUTER SOFTWARE;

EID: 85180403748     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss/2014.23287     Document Type: Conference Paper
Times cited : (101)

References (43)
  • 3
    • 33746101822 scopus 로고    scopus 로고
    • Diehard: probabilistic memory safety for unsafe languages
    • E. D. Berger and B. G. Zorn, “Diehard: probabilistic memory safety for unsafe languages,” in PLDI, 2006.
    • (2006) PLDI
    • Berger, E. D.1    Zorn, B. G.2
  • 4
    • 85180546932 scopus 로고    scopus 로고
    • rix
    • rix, “Smashing c++ vptrs,” http://www.phrack.org/issues.html?issue=56&id=8, 2000.
    • (2000) Smashing c++ vptrs
  • 5
    • 85180626831 scopus 로고    scopus 로고
    • Java type confusion and fault attacks
    • O. Vertanen, “Java type confusion and fault attacks,” in FDTC, 2006.
    • (2006) FDTC
    • Vertanen, O.1
  • 6
    • 85180814356 scopus 로고    scopus 로고
    • Static detection of c++ vtable escape vulnerabilities in binary code
    • D. Dewey and J. Giffin, “Static detection of c++ vtable escape vulnerabilities in binary code,” in NDSS, 2012.
    • (2012) NDSS
    • Dewey, D.1    Giffin, J.2
  • 16
    • 84901619881 scopus 로고    scopus 로고
    • Strato-a retargetable framework for low-level inlined-reference monitors
    • B. Zeng, G. Tan, and Ú. Erlingsson, “Strato-a retargetable framework for low-level inlined-reference monitors,” in USENIX Security Symposium, 2013.
    • (2013) USENIX Security Symposium
    • Zeng, B.1    Tan, G.2    Erlingsson, Ú.3
  • 19
    • 69149107997 scopus 로고    scopus 로고
    • Browser security: lessons from google chrome
    • C. Reis, A. Barth, and C. Pizano, “Browser security: lessons from google chrome,” in CACM, 2009.
    • (2009) CACM
    • Reis, C.1    Barth, A.2    Pizano, C.3
  • 20
    • 70349120464 scopus 로고    scopus 로고
    • The security architecture of the chromium browser
    • A. Barth, C. Jackson, and C. Reis, “The security architecture of the chromium browser,” in Technical Report, 2008.
    • (2008) Technical Report
    • Barth, A.1    Jackson, C.2    Reis, C.3
  • 21
    • 3042658703 scopus 로고    scopus 로고
    • Llvm: A compilation framework for lifelong program analysis & transformation
    • C. Lattner and V. Adve, “Llvm: A compilation framework for lifelong program analysis & transformation,” in CGO, 2004.
    • (2004) CGO
    • Lattner, C.1    Adve, V.2
  • 22
    • 0003134151 scopus 로고
    • Optimization of object-oriented programs using static class hierarchy analysis
    • J. Dean, D. Grove, and C. Chambers, “Optimization of object-oriented programs using static class hierarchy analysis,” in ECOOP, 1995.
    • (1995) ECOOP
    • Dean, J.1    Grove, D.2    Chambers, C.3
  • 26
    • 85180623972 scopus 로고    scopus 로고
    • WebKit
    • WebKit, “Rendering performance tests,” https://code.google.com/p/webkit-mirror/source/browse/PerformanceTests/, 2013.
    • (2013) Rendering performance tests
  • 29
    • 85180814356 scopus 로고    scopus 로고
    • Static detection of c++ vtable escape vulnerabilities in binary code
    • D. Dewey and J. T. Giffin, “Static detection of c++ vtable escape vulnerabilities in binary code,” in NDSS, 2012.
    • (2012) NDSS
    • Dewey, D.1    Giffin, J. T.2
  • 30
    • 84945708437 scopus 로고
    • A method for overlapping and erasure of lists
    • G. E. Collins, “A method for overlapping and erasure of lists,” in CACM, 1960.
    • (1960) CACM
    • Collins, G. E.1
  • 31
    • 0005257134 scopus 로고    scopus 로고
    • One-bit counts between unique and sticky
    • D. J. Roth and D. S. Wise, “One-bit counts between unique and sticky,” in ISMM, 1998.
    • (1998) ISMM
    • Roth, D. J.1    Wise, D. S.2
  • 32
    • 33745393872 scopus 로고    scopus 로고
    • An on-the-fly reference-counting garbage collector for java
    • Y. Levanoni and E. Petrank, “An on-the-fly reference-counting garbage collector for java,” in TOPLAS, 2006.
    • (2006) TOPLAS
    • Levanoni, Y.1    Petrank, E.2
  • 36
    • 20344383014 scopus 로고    scopus 로고
    • An efficient and backwards-compatible transformation to ensure memory safety of c programs
    • W. Xu, D. C. DuVarney, and R. Sekar, “An efficient and backwards-compatible transformation to ensure memory safety of c programs,” in SIGSOFT, 2004.
    • (2004) SIGSOFT
    • Xu, W.1    DuVarney, D. C.2    Sekar, R.3
  • 39
    • 84865306275 scopus 로고    scopus 로고
    • Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
    • J. Caballero, G. Grieco, M. Marron, and A. Nappa, “Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities,” in ISSTA, 2012.
    • (2012) ISSTA
    • Caballero, J.1    Grieco, G.2    Marron, M.3    Nappa, A.4
  • 40
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: a framework for heavyweight dynamic binary instrumentation
    • N. Nethercote and J. Seward, “Valgrind: a framework for heavyweight dynamic binary instrumentation,” in PLDI, 2007.
    • (2007) PLDI
    • Nethercote, N.1    Seward, J.2
  • 41
    • 78650032754 scopus 로고    scopus 로고
    • Dieharder: securing the heap
    • G. Novark and E. D. Berger, “Dieharder: securing the heap,” in CCS, 2010.
    • (2010) CCS
    • Novark, G.1    Berger, E. D.2
  • 42
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: return-intolibc without function calls (on the x86)
    • H. Shacham, “The geometry of innocent flesh on the bone: return-intolibc without function calls (on the x86),” in CCS, 2007.
    • (2007) CCS
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.