메뉴 건너뛰기




Volumn , Issue , 2012, Pages

MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones

Author keywords

[No Author keywords available]

Indexed keywords

ARM PROCESSORS;

EID: 85180792449     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (116)

References (48)
  • 4
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the Stack for Fun and Profit
    • Aleph One. Smashing the Stack for Fun and Profit. Phrack Magazine, 49(14), 1996.
    • (1996) Phrack Magazine , vol.49 , Issue.14
    • One, Aleph1
  • 5
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free
    • Anonymous
    • Anonymous. Once upon a free. Phrack Magazine, 57(9), 2001.
    • (2001) Phrack Magazine , vol.57 , Issue.9
  • 6
  • 9
    • 26844531642 scopus 로고    scopus 로고
    • Basic Integer Overflows
    • blexim
    • blexim. Basic Integer Overflows. Phrack Magazine, 60(10), 2002.
    • (2002) Phrack Magazine , vol.60 , Issue.10
  • 13
    • 85180751613 scopus 로고    scopus 로고
    • comex
    • comex. http://www.jailbreakme.com//#.
  • 23
    • 34748842480 scopus 로고    scopus 로고
    • Advances in Format String Exploitation
    • gera
    • gera. Advances in Format String Exploitation. Phrack Magazine, 59(12), 2002.
    • (2002) Phrack Magazine , vol.59 , Issue.12
  • 24
    • 85029681162 scopus 로고    scopus 로고
    • Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
    • R. Hund, T. Holz, and F. C. Freiling. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security Symposium, 2009.
    • (2009) USENIX Security Symposium
    • Hund, R.1    Holz, T.2    Freiling, F. C.3
  • 25
    • 78650002359 scopus 로고    scopus 로고
    • Fun and Games with Mac OS X and iPhone Payloads
    • V. Iozzo and C. Miller. Fun and Games with Mac OS X and iPhone Payloads. In Black Hat Europe, 2009.
    • (2009) Black Hat Europe
    • Iozzo, V.1    Miller, C.2
  • 26
    • 84877972820 scopus 로고    scopus 로고
    • V. Iozzo and R.-P. Weinmann. PWN2OWN contest. http://blog.zynamics.com/2010/03/24/ralf-philipp-weinmann-vincenzo-iozzo-own-the-iphone-at-pwn2own/, 2010.
    • (2010) PWN2OWN contest
    • Iozzo, V.1    Weinmann, R.-P.2
  • 31
    • 85180774515 scopus 로고    scopus 로고
    • Microsoft. The/SAFESEH compiler flag. http://msdn.microsoft.com/en-us/library/9a89h429%28v=vs.80%29.aspx, 2011.
    • (2011) The/SAFESEH compiler flag
  • 34
    • 3042642332 scopus 로고    scopus 로고
    • The Advanced return-into-lib(c) Exploits: PaX Case Study
    • Nergal. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 58(4), 2001.
    • (2001) Phrack Magazine , vol.58 , Issue.4
    • Nergal1
  • 37
    • 77952351839 scopus 로고    scopus 로고
    • The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)
    • H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In ACM Conference on Computer and Communications Security (CCS), 2007.
    • (2007) ACM Conference on Computer and Communications Security (CCS)
    • Shacham, H.1
  • 39
    • 85180810478 scopus 로고    scopus 로고
    • return-to-libc" attack
    • Solar Designer. Bugtraq
    • Solar Designer. "return-to-libc" attack. Bugtraq, 1997.
    • (1997)
  • 42
    • 77955212682 scopus 로고    scopus 로고
    • HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
    • Z. Wang and X. Jiang. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In IEEE Symposium on Security and Privacy, 2010.
    • (2010) IEEE Symposium on Security and Privacy
    • Wang, Z.1    Jiang, X.2
  • 48
    • 85180816114 scopus 로고    scopus 로고
    • Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption
    • D. D. Zovi. Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption. In Black Hat USA, 2011.
    • (2011) Black Hat USA
    • Zovi, D. D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.