BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks
暂无分享,去创建一个
[1] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[2] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[3] Wouter Joosen,et al. Extended Protection against Stack Smashing Attacks without Performance Loss , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[4] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[5] Wouter Joosen,et al. Code injection in C and C++: a survey of vulnerabilities and countermeasures , 2004 .
[6] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[7] Crispin Cowan,et al. StackGuard: Simple Stack Smash Protection for GCC , 2004 .
[8] Andreas Krennmair. ContraPolice: a libc Extension for Protecting Applications from Heap-Smashing Attacks , 2003 .
[9] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[10] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[11] Charlie Miller,et al. Engineering Heap Overflow Exploits with JavaScript , 2008, WOOT.
[12] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[13] Úlfar Erlingsson,et al. Low-Level Software Security: Attacks and Defenses , 2007, FOSAD.
[14] Wouter Joosen,et al. Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic , 2006, ICICS.
[15] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[16] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[17] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[18] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.
[19] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[20] user surfaces,et al. Data Execution Prevention , 2011 .