deRop: removing return-oriented programming from malware
暂无分享,去创建一个
[1] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[2] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[3] Zhi Wang,et al. Defeating return-oriented rootkits with "Return-Less" kernels , 2010, EuroSys '10.
[4] Claude Castelluccia,et al. Defending embedded systems against control flow attacks , 2009, SecuCode '09.
[5] Wenke Lee,et al. Ether: malware analysis via hardware virtualization extensions , 2008, CCS.
[6] Somesh Jha,et al. Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[7] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[8] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[9] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[10] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[11] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..
[12] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.
[13] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[14] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[15] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[16] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[17] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[18] Piotr Bania. Security Mitigations for Return-Oriented Programming Attacks , 2010, ArXiv.
[19] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[20] Cristina Cifuentes,et al. Decompilation of binary programs , 1995, Softw. Pract. Exp..
[21] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[22] Leyla Bilge,et al. G-Free: defeating return-oriented programming through gadget-less binaries , 2010, ACSAC '10.
[23] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.
[24] Hovav Shacham,et al. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage , 2009, EVT/WOTE.
[25] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[26] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[27] Bing Mao,et al. DROP: Detecting Return-Oriented Programming Malicious Code , 2009, ICISS.
[28] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[29] Bezawada Bruhadeshwar,et al. Signature Generation and Detection of Malware Families , 2008, ACISP.
[30] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.