Transforming malicious code to ROP gadgets for antivirus evasion
暂无分享,去创建一个
[1] Manos Antonakakis,et al. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[2] Xukai Zou,et al. Survey of return-oriented programming defense mechanisms , 2016, Secur. Commun. Networks.
[3] Herbert Bos,et al. Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[4] Ratan K. Guha,et al. Detecting Obfuscated Viruses Using Cosine Similarity Analysis , 2007, First Asia International Conference on Modelling & Simulation (AMS'07).
[5] Xueyang Wang,et al. SIGDROP: Signature-based ROP Detection using Hardware Performance Counters , 2016, ArXiv.
[6] Mathias Payer,et al. malWASH: Washing Malware to Evade Dynamic Analysis , 2016, WOOT.
[7] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[8] Salvatore J. Stolfo,et al. Unsupervised Anomaly-Based Malware Detection Using Hardware Features , 2014, RAID.
[9] Wei Zhang,et al. ROPSentry: Runtime defense against ROP attacks using hardware performance counters , 2018, Comput. Secur..
[10] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[11] Lei Shi,et al. ROPOB: Obfuscating Binary Code via Return Oriented Programming , 2017, SecureComm.
[12] Kevin W. Hamlen,et al. Frankenstein: Stitching Malware from Benign Binaries , 2012, WOOT.
[13] C. Xenakis,et al. ROPInjector : Using Return Oriented Programming for Polymorphism and Antivirus Evasion , 2015 .
[14] Debin Gao,et al. Software Watermarking using Return-Oriented Programming , 2015, AsiaCCS.
[15] Jiang Ming,et al. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking , 2017, USENIX Security Symposium.
[16] Debin Gao,et al. RopSteg: program steganography with return oriented programming , 2014, CODASPY '14.
[17] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[18] Camil Demetrescu,et al. The ROP needle: hiding trigger-based injection vectors via code reuse , 2019, SAC.
[19] Jared D. DeMott,et al. Bypassing EMET 4.1 , 2015, IEEE Security & Privacy.
[20] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[21] Claudia Eckert,et al. Persistent Data-only Malware: Function Hooks without Code , 2014, NDSS.
[22] Moritz Contag,et al. Syntia: Synthesizing the Semantics of Obfuscated Code , 2017, USENIX Security Symposium.