$\Delta$ΔBreakpad: Diversified Binary Crash Reporting
暂无分享,去创建一个
[1] Matthias Hauswirth,et al. Producing wrong data without doing anything obviously wrong! , 2009, ASPLOS.
[2] Bart Coppens,et al. Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution , 2016, IEEE Transactions on Dependable and Secure Computing.
[3] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[4] Christian S. Collberg,et al. Dynamic graph-based software fingerprinting , 2007, TOPL.
[5] K. De Bosschere,et al. DIABLO: a reliable, retargetable and extensible link-time rewriting framework , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[6] Per Larsen,et al. Librando: transparent code randomization for just-in-time compilers , 2013, CCS.
[7] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[8] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[9] Koen De Bosschere,et al. Protecting Your Software Updates , 2013, IEEE Security & Privacy.
[10] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Cristiano Giuffrida,et al. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization , 2012, USENIX Security Symposium.
[12] Jack W. Davidson,et al. Security through Diversity: Leveraging Virtual Machine Technology , 2009, IEEE Security & Privacy.
[13] Per Larsen,et al. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity , 2015, NDSS.
[14] Benoit Baudry,et al. The Multiple Facets of Software Diversity , 2014, ACM Comput. Surv..
[15] Per Larsen,et al. Automated Software Diversity , 2015, Automated Software Diversity.
[16] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[17] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[18] Per Larsen,et al. Profile-guided automated software diversity , 2013, Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO).