From Zygote to Morula: Fortifying Weakened ASLR on Android
暂无分享,去创建一个
Wenke Lee | Long Lu | Taesoo Kim | Byoungyoung Lee | Tielei Wang | Taesoo Kim | Wenke Lee | Long Lu | Tielei Wang | Byoungyoung Lee
[1] Cody Cutler,et al. Security bugs in embedded interpreters , 2013, APSys.
[2] Vitaly Shmatikov,et al. Memento: Learning Secrets from Process Footprints , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Yi Fang,et al. JITDefender: A Defense against JIT Spraying Attacks , 2011, SEC.
[4] Lorenzo Martignoni,et al. Surgically Returning to Randomized lib(c) , 2009, 2009 Annual Computer Security Applications Conference.
[5] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[6] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[7] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[8] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[9] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.
[10] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[11] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.
[12] Cristiano Giuffrida,et al. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization , 2012, USENIX Security Symposium.
[13] Dong Hoon Lee,et al. Predictability of Android OpenSSL's pseudo random number generator , 2013, CCS.
[14] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[15] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[16] Yajin Zhou,et al. The impact of vendor customizations on android security , 2013, CCS.
[17] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[18] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[19] Klara Nahrstedt,et al. Identity, location, disease and more: inferring your secrets from android public resources , 2013, CCS.
[20] Dionysus Blazakis. Interpreter Exploitation , 2010, WOOT.
[21] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[22] Dan Boneh,et al. Address space randomization for mobile devices , 2011, WiSec '11.
[23] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.