Practical Considerations in Control-Flow Integrity Monitoring
暂无分享,去创建一个
[1] Peyton Jones,et al. Haskell 98 language and libraries : the revised report , 2003 .
[2] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[3] Barbara G. Ryder,et al. Program decomposition for pointer aliasing: a step toward practical analyses , 1996, SIGSOFT '96.
[4] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[5] Mark Ryan,et al. Logic in Computer Science: Modelling and Reasoning about Systems , 2000 .
[6] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[7] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[8] Edward J. McCluskey,et al. Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..
[9] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[10] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Deepak Gupta,et al. TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection , 2004, USENIX Security Symposium.
[12] Barbara G. Ryder,et al. Precise Call Graphs for C Programs with Function Pointers , 2004, Automated Software Engineering.
[13] J. Aaron Pendergrass,et al. Linux kernel integrity measurement using contextual inspection , 2007, STC '07.
[14] Simon L. Peyton Jones. Haskell 98: Introduction , 2003, J. Funct. Program..
[15] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[16] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[17] Radu Grosu,et al. Aspect-Oriented Instrumentation with GCC , 2010, RV.