Breaking the memory secrecy assumption
暂无分享,去创建一个
Frank Piessens | Sven Lachmund | Pieter Philippaerts | Thomas Walter | Raoul Strackx | Yves Younan | F. Piessens | Raoul Strackx | Yves Younan | Pieter Philippaerts | T. Walter | Sven Lachmund | Frank Piessens
[1] Glen McCluskey. Working with C# Serialization , 2005, login Usenix Mag..
[2] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[3] Wouter Joosen,et al. Security of memory allocators for C and C , 2005 .
[4] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[5] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[6] Steven Alexander,et al. Defeating Compiler-level Buffer Overflow Protection , 2005, Login: The Usenix Magazine.
[7] Ollie Whitehouse. An Analysis of Address Space Layout Randomization on Windows Vista , 2007 .
[8] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.
[9] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[10] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[11] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[12] Gerardo Richarte. Four dierent tricks to bypass StackShield and StackGuard protection , 2002, WWW 2002.
[13] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[14] David Litchfield. Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server , 2003 .
[15] Elena Gabriela Barrantes,et al. Known/Chosen Key Attacks against Software Instruction Set Randomization , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[16] Andreas Krennmair. ContraPolice: a libc Extension for Protecting Applications from Heap-Smashing Attacks , 2003 .
[17] Wouter Joosen,et al. Code injection in C and C++: a survey of vulnerabilities and countermeasures , 2004 .
[18] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[19] Yves Younan,et al. Efficient Countermeasures for Software Vulnerabilities due to Memory Management Errors (Efficiënte tegenmaatregelen voor softwarekwetsbaarheden veroorzaakt door geheugenbeheerfouten) , 2008 .
[20] Calton Pu,et al. Protecting Systems from Stack Smashing Attacks with StackGuard , 1999 .
[21] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[22] Crispin Cowan,et al. StackGuard: Simple Stack Smash Protection for GCC , 2004 .
[23] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .