Parallax: Implicit Code Integrity Verification Using Return-Oriented Programming
暂无分享,去创建一个
[1] Ludovic Mé,et al. Code obfuscation techniques for metamorphic viruses , 2008, Journal in Computer Virology.
[2] Vinod Yegneswaran,et al. Experiences in Malware Binary Deobfuscation , 2010 .
[3] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[4] Xiangyu Zhang,et al. Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[5] Angelos D. Keromytis,et al. ROP payload detection using speculative code execution , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[6] Michael Laurenzano,et al. PEBIL: Efficient static binary instrumentation for Linux , 2010, 2010 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS).
[7] Ramarathnam Venkatesan,et al. Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings , 2007, MM&Sec.
[8] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[9] Christian S. Collberg,et al. Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.
[10] Derek Bruening,et al. An infrastructure for adaptive dynamic optimization , 2003, International Symposium on Code Generation and Optimization, 2003. CGO 2003..
[11] Paul C. van Oorschot,et al. A generic attack on checksumming-based software tamper resistance , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[12] Jonathon T. Giffin,et al. Strengthening software self-checksumming via self-modifying code , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[13] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[14] Barton P. Miller,et al. Binary-code obfuscations in prevalent packer tools , 2013, CSUR.
[15] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[16] David Brumley,et al. BAP: A Binary Analysis Platform , 2011, CAV.
[17] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[18] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[19] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[20] Angelos D. Keromytis,et al. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing , 2013, USENIX Security Symposium.
[21] Abhinav Srivastava,et al. Automatic Discovery of Parasitic Malware , 2010, RAID.
[22] Debin Gao,et al. RopSteg: program steganography with return oriented programming , 2014, CODASPY '14.
[23] Moritz Contag,et al. Evaluating the Effectiveness of Current Anti-ROP Defenses , 2014, RAID.
[24] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[25] Ramarathnam Venkatesan,et al. Oblivious Hashing: A Stealthy Software Integrity Verification Primitive , 2002, Information Hiding.
[26] P. Biondi,et al. Silver Needle in the Skype , 2006 .
[27] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[28] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[29] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[30] Debin Gao,et al. deRop: removing return-oriented programming from malware , 2011, ACSAC '11.
[31] Ahmad-Reza Sadeghi,et al. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection , 2014, USENIX Security Symposium.
[32] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[33] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.