SoK: Eternal War in Memory
暂无分享,去创建一个
Dawn Xiaodong Song | Mathias Payer | Tao Wei | Laszlo Szekeres | D. Song | Mathias Payer | Tao Wei | László Szekeres
[1] Jack W. Davidson,et al. ILR: Where'd My Gadgets Go? , 2012, 2012 IEEE Symposium on Security and Privacy.
[2] Leyla Bilge,et al. G-Free: defeating return-oriented programming through gadget-less binaries , 2010, ACSAC '10.
[3] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[4] Thomas R. Gross,et al. Fine-grained user-space security through virtualization , 2011, VEE '11.
[5] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[6] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[7] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[8] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.
[9] Jing Luo,et al. Secure dynamic code generation against spraying , 2010, CCS '10.
[10] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[11] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[12] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[13] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[14] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[15] Vikram S. Adve,et al. Automatic pool allocation: improving performance by controlling data structure layout in the heap , 2005, PLDI '05.
[16] Bennet S. Yee,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[17] Periklis Akritidis,et al. Cling: A Memory Allocator to Mitigate Dangling Pointers , 2010, USENIX Security Symposium.
[18] Wouter Joosen,et al. PAriCheck: an efficient pointer arithmetic checker for C programs , 2010, ASIACCS '10.
[19] Frank Piessens,et al. Breaking the memory secrecy assumption , 2009, EUROSEC '09.
[20] Dawn Song,et al. Mitigating buffer overflows by operating system randomization , 2002 .
[21] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[22] Bob Martin,et al. 2010 CWE/SANS Top 25 Most Dangerous Software Errors , 2010 .
[23] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[24] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[25] Herbert Bos,et al. Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation , 2012, USENIX Annual Technical Conference.
[26] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[27] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[28] Wouter Joosen,et al. Runtime countermeasures for code injection attacks against C and C++ programs , 2012, CSUR.
[29] Angelos D. Keromytis,et al. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization , 2012, 2012 IEEE Symposium on Security and Privacy.
[30] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[31] Cloyce D. Spradling. SPEC CPU2006 benchmark tools , 2007, CARN.
[32] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[33] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[34] Derek Bruening,et al. An infrastructure for adaptive dynamic optimization , 2003, International Symposium on Code Generation and Optimization, 2003. CGO 2003..
[35] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[36] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[37] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[38] Emery D. Berger,et al. DieHarder: securing the heap , 2010, CCS '10.
[39] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[40] Zhi Wang,et al. Comprehensive and Efficient Protection of Kernel Control Data , 2011, IEEE Transactions on Information Forensics and Security.
[41] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[42] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[43] Úlfar Erlingsson,et al. Low-Level Software Security by Example , 2010, Handbook of Information and Communication Security.
[44] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[45] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[46] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[47] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[48] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[49] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[50] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[51] Mathias Payer. Too much PIE is bad for performance , 2012 .
[52] Herbert Bos,et al. Minemu: The World's Fastest Taint Tracker , 2011, RAID.
[53] Angelos D. Keromytis,et al. kGuard: Lightweight Kernel Protection against Return-to-User Attacks , 2012, USENIX Security Symposium.
[54] Dionysus Blazakis. Interpreter Exploitation , 2010, WOOT.
[55] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[56] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[57] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[58] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[59] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[60] Xuxian Jiang,et al. On the Expressiveness of Return-into-libc Attacks , 2011, RAID.