Using DISE to protect return addresses from attack
暂无分享,去创建一个
[1] Amir Roth,et al. DISE: a programmable macro engine for customizing applications , 2003, ISCA '03.
[2] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[3] Tilman Wolf,et al. CommBench-a telecommunications benchmark for network processors , 2000, 2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422).
[4] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[5] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[6] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[7] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[8] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[9] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[10] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[11] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[12] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[13] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[14] P. Glaskowski. Pentium 4 (partially) previewed , 2000 .
[15] Amir Roth,et al. A DISE implementation of dynamic code decompression , 2003 .