HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities
暂无分享,去创建一个
Peng Ning | William Enck | Jason Gionta | P. Ning | W. Enck | Jason Gionta
[1] Yang Tang,et al. CleanOS: Limiting Mobile Data Exposure with Idle Eviction , 2012, OSDI.
[2] E AndersonThomas,et al. Efficient software-based fault isolation , 1993 .
[3] Jacob Torrey. MoRE: measurement of running executables , 2014, CISR '14.
[4] Vikram S. Adve,et al. Virtual ghost: protecting applications from hostile operating systems , 2014, ASPLOS.
[5] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[6] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[7] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[8] Xuxian Jiang,et al. An Architectural Approach to Preventing Code Injection Attacks , 2010, IEEE Transactions on Dependable and Secure Computing.
[9] G. Edward Suh,et al. Efficient Memory Integrity Verification and Encryption for Secure Processors , 2003, MICRO.
[10] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[11] T. Anderson,et al. Eecient Software-based Fault Isolation , 1993 .
[12] A. Oettinger,et al. Proposed automatic calculating machine , 1964, IEEE Spectrum.
[13] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.
[14] R. Sekar,et al. Efficient fine-grained binary instrumentationwith applications to taint-tracking , 2008, CGO '08.
[15] David Seal,et al. ARM Architecture Reference Manual , 2001 .
[16] Jonathon T. Giffin,et al. Strengthening software self-checksumming via self-modifying code , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[17] Bhavani M. Thuraisingham,et al. Differentiating Code from Data in x86 Binaries , 2011, ECML/PKDD.
[18] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[19] Per Larsen,et al. Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming , 2012, WOOT.
[20] Per Larsen,et al. Profile-guided automated software diversity , 2013, Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
[21] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[22] Paul C. van Oorschot,et al. Hardware-assisted circumvention of self-hashing software tamper resistance , 2005, IEEE Transactions on Dependable and Secure Computing.
[23] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[24] F. J. Corbat. INTRODUCTION AND OVERVIEW OF THE MULTICS SYSTEM , 2010 .
[25] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[26] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[27] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[28] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[29] Michael Backes,et al. You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code , 2014, CCS.
[30] 隆司 益田. 20世紀の名著名論:F. J. Corbato and V. A. Vyssotsky : Introduction and Overview of the Multics System , 2004 .
[31] John von Neumann,et al. First draft of a report on the EDVAC , 1993, IEEE Annals of the History of Computing.