Block Oriented Programming: Automating Data-Only Attacks
暂无分享,去创建一个
Trent Jaeger | Mathias Payer | Kyriakos K. Ispoglou | Bader AlBassam | Mathias Payer | T. Jaeger | Bader Albassam
[1] Barton P. Miller,et al. Detecting Code Reuse Attacks with a Model of Conformant Program Execution , 2014, ESSoS.
[2] David A. Wagner,et al. The Performance Cost of Shadow Stacks and Stack Canaries , 2015, AsiaCCS.
[3] Takeaki Uno,et al. Algorithms for Enumerating All Perfect, Maximum and Maximal Matchings in Bipartite Graphs , 1997, ISAAC.
[4] Eric Bodden,et al. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution , 2016, STM.
[5] David Brumley,et al. Automatic exploit generation , 2014, CACM.
[6] Ben Niu,et al. Modular control-flow integrity , 2014, PLDI.
[7] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[8] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[9] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[10] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[11] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[12] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[13] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[14] Ahmad-Reza Sadeghi,et al. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection , 2014, USENIX Security Symposium.
[15] David A. Wagner,et al. ROP is Still Dangerous: Breaking Modern Defenses , 2014, USENIX Security Symposium.
[16] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[17] Gerardo Richarte. Four dierent tricks to bypass StackShield and StackGuard protection , 2002, WWW 2002.
[18] A. B. Kahn,et al. Topological sorting of large networks , 1962, CACM.
[19] Xi Chen,et al. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later , 2017, CCS.
[20] Zhenkai Liang,et al. Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[21] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[22] Thomas R. Gross,et al. Fine-Grained Control-Flow Integrity Through Binary Hardening , 2015, DIMVA.
[23] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[24] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[25] Ben Niu,et al. Per-Input Control-Flow Integrity , 2015, CCS.
[26] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[27] Angelos D. Keromytis,et al. ROP payload detection using speculative code execution , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[28] David A. Wagner,et al. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity , 2015, USENIX Security Symposium.
[29] Herbert Bos,et al. Practical Context-Sensitive CFI , 2015, CCS.
[30] William R. Harris,et al. Efficient Protection of Path-Sensitive Control Security , 2017, USENIX Security Symposium.
[31] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[32] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[33] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[34] Vasilis Pappas,et al. kBouncer : Efficient and Transparent ROP Mitigation , 2012 .
[35] J. Y. Yen,et al. Finding the K Shortest Loopless Paths in a Network , 2007 .
[36] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[37] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[38] George Candea,et al. Code-pointer integrity , 2014, OSDI.
[39] Zhenkai Liang,et al. Automatic Generation of Data-Oriented Exploits , 2015, USENIX Security Symposium.
[40] Robert H. Deng,et al. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks , 2014, NDSS.
[41] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[42] Per Larsen,et al. Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming , 2012, WOOT.
[43] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[44] Ronald L. Rivest,et al. Introduction to Algorithms, third edition , 2009 .
[45] Ahmad-Reza Sadeghi,et al. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications , 2015, 2015 IEEE Symposium on Security and Privacy.