Baseline Is Fragile: On the Effectiveness of Stack Pivot Defense
暂无分享,去创建一个
Qian Wang | Lei Zhao | Fan Huang | Fei Yan | Huirong Peng
[1] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[2] Charlie Miller,et al. Fun and Games with Mac OS X and iPhone Payloads , 2009 .
[3] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[4] David A. Wagner,et al. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity , 2015, USENIX Security Symposium.
[5] Jared D. DeMott,et al. Bypassing EMET 4.1 , 2015, IEEE Security & Privacy.
[6] Robert H. Deng,et al. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks , 2014, NDSS.
[7] G. Carleton,et al. PROFILE-GUIDED OPTIMIZATIONS , 1998 .
[8] Thorsten Holz,et al. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding , 2016, NDSS.
[9] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[10] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[11] David A. Wagner,et al. ROP is Still Dangerous: Breaking Modern Defenses , 2014, USENIX Security Symposium.
[12] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[13] Ahmad-Reza Sadeghi,et al. Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM , 2013, ASIA CCS '13.
[14] Angelos D. Keromytis,et al. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing , 2013, USENIX Security Symposium.
[15] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[16] Heng Yin,et al. Defeating ROP Through Denial of Stack Pivot , 2015, ACSAC 2015.