Dynamic Reconstruction of Relocation Information for Stripped Binaries
暂无分享,去创建一个
[1] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[2] Jack W. Davidson,et al. ILR: Where'd My Gadgets Go? , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Lorenzo Martignoni,et al. Surgically Returning to Randomized lib(c) , 2009, 2009 Annual Computer Security Applications Conference.
[4] Locreate: An Anagram for Relocate , 2007 .
[5] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[6] Herbert Bos,et al. DDE: dynamic data structure excavation , 2010, APSys '10.
[7] Eric Rescorla. Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.
[8] Robert A. Heinlein. The Number of the Beast , 1980 .
[9] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[10] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[11] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[12] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[13] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[14] Stephen McCamant,et al. Dynamic inference of abstract types , 2006, ISSTA '06.
[15] Angelos D. Keromytis,et al. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization , 2012, 2012 IEEE Symposium on Security and Privacy.
[16] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[17] Frank Tip,et al. Aggregate structure identification and its application to program analysis , 1999, POPL '99.
[18] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[19] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[20] R. Barua,et al. Binary Rewriting without Relocation Information , 2010 .
[21] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[22] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[23] Rajeev Barua,et al. Static binary rewriting without supplemental information: Overcoming the tradeoff between coverage and correctness , 2013, 2013 20th Working Conference on Reverse Engineering (WCRE).
[24] H. Summerton. Who cares? , 2000, Nursing times.
[25] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[26] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[27] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[28] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.