Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks
暂无分享,去创建一个
[1] Jun Xu,et al. Architecture Support for Defending Against Buffer Overflow Attacks , 2002 .
[2] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[3] David Kaeli,et al. A reliable return address stack: microarchitectural features to defeat stack smashing , 2005, CARN.
[4] Andrew R. Pleszkun,et al. Implementing Precise Interrupts in Pipelined Processors , 1988, IEEE Trans. Computers.
[5] Gyungho Lee,et al. Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack , 2002, ICICS.
[6] Ruby B. Lee,et al. Enlisting Hardware Architecture to Thwart Malicious Code Injection , 2004, SPC.
[7] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[8] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[9] Gyungho Lee,et al. Repairing return address stack for buffer overflow protection , 2004, CF '04.
[10] Amir Roth,et al. Using DISE to protect return addresses from attack , 2005, CARN.
[11] Margaret Martonosi,et al. Improving prediction for procedure returns with return-address-stack repair mechanisms , 1998, Proceedings. 31st Annual ACM/IEEE International Symposium on Microarchitecture.
[12] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[13] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[14] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.