Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
暂无分享,去创建一个
Zhenkai Liang | Tao Wei | Wei Zou | Yu Ding | Tielei Wang
[1] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[2] Gregory R. Andrews,et al. Binary Obfuscation Using Signals , 2007, USENIX Security Symposium.
[3] Wouter Joosen,et al. Code injection in C and C++: a survey of vulnerabilities and countermeasures , 2004 .
[4] Chengyu Song,et al. Studying Malicious Websites and the Underground Economy on the Chinese Web , 2008, WEIS.
[5] Moti Yung,et al. Cryptovirology: extortion-based security threats and countermeasures , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[6] Dave Aitel,et al. The Shellcoder's Handbook: Discovering and Exploiting Security Holes , 2004 .
[7] Evangelos P. Markatos,et al. Network-level polymorphic shellcode detection using emulation , 2006, Journal in Computer Virology.
[8] Wenke Lee,et al. Evading network anomaly detection systems: formal reasoning and practical techniques , 2006, CCS '06.
[9] Christopher Krügel,et al. Accurate Buffer Overflow Detection via Abstract Payload Execution , 2002, RAID.
[10] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[11] David R. Hanson. Fast allocation and deallocation of memory based on object lifetimes , 1990, Softw. Pract. Exp..
[12] Joshua Mason,et al. English shellcode , 2009, CCS.
[13] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[14] Jason Evans April. A Scalable Concurrent malloc(3) Implementation for FreeBSD , 2006 .
[15] Evangelos P. Markatos,et al. Emulation-Based Detection of Non-self-contained Polymorphic Shellcode , 2007, RAID.
[16] Salvatore J. Stolfo,et al. On the infeasibility of modeling polymorphic shellcode , 2009, Machine Learning.
[17] Christopher Krügel,et al. Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.
[18] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[19] Mark Russinovich,et al. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer) , 2004 .
[20] Clark Thomborson,et al. Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.
[21] Evangelos P. Markatos,et al. STRIDE: Polymorphic Sled Detection through Instruction Sequence Analysis , 2005, SEC.
[22] Danilo Gligoroski,et al. Bypassing Data Execution Prevention on MicrosoftWindows XP SP2 , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[23] Charlie Miller,et al. Engineering Heap Overflow Exploits with JavaScript , 2008, WOOT.
[24] David Brumley,et al. RICH: Automatically Protecting Against Integer-Based Vulnerabilities , 2007, NDSS.
[25] Ollie Whitehouse. An Analysis of Address Space Layout Randomization on Windows Vista , 2007 .
[26] user surfaces,et al. Data Execution Prevention , 2011 .
[27] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[28] Benjamin Livshits,et al. NOZZLE: A Defense Against Heap-spraying Code Injection Attacks , 2009, USENIX Security Symposium.