Persistent Data-only Malware: Function Hooks without Code
暂无分享,去创建一个
[1] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[2] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[3] Hovav Shacham,et al. Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage , 2009, EVT/WOTE.
[4] Felix C. Freiling,et al. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms , 2009, USENIX Security Symposium.
[5] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[6] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[7] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[8] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[9] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[10] Zhi Wang,et al. Countering Persistent Kernel Rootkits through Systematic Hook Discovery , 2008, RAID.
[11] Bing Mao,et al. Return-Oriented Rootkit without Returns (on the x86) , 2010, ICICS.
[12] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[13] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[14] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[15] Leyla Bilge,et al. G-Free: defeating return-oriented programming through gadget-less binaries , 2010, ACSAC '10.
[16] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[17] Ahmad-Reza Sadeghi,et al. Return-Oriented Programming without Returns on ARM , 2010 .
[18] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[19] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[20] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[21] Cristiano Giuffrida,et al. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization , 2012, USENIX Security Symposium.
[22] Zhi Wang,et al. Defeating return-oriented rootkits with "Return-Less" kernels , 2010, EuroSys '10.
[23] Angelos D. Keromytis,et al. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization , 2012, 2012 IEEE Symposium on Security and Privacy.
[24] Xuxian Jiang,et al. Countering kernel rootkits with lightweight hook protection , 2009, CCS.
[25] Claude Castelluccia,et al. Defending embedded systems against control flow attacks , 2009, SecuCode '09.
[26] Claudia Eckert,et al. Using Hardware Performance Events for Instruction-Level Monitoring on the x86 Architecture , 2012 .
[27] C. Eckert,et al. Bridging the Semantic Gap Through Static Code Analysis , 2012 .