Reuse-Oriented Camouflaging Attack : Vulnerability Detection and Attack Construction
暂无分享,去创建一个
[1] Janusz W. Laski,et al. Dynamic Program Slicing , 1988, Inf. Process. Lett..
[2] Hans-Juergen Boehm. Space efficient conservative garbage collection , 2004, SIGP.
[3] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[4] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[5] David Detlefs,et al. Garbage collection and local variable type-precision and liveness in Java virtual machines , 1998, PLDI.
[6] Swapna S. Gokhale,et al. Quantifying the closeness between program components and features , 2000, J. Syst. Softw..
[7] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[8] Stephan Diehl,et al. Revised Lectures on Software Visualization, International Seminar , 2001 .
[9] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[11] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[12] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[13] Stéphane Ducasse,et al. Correlating features and code using a compact two-sided trace analysis approach , 2005, Ninth European Conference on Software Maintenance and Reengineering.
[14] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[15] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[16] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[17] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[18] Frederic T. Chong,et al. Minos: Architectural support for protecting control data , 2006, TACO.
[19] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[20] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[21] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[22] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[23] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[24] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.