A Memory Access Validation Scheme against Payload Injection Attacks
暂无分享,去创建一个
[1] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[2] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[3] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[4] Zhao Zhang,et al. Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks , 2006, IEEE Micro.
[5] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[6] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[7] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[8] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[9] Gyungho Lee,et al. Encoded Program Counter: Self-Protection from Buffer Overflow Attacks , 2000, International Conference on Internet Computing.
[10] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[11] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[12] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[13] Christoforos E. Kozyrakis,et al. Raksha: a flexible information flow architecture for software security , 2007, ISCA '07.
[14] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[15] Christoforos E. Kozyrakis,et al. Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.