The Page-Fault Weird Machine: Lessons in Instruction-less Computation
暂无分享,去创建一个
[1] Len Sassaman,et al. Towards a Theory of Computer Insecurity: a Formal Language-Theoretic Approach , 2011 .
[2] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.
[3] Jörg Schwenk,et al. Scriptless attacks: stealing the pie without touching the sill , 2012, CCS.
[4] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[5] Locreate: An Anagram for Relocate , 2007 .
[6] Ralf-Philipp Weinmann,et al. A Framework for Automated Architecture-Independent Gadget Search , 2010, WOOT.
[7] Joseph Tassarotti,et al. RockSalt: better, faster, stronger SFI for the x86 , 2012, PLDI.
[8] Sergey Bratus,et al. Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation , 2011, login Usenix Mag..
[9] Sergey Bratus,et al. "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata , 2013, WOOT.
[10] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[11] Sergey Bratus,et al. Dartmouth Computer Science Technical Report TR2011-680 (Draft version) Exploiting the Hard-Working DWARF: Trojans with no Native Executable Code , 2011 .
[12] Yan Wang,et al. A Library for Processing Ad hoc Data in Haskell - Embedding a Data Description Language , 2008, IFL.
[13] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[14] Andreas Bogk,et al. A domain-specific language for manipulation of binary data in Dylan , 2007, ILC.