Dynamic code instrumentation to detect and recover from return address corruption
暂无分享,去创建一个
Huzur Saran | Suhas Gupta | Pranay Pratap | S. Arun-Kumar | H. Saran | S. Arun-Kumar | Pranay Pratap | Suhas Gupta
[1] Vijay Janapa Reddi,et al. PIN: a binary instrumentation tool for computer architecture research and education , 2004, WCAE '04.
[2] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[3] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[4] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[5] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[6] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[7] Jack W. Davidson,et al. Strata: A Software Dynamic Translation Infrastructure , 2001 .
[8] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .