Analyzing control flow integrity with LLVM-CFI
暂无分享,去创建一个
[1] Claudia Eckert,et al. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM , 2018, ESORICS.
[2] Trent Jaeger,et al. Fine-Grained Control-Flow Integrity for Kernel Software , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[3] Claudia Eckert,et al. τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries , 2018, RAID.
[4] Ben Niu,et al. Modular control-flow integrity , 2014, PLDI.
[5] Angelos Stavrou,et al. Strict Virtual Call Integrity Checking for C++ Binaries , 2017, AsiaCCS.
[6] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[7] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[8] Herbert Bos,et al. MARX: Uncovering Class Hierarchies in C++ Programs , 2017, NDSS.
[9] Xi Chen,et al. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[10] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[11] Moritz Contag,et al. Evaluating the Effectiveness of Current Anti-ROP Defenses , 2014, RAID.
[12] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[13] Per Larsen,et al. Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks , 2015, CCS.
[14] George Candea,et al. Code-pointer integrity , 2014, OSDI.
[15] G. Ramalingam,et al. The undecidability of aliasing , 1994, TOPL.
[16] Heng Yin,et al. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries , 2015, NDSS.
[17] Jonathan G. Rossie,et al. An algebraic semantics of subobjects , 1995, OOPSLA.
[18] Chao Zhang,et al. VTrust: Regaining Trust on Virtual Calls , 2016, NDSS.
[19] Chao Zhang,et al. VTint: Protecting Virtual Function Tables' Integrity , 2015, NDSS.
[20] Thorsten Holz,et al. Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets , 2016, ESORICS.
[21] Jong-Deok Choi,et al. Slicing class hierarchies in C++ , 1996, OOPSLA '96.
[22] Kevin W. Hamlen,et al. CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software , 2019, USENIX Security Symposium.
[23] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[24] Ahmad-Reza Sadeghi,et al. Subversive-C: Abusing and Protecting Dynamic Message Dispatch , 2016, USENIX Annual Technical Conference.
[25] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[26] Robert H. Deng,et al. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks , 2014, NDSS.
[27] Chao Zhang,et al. Revery: From Proof-of-Concept to Exploitable , 2018, CCS.
[28] Zhiqiang Lin,et al. PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace , 2017, CODASPY.
[29] Xi Chen,et al. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later , 2017, CCS.
[30] Herbert Bos,et al. ShrinkWrap: VTable Protection without Loose Ends , 2015, ACSAC 2015.
[31] David A. Wagner,et al. ROP is Still Dangerous: Breaking Modern Defenses , 2014, USENIX Security Symposium.
[32] David A. Wagner,et al. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity , 2015, USENIX Security Symposium.
[33] Yan Li,et al. Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[34] Michael Backes,et al. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing , 2014, USENIX Security Symposium.
[35] Trent Jaeger,et al. Block Oriented Programming: Automating Data-Only Attacks , 2018, CCS.
[36] Sorin Lerner,et al. Protecting C++ Dynamic Dispatch Through VTable Interleaving , 2016, NDSS.
[37] Per Larsen,et al. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks , 2015, CCS.
[38] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[39] Ahmad-Reza Sadeghi,et al. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications , 2015, 2015 IEEE Symposium on Security and Privacy.
[40] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[41] Junfeng Yang,et al. Shuffler: Fast and Deployable Continuous Code Re-Randomization , 2016, OSDI.
[42] Ben Niu,et al. Per-Input Control-Flow Integrity , 2015, CCS.
[43] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.