CFIXX: Object Type Integrity for C++
暂无分享,去创建一个
[1] Chao Zhang,et al. VTrust: Regaining Trust on Virtual Calls , 2016, NDSS.
[2] Xiangke Liao,et al. Boosting the precision of virtual call integrity protection with partial pointer analysis for C++ , 2017, ISSTA.
[3] Sorin Lerner,et al. Protecting C++ Dynamic Dispatch Through VTable Interleaving , 2016, NDSS.
[4] Herbert Bos,et al. ASLR on the Line: Practical Cache Attacks on the MMU , 2017, NDSS.
[5] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[6] Sorin Lerner,et al. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks , 2014, NDSS.
[7] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[8] Ben Niu,et al. Modular control-flow integrity , 2014, PLDI.
[9] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[10] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[11] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[12] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[13] Stelios Sidiroglou,et al. Missing the Point(er): On the Effectiveness of Code Pointer Integrity , 2015, 2015 IEEE Symposium on Security and Privacy.
[14] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[15] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[16] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[17] Erik van der Kouwe,et al. TypeSan: Practical Type Confusion Detection , 2016, CCS.
[18] George Candea,et al. Code-pointer integrity , 2014, OSDI.
[19] Thorsten Holz,et al. Towards automated integrity protection of C++ virtual function tables in binary programs , 2014, ACSAC.
[20] Heng Yin,et al. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries , 2015, NDSS.
[21] David A. Wagner,et al. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity , 2015, USENIX Security Symposium.
[22] William R. Harris,et al. Efficient Protection of Path-Sensitive Control Security , 2017, USENIX Security Symposium.
[23] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[24] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[25] Roland H. C. Yap,et al. Stack Bounds Protection with Low Fat Pointers , 2017, NDSS.
[26] Wenke Lee,et al. Type Casting Verification: Stopping an Emerging Attack Vector , 2015, USENIX Security Symposium.
[27] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[28] Ahmad-Reza Sadeghi,et al. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications , 2015, 2015 IEEE Symposium on Security and Privacy.
[29] Ben Niu,et al. Per-Input Control-Flow Integrity , 2015, CCS.