Study of How to Obtain Control Flow Invariant
暂无分享,去创建一个
[1] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[2] Xuxian Jiang,et al. Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring , 2009, 2009 International Conference on Availability, Reliability and Security.
[3] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[4] Xuxian Jiang,et al. Mitigating code-reuse attacks with control-flow locking , 2011, ACSAC '11.
[5] Jinhui Yuan,et al. BeCFI: detecting hidden control flow with performance monitoring counters , 2016, Int. J. High Perform. Comput. Netw..
[6] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[7] Xin Wu,et al. HDROP: Detecting ROP Attacks Using Performance Monitoring Counters , 2014, ISPEC.