暂无分享,去创建一个
Dan Meng | Kai Chen | Jinfeng Li | Gang Shi | Liwei Chen | Qizhen Xu | Linan Tian
[1] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[2] Guido Bertoni,et al. Keccak sponge function family main document , 2009 .
[3] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[4] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[5] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[6] Ismael Ripoll,et al. Exploiting Linux and PaX ASLR’s weaknesses on 32-bit and 64-bit systems , 2016 .
[7] Jun Zhang,et al. RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity , 2017, Conf. Computing Frontiers.
[8] David A. Wagner,et al. The Performance Cost of Shadow Stacks and Stack Canaries , 2015, AsiaCCS.
[9] Mathias Payer,et al. Control-Flow Integrity , 2017, ACM Comput. Surv..
[10] Reinhold Weicker,et al. Dhrystone: a synthetic systems programming benchmark , 1984, CACM.
[11] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[12] John L. Henning. SPEC CPU2006 benchmark descriptions , 2006, CARN.
[13] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[14] John L. Henning. SPEC CPU2000: Measuring CPU Performance in the New Millennium , 2000, Computer.
[15] Dan Boneh,et al. Cryptographically Enforced Control Flow Integrity , 2014, ArXiv.
[16] Dan Boneh,et al. Hacking Blind , 2014, 2014 IEEE Symposium on Security and Privacy.
[17] Xi Chen,et al. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[18] R. Sekar,et al. Eternal War in Memory , 2014, IEEE Security & Privacy.
[19] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[20] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[21] Per Larsen,et al. Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks , 2015, CCS.
[22] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[23] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[24] Carla E. Brodley,et al. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address , 2006, IEEE Transactions on Computers.
[25] Frank Piessens,et al. Breaking the memory secrecy assumption , 2009, EUROSEC '09.
[26] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[27] Dan Boneh,et al. CCFI: Cryptographically Enforced Control Flow Integrity , 2015, CCS.
[28] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[29] Jeff Seibert,et al. Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code , 2014, CCS.
[30] Ruby B. Lee,et al. A processor architecture defense against buffer overflow attacks , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[31] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[32] Crispin Cowan,et al. StackGuard: Simple Stack Smash Protection for GCC , 2004 .
[33] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[34] P. Petrov,et al. Enhancing the RISC-V Instruction Set Architecture , 2019 .
[35] Xuxian Jiang,et al. Mitigating code-reuse attacks with control-flow locking , 2011, ACSAC '11.
[36] Calton Pu,et al. Protecting Systems from Stack Smashing Attacks with StackGuard , 1999 .
[37] Gyungho Lee,et al. Repairing return address stack for buffer overflow protection , 2004, CF '04.
[38] J. Koenderink. Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.
[39] George Candea,et al. Code-pointer integrity , 2014, OSDI.
[40] W. Wong,et al. Transparent Runtime Shadow Stack : Protection against malicious return address modifications , 2006 .
[41] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[42] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[43] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.