Review of Stack-Based Binary Exploitation Techniques
暂无分享,去创建一个
[1] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[2] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[3] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[4] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[5] Vitaly Osipov,et al. Format String Attacks , 2005 .
[6] Marco Ramilli,et al. Return-Oriented Programming , 2012, IEEE Security & Privacy.
[7] Wenke Lee,et al. ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks , 2015, CCS.
[8] Joshua Mason,et al. English shellcode , 2009, CCS.
[9] Masahiro Yokoyama,et al. A Survey of Prevention/Mitigation against Memory Corruption Attacks , 2016, 2016 19th International Conference on Network-Based Information Systems (NBiS).
[10] Benjamin Rodes. Stack layout transformation: Towards diversity for securing binary programs , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[11] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[12] Peter J. Denning,et al. Virtual memory , 1970, CSUR.
[13] Mathias Ekstedt,et al. Information Management & Computer Security Estimates of success rates of remote arbitrary code execution attacks , 2017 .
[14] Kyung-Suk Lhee,et al. Buffer overflow and format string overflow vulnerabilities , 2003, Softw. Pract. Exp..
[15] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[16] Wonjun Lee,et al. Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming , 2017, ICISS.
[17] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[18] Liu Liang. Data-Execution Prevention Technology in Windows System , 2013 .
[19] Mel Gorman,et al. Understanding the Linux Virtual Memory Manager , 2004 .