Review of Stack-Based Binary Exploitation Techniques

[1]  A. One,et al.  Smashing The Stack For Fun And Profit , 1996 .

[2]  Niels Provos,et al.  Preventing Privilege Escalation , 2003, USENIX Security Symposium.

[3]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[4]  Ahmad-Reza Sadeghi,et al.  Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.

[5]  Vitaly Osipov,et al.  Format String Attacks , 2005 .

[6]  Marco Ramilli,et al.  Return-Oriented Programming , 2012, IEEE Security & Privacy.

[7]  Wenke Lee,et al.  ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks , 2015, CCS.

[8]  Joshua Mason,et al.  English shellcode , 2009, CCS.

[9]  Masahiro Yokoyama,et al.  A Survey of Prevention/Mitigation against Memory Corruption Attacks , 2016, 2016 19th International Conference on Network-Based Information Systems (NBiS).

[10]  Benjamin Rodes Stack layout transformation: Towards diversity for securing binary programs , 2012, 2012 34th International Conference on Software Engineering (ICSE).

[11]  Jonathan D. Pincus,et al.  Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.

[12]  Peter J. Denning,et al.  Virtual memory , 1970, CSUR.

[13]  Mathias Ekstedt,et al.  Information Management & Computer Security Estimates of success rates of remote arbitrary code execution attacks , 2017 .

[14]  Kyung-Suk Lhee,et al.  Buffer overflow and format string overflow vulnerabilities , 2003, Softw. Pract. Exp..

[15]  Hovav Shacham,et al.  Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.

[16]  Wonjun Lee,et al.  Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming , 2017, ICISS.

[17]  David A. Wagner,et al.  This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .

[18]  Liu Liang Data-Execution Prevention Technology in Windows System , 2013 .

[19]  Mel Gorman,et al.  Understanding the Linux Virtual Memory Manager , 2004 .