Computer Science ›› 2018, Vol. 45 ›› Issue (1): 240-244.doi: 10.11896/j.issn.1002-137X.2018.01.042
Previous Articles Next Articles
PENG Jian-shan, ZHOU Chuan-tao, WANG Qing-xian and DING Da-zhao
[1] SHACMAM H.The geometry of innocent flesh on the bone:return-into-libc without function calls (on the x86) [C]∥ACM Conference on Computer and Communications Security(CCS).New York,USA,2007:552-561. [2] ABADI M,BUDIU M,ERLINGSSON U,et al.Control-flow integrity[C]∥ACM Conference on Computer and Communications Security(CCS).2005:340-353. [3] CHEN P,XIAO H,SHEN X,et al.DROP:Detecting Return-Oriented Programming Malicious Code[C]∥Information Systems Security,International Conference(ICISS 2009).Kolkata,India,2009:163-177. [4] DAVI L,SADEGHI A R,WINANDY M.ROPdefender:a detection tool to defend against return-oriented programming attacks[C]∥ACM Symposium on Information Computer & Communication Security Cited on.2011:40-51. [5] ONARLIOGLU K,BILGE L,LANZI A,et al.G-Free:defeating return-oriented programming through gadget-less binaries[C]∥Twenty-Sixth Computer Security Applications Conference(ACSAC 2010).Austin,Texas,USA,2010:49-58. [6] PAPPAS V,POLYCHRONAKIS M,KEROMYTIS A D.Trans-parent ROP exploit mitigation using indirect branch tracing[C]∥Usenix Conference on Security.2013:447-462. [7] CHENG Y,ZHOU Z,YU M,et al.ROPecker:A Generic andPractical Approach For Defending Against ROP Attacks[C]∥Network and Distributed System Security Symposium(NDSS14).2014. [8] CHECKOWAY S,DAVI L,DMITRIENKO A,et al.Return-oriented programming without returns[C]∥ACM Conference on Computer and Communications Security(CCS 2010).Chicago,Illinois,USA,2010:559-572. [9] BLETSCH T,JIANG X,FREEH V W,et al.Jump-orientedprogramming:a new class of code-reuse attack[C]∥ACM Symposium on Information,Computer and Communications Security(ASIACCS 2011).Hong Kong,China,2011:303-307. [10] CARLINI N,WAGNER D.ROP is still dangerous:breakingmodern defenses[C]∥USENIX Conference on Security Symposium.USENIX Association,2014:385-399. [11] Windows ISV Software Security Defenses[EB/OL].(2010-12-01) [2015-01-30].https://msdn.microsoft.com/en-us/library/bb430720.aspx. [12] SCHWARTZ E J,AVGERINOS T,BRUMLEY D.Q:exploit hardening made easy[C]∥Usenix Conference on Security.USENIX Association,2011:25-25. |
No related articles found! |
|