Computer Science ›› 2022, Vol. 49 ›› Issue (12): 118-124.doi: 10.11896/jsjkx.211200029
• Computer Software • Previous Articles Next Articles
CHI Yu-ning, GUO Yun-fei, WANG Ya-wen, HU Hong-chao
CLC Number:
[1]LITCHFIELD D.Buffer Underruns,DEP,ASLR and improving the Exploitation Prevention Mechanisms(XPMs) on the Windows platform[J].Next Generation Security Software,2005.https://www.nccgroup.com/globalassets/our-research/uk/whit-epapers/xpms.pdf. [2]LIVSHITS V B,LAM M S.Finding Security Vulnerabilities in Java Applications with Static Analysis[C]//USENIX Security Symposium.2005,14:18-18. [3]YAO D,ZHANG Z,ZHANG G F,et al.A Survey on Multi-Variant Execution Security Defense Technology[J].Journal of Information Security,2020,5(5):77-94. [4]DULLIEN T,ROLLES R.Graph-based comparison of executable objects(english version)[J].SSTIC,2005,5(1):3. [5]CRISTIANO G,ANTON K,ANDREW S T.Enhanced opera-ting system security through efficient and fine-grained address space randomization[C]//Proceedings of the 21st USENIX Security Symposium.2012:475-490. [6]HERNANDEZ-CASTRO J,ROSSMAN J.Measuring soft- ware diversity,with applications to security[EB/OL].[2020-04-13].https://arxiv.org/abs/1310.3307vl. [7]SHANNON C E.A mathematical theory of communication[J].Bell System Technical Journal,1948,27(3):379-423. [8]COHEN F B.Operating system protection through programevolution[J].Computers & Security,1993,12(6):565-584. [9]SEBASTIAN B,CHRISTIAN C,VIJAY G,et al.Code Obfuscation Against Symbolic Execution Attacks[C]//Proceedings of the 32nd Annual Conference on Computer Security Applications(ACSAC ’16).2016:189-200. [10]SEBASTIAN B,CHRISTIAN C,ALEXANDER P.Predictingthe resilience of obfuscated code against symbolic execution attacks via machine learning[C]//Proceedings of the 26th USENIX Security Symposium.2017:661-678 [11]COFFMAN J,CHAKRAVARTY A,RUSSO J A,et al.Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection Algorithms[C]//Proceedings of the 5th ACM Workshop on Moving Target Defense.2018:1-10 [12]LIU Z W,SUI R,ZHANG Z,et al.Software Diversity Evaluation Based on Information Entropy and Software Complexity [J].Journal of Information Engineering University,2020,21(2):207-213. [13]GEARHART A S,HAMILTON P A,COFFMAN J.An Analysis of Automated Software Diversity Using Unstructured Text Analytics[C]//2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops(DSN-W).IEEE,2018. [14]DULLIEN T,ROLLES R.Graph-based comparison of executable objects(english version)[J/OL].SSTIC,2005.https://www.docin.com/p-1472608287.html. [15]DONG Q H,WANG Y G.Partition-based binary file similarity comparison method[J].Journal of Computer Applications,2015,35(10):2896-2900. [16]HOMESCU A,NEISIUS S,LARSEN P,et al.Profile-guidedautomated software diversity[C]//Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization(CGO).IEEE,2013:1-11. [17]JUNO D P,RINALDINI J,WEHRLI J,et al.Obfuscator-LLVM-Software Protection for the Masses[C]//2015 IEEE/ACM 1st International Workshop on Software Protection(SPRO).ACM,2015:3-9. [18]LARSEN P,HOMESCU A,BRUNTHALER S,et al.SoK:Automated Software Diversity[C]//2014 IEEE Symposium on Security and Privacy.2014:276-291. [19]LÁSZLÓ T,KISS Á.Obfuscating C++ programs via control flow flattening[J].Annales Universitatis Scientarum Budapestinensis de Rolando Eötvös Nominatae,Sectio Computatorica,2009,30(1):3-19. [20]COLLBERG C,THOMBORSON C,LOW D.ManufacturingCheap,Resilient,and Stealthy Opaque Constructs[C]//Procee-dings of the 25th ACM SIGPLAN-SIGACT Symposium on Prin-ciples of Programming Languages.1998:184-196. |
[1] | ZHANG Yuan, KANG Le, GONG Zhao-hui, ZHANG Zhi-hong. Related Transaction Behavior Detection in Futures Market Based on Bi-LSTM [J]. Computer Science, 2022, 49(7): 31-39. |
[2] | WANG Dong, ZHOU Da-ke, HUANG You-da , YANG Xin. Multi-scale Multi-granularity Feature for Pedestrian Re-identification [J]. Computer Science, 2021, 48(7): 238-244. |
[3] | ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing. Mimic Security Defence Strategy Based on Software Diversity [J]. Computer Science, 2018, 45(2): 215-221. |
[4] | WANG Bing and QUAN Ji-chuan. Evaluation Indexes of Information Service Quality in C2 System [J]. Computer Science, 2016, 43(Z11): 581-584. |
[5] | HAO Xue-liang, ZHU Xiao-dong and LIU Li. Software Maintainability Evaluation Based on Fractal Theory [J]. Computer Science, 2015, 42(Z11): 497-499. |
[6] | XIE Xin, LIU Fen-lin, LU Bin and GONG Dao-fu. Quantitative Evaluation for Effectiveness of Code Obfuscation Based on Multi-level Weighted Attributes [J]. Computer Science, 2015, 42(3): 167-173. |
[7] | ZHANG Wei-xiang,LIU Wen-hong and WU Xin. Quantitative Evaluation Across Software Development Life Cycle Based on Data Fusion [J]. Computer Science, 2013, 40(Z11): 192-195. |
|