[1] |
邵思豪, 高庆, 马森 ,等. 缓冲区溢出漏洞分析技术研究进展[J]. 软件学报, 2018,29(5): 1179-1198.
|
|
SHAO S H , GAO Q , MA S ,et al. Progress in research on buffer overflow vulnerability analysis technologies[J]. Journal of Software, 2018,29(5): 1179-1198
|
[2] |
张超 . 针对控制流劫持攻击的软件安全防护技术研究[D]. 北京:北京大学, 2013.
|
|
ZHANG C . Research on software security defense against control-flow hijacking attacks[D]. Beijing:Beijing University, 2013.
|
[3] |
ROEMER R , BUCHANAN E , SHACHAM H ,et al. Return-oriented programming:systems,languages,and applications[J]. ACM Transactions on Information & System Security, 2012,15(1): 1-34.
|
[4] |
乔向东, 郭戎潇, 赵勇 . 代码复用对抗技术研究进展[J]. 网络与信息安全学报, 2018,4(3): 1-12.
|
|
QIAO X D , GUO R X , ZHAO Y . Research progress in code reuse attacking and defending[J]. Chinese Journal of Network and Information Security, 2018,4(3): 1-12.
|
[5] |
DAVI L , SADEGHI A R , WINANDY M . ROPdefender:a detection tool to defend against return-oriented programming attacks[C]// The 6th ACM Symposium on Information,Computer and Communications Security. 2011: 40-51.
|
[6] |
BLETSCH T , JIANG X , FREEH V W ,et al. Jump-oriented programming:a new class of code-reuse attack[C]// The 6th ACM Symposium on Information,Computer and Communications Security. 2011: 30-40.
|
[7] |
CHECKOWAY S , DAVI L , DMITRIENKO A ,et al. Return-oriented programming without returns[C]// ACM Conference on Computer & Communications Security. 2010: 559-572.
|
[8] |
钱逸 . 基于 ARM 架构的 ROP 攻击与防御技术研究[D]. 上海:上海交通大学, 2012.
|
|
QIAN Y . ROP attack and defense technology based on ARM[D]. Shanghai:Shanghai Jiaotong University, 2012.
|
[9] |
BUCHANAN E , ROEMER R , SHACHAM H ,et al. When good instructions go bad:Generalizing return-oriented programming to RISC[C]// The 15th ACM Conference on Computer and Communications Security. 2008: 27-38.
|
[10] |
DAVI L , DMITRIENKO A , SADEGHI A ,et al. Return-oriented programming without returns on ARM[R]. Ruhr-University Bochum, 2010.
|
[11] |
KORNAU T . Return oriented programming for the ARM architecture[D]. Ruhr:Ruhr-Universit?t Bochum, 2010.
|
[12] |
DULLIEN T , PORST S . REIL:a platform-independent intermediate representation of disassembled code for static code analysis[J]. Cansecwest, 2009.
|
[13] |
DULLIEN T , KORNAU T , WEINMANN R . A framework for automated architecture independent gadget search[C]// Usenix Conference on Offensive Technologies. 2010:1.
|
[14] |
PaX team:PaX address space layout randomization (ASLR)[EB].
|
[15] |
SNOW K Z , MONROSE F , DAVI L ,et al. Just-in-time code reuse:on the effectiveness of fine-grained address space layout randomization[C]// 2013 IEEE Symposium on Security and Privacy. 2013: 574-588.
|
[16] |
BITTAU A , BELAY A , MASHTIZADEH A ,et al. Hacking blind[C]// 2014 IEEE Symposium on Security and Privacy. 2014: 227-242.
|
[17] |
COWAN C , PU C , MAIER D ,et al. StackGuard:automatic adaptive detection and prevention of buffer-overflow attacks[C]// USENIX Security Symposium. 1998:98 63-78.
|
[18] |
TSAI T , SINGH N . Libsafe:transparent system-wide protection against buffer overflow attacks[C]// International Conference on Dependable Systems and Networks. IEEE, 2002:541.
|
[19] |
COWAN C , BARRINGER M , BEATTIE S ,et al. FormatGuard:automatic protection from printf format string vulnerabilities[C]// USENIX Security Symposium. 2001,91.
|
[20] |
MARTíN A , BUDIU M , ERLINGSSON , úLFAR . Control-flow integrity[C]// ACM Conference on Computer & Communications Security. 2005:340.
|
[21] |
武成岗, 李建军 . 控制流完整性的发展历程[J]. 中国教育网络, 2016(4): 52-55.
|
|
WU C G , LI J J . The evolution of control flow integrity[J]. China Education Network, 2016(4): 52-55.
|
[22] |
MASHTIZADEH A J , BITTAU A , MAZIERES D ,et al. Cryptographically enforced control flow integrity[J]. arXiv preprint arXiv:1408.1451, 2014.
|
[23] |
CRISWELL J , DAUTENHAHN N , ADVE V . KCoFI:complete control-flow integrity for commodity operating system kernels[C]// 2014 IEEE Symposium on Security and Privacy. 2014: 292-307.
|
[24] |
ZHANG C , WEI T , CHEN Z ,et al. Practical control flow integrity and randomization for binary executables[J]. IEEE Symposium on Security & Privacy, 2013: 559-573.
|
[25] |
ZHANG M , SEKAR R . Control Flow Integrity for {COTS} Binaries[C]// Presented as part of the 22nd Security Symposium. 2013: 337-352.
|
[26] |
G?KTAS E , ATHANASOPOULOS E , BOS H ,et al. Out of control:overcoming control-flow integrity[J]. Security & Privacy, 2014: 575-589.
|
[27] |
CONTI M , CRANE S , DAVI L ,et al. Losing control:on the effectiveness of control-flow integrity under stack attacks[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 952-963.
|
[28] |
CARLINI N , BARRESI N , MATHIAS P ,et al. Control-flow bending:on the effectiveness of control-flow integrity[C]// Usenix Conference on Security Symposium. 2015: 161-176.
|
[29] |
OTGONBAATAR U . Evaluating modern defenses against control flow hijacking[D]. Massachusetts:Massachusetts Institute of Technology, 2015.
|
[30] |
PAPPAS V , POLYCHRONAKIS M , KEROMYTIS A D . Transparent {ROP} exploit mitigation using indirect branch tracing[C]// Presented as Part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13). 2013: 447-462.
|
[31] |
QIU P , LYU Y , ZHANG J ,et al. Control flow integrity based on lightweight encryption architecture[J]. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2018,37(7): 1358-1369.
|
[32] |
ZHANG J , QI B , QIN Z ,et al. HCIC:Hardware-assisted control-flow integrity checking[J]. IEEE Internet of Things Journal, 2018,6(1): 458-471.
|
[33] |
蔡桂林, 王宝生, 王天佐 ,等. 移动目标防御技术研究进展[J]. 计算机研究与发展, 2016,53(5): 968-987.
|
|
CAI G L , WANG B S , WANG T Z ,et al. Research and development of moving target defense technology[J]. Journal of Computer Research and Development, 2016,53(5): 968-987.
|
[34] |
FORREST S , SOMAYAJI A , ACKLEY D H . Building diverse computer systems[C]// The Sixth Workshop on Hot Topics in Operating Systems (Cat.No.97TB100133). 1997: 67-72.
|
[35] |
SHACHAM H , PAGE M , PFAFF B ,et al. On the effectiveness of address-space randomization[C]// The 11th ACM Conference on Computer and Communications Security. 2004: 298-307.
|
[36] |
KIL C , JUN J , BOOKHOLT C ,et al. Address space layout permutation (ASLP):towards fine-grained randomization of commodity software[C]// 2006 22nd Annual Computer Security Applications Conference (ACSAC'06). 2006: 339-348.
|
[37] |
HISER J , NGUYEN-TUONG A ,et al. ILR:Where'd my gadgets go[C]// 2012 IEEE Symposium on Security and Privacy. 2012: 571-585.
|
[38] |
IYER V , KANITKAR A , DASGUPTA P ,et al. Preventing overflow attacks by memory randomization[C]// 2010 IEEE 21st International Symposium on Software Reliability Engineering. 2010: 339-347.
|
[39] |
BHATKAR S , DUVARNEY D C , SEKAR R . Address obfuscation:an efficient approach to combat a broad range of memory error exploits[C]// USENIX Security Symposium. 200312(2): 291-301.
|
[40] |
BHATKAR S , DUVARNEY D C , SEKAR R . efficient techniques for comprehensive protection from memory error exploits[C]// USENIX Security Symposium. 2005:17.
|
[41] |
BACKES M AND , NURNBERGER S , . Oxymoron:making fine-grained memory randomization practical by allowing code sharing[C]// Usenix Conference on Security Symposium. 2014: 433-447.
|
[42] |
GIUFFRIDA C , KUIJSTEN A , TANENBAUM A S . Enhanced operating system security through efficient and fine-grained address space randomization[C]// Presented as Part of the 21st {USENIX}Security Symposium ({USENIX} Security 12). 2012: 475-490.
|
[43] |
CHEN X , XUE R , Wu C . Timely address space rerandomization for resisting code reuse attacks[J]. Concurrency and Computation:Practice and Experience, 2017,29(16):e3965.
|
[44] |
侯宇 . 基于动态随机化和只可执行内存的JIT-ROP防御研究[D]. 南京:南京大学, 2016.
|
|
HOU Y . Defence against JIT-ROP based on dynamic randomization and executable only memory[D]. Nanjing:Nanjing University, 2016
|
[45] |
CHEN Y , WANG Z , WHALLEY D ,et al. Remix:on-demand live randomization[C]// The sixth ACM Conference on Data and Application Security and Privacy. 2016: 50-61.
|
[46] |
HAWKINS W , NGUYEN-TUONG A , HISER J D ,et al. Mixr:flexible runtime rerandomization for binaries[C]// The 2017 Workshop on Moving Target Defense. 2017: 27-37.
|
[47] |
BIGELOW D , HOBSON T , RUDD R ,et al. Timely rerandomization for mitigating memory disclosures[C]// ACM Sigsac Conference on Computer & Communications Security, 2015: 268-279.
|
[48] |
雷啸 . 内存信息泄露的运行中随机化防御方法的研究与改进[D]. 南京:南京大学, 2017.
|
|
LEI X . Research and improvement of runtime randomization defense method against memory information leakage[D]. Nanjing:Nanjing University, 2017.
|
[49] |
MORTON M , KOO H , LI F ,et al. Defeating zombie gadgets by re-randomizing code upon disclosure[C]// International Symposium on Engineering Secure Software and Systems. 2017: 143-160.
|
[50] |
LU K , NURNBERGER S , BACKES M ,et al. How to make ASLR win the clone wars:runtime re-randomization[C]// Network & Distributed System Security Symposium. 2016.
|
[51] |
DAVI L , LIEBCHEN C , SADEGHI A R ,et al. Isomeron:code randomization resilient to (just-in-time) return-oriented programming[C]// Network & Distributed System Security Symposium. 2015.
|
[52] |
WILLIAMS-KING D , GOBIESKI G , WILLIAMS-KING K . Shuffler:fast and deployable continuous code re-randomization[C]// 12th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 16). 2016: 367-382.
|