[1] |
LITCHFIELD D . Buffer Underruns,DEP,ASLR and improving the exploitation prevention mechanisms (XPMs) on the Windows platform[EB].
|
[2] |
ABADI M , BUDIU M H , ERLINGSSON ú ,et al. Control-flow integrity[C]// Proceedings of the 12th ACM conference on Computer and Communications Security CCS '05. 2005: 340-353.
|
[3] |
LIVSHITS V B , LAM M S . Finding security vulnerabilities in Java applications with static analysis[J]. 14th USENIX Security Symposium, 2005: 271-286.
|
[4] |
姚东, 张铮, 张高斐 ,等. 多变体执行安全防御技术研究综述[J]. 信息安全学报, 2020,5(5): 77-94.
|
|
YAO D , ZHANG Z , ZHANG G F ,et al. A survey on multi-variant execution security defense technology[J]. Journal of Cyber Security, 2020,5(5): 77-94.
|
[5] |
GIUFFRIDA C , KUIJSTEN A , TANENBAUM A S . Enhanced operating system security through efficient and fine-grained address space randomization[C]// Proceedings of the 21st USENIX Conference on Security symposium. 2012:40.
|
[6] |
HISER J , NGUYEN-TUONG A , CO M ,et al. ILR:where'd my gadgets go[C]// Proceedings of 2012 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2012: 571-585.
|
[7] |
刘镇武, 隋然, 张铮 ,等. 基于信息熵与软件复杂度的软件多样性评估方法[J]. 信息工程大学学报, 2020,21(2): 207-213.
|
|
LIU Z W , SUI R , ZHANG Z ,et al. Software diversity evaluation method based on information entropy and software complexity[J]. Journal of Information Engineering University, 2020,21(2): 207-213.
|
[8] |
HERNANDEZ-CASTRO J , ROSSMAN J . Measuring software diversity,with applications to security[J]. arXiv:1310.3307, 2013.
|
[9] |
SHANNON C E . A mathematical theory of communication[J]. Bell System Technical Journal, 1948,27(3): 379-423.
|
[10] |
COHEN F B . Operating system protection through program evolution[J]. Computers & Security, 1993,12(6): 565-584.
|
[11] |
COFFMAN J , KELLY D M , WELLONS C C ,et al. ROP gadget prevalence and survival under compiler-based binary diversification schemes[C]// Proceedings of the 2016 ACM Workshop on Software Protection. 2016: 15-26.
|
[12] |
COPPENS B , DE SUTTER B , MAEBE J . Feedback-driven binary code diversification[J]. ACM Transactions on Architecture and Code Optimization, 2013,9(4): 1-26.
|
[13] |
BRUMLEY D , POOSANKAM P , SONG D ,et al. Automatic patch-based exploit generation is possible:techniques and implications[C]// Proceedings of 2008 IEEE Symposium on Security and Privacy. 2008: 143-157.
|
[14] |
SEBASTIAN B , CHRISTIAN C , VIJAY G ,et al. Code obfuscation against symbolic execution attacks[C]// Proceedings of the 32nd Annual Conference on Computer Security Applications (ACSAC ’16). 2016: 189-200.
|
[15] |
SEBASTIAN B , CHRISTIAN C , AND ALEXANDER P . Predicting the resilience of obfuscated code against symbolic execution attacks via machine learning[C]// Proceedings of the 26th USENIX Security Symposium. 2017: 661-678.
|
[16] |
FABIO P , MATTEO D’A , DAVIDE B . Beyond precision and recall:understanding uses (and misuses) of similarity hashes in binary analysis[C]// Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (CODASPY ’18). 2018: 354-365.
|
[17] |
COFFMAN J , CHAKRAVARTY A , RUSSO J A ,et al. Quantifying the effectiveness of software diversity using near-duplicate detection algorithms[C]// Proceedings of the 5th ACM Workshop on Moving Target Defense. 2018: 1-10.
|
[18] |
HOMESCU A , NEISIUS S , LARSEN P ,et al. Profile-guided automated software diversity[C]// Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO). Piscataway:IEEE Press, 2013: 1-11.
|
[19] |
ROEMER R , BUCHANAN E , SHACHAM H ,et al. Return-oriented programming[J]. ACM Transactions on Information and System Security, 2012,15(1): 1-34.
|
[20] |
BLETSCH T , JIANG X X , FREEH V W ,et al. Jump-oriented programming:a new class of code-reuse attack[C]// Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security - ASIACCS '11. 2011: 30-40.
|
[21] |
COHEN F B . Operating system protection through program evolution[J]. Computers & Security, 1993,12(6): 565-584.
|
[22] |
CRANE S , LIEBCHEN C , HOMESCU A ,et al. Readactor:practical code randomization resilient to memory disclosure[C]// Proceedings of 2015 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2015: 763-780.
|
[23] |
JUNOD P , RINALDINI J , WEHRLI J ,et al. Obfuscator-LLVM:software protection for the masses[C]// Proceedings of 2015 IEEE/ACM 1st International Workshop on Software Protection. 2015: 3-9.
|
[24] |
LáSZLó T , KISS á . Obfuscating C++ programs via control flow flattening[C]// Processing of Annales Universitatis Scientarum 25 Budapestinensis de Rolando E¨otv¨os Nominatae,Sectio. 2009.
|
[25] |
COLLBERG C , THOMBORSON C , LOW D . Manufacturing cheap,resilient,and stealthy opaque constructs[C]// Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - POPL '98. 1998: 184-196.
|
[26] |
AHMED S , XIAO Y , SNOW K Z ,et al. Methodologies for quantifying (re-) randomization security and timing under JIT-ROP[C]// Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 2020: 1803-1820.
|