[1] |
NIST. USA national vulnerability database[EB/OL]. .
|
[2] |
CHEN P , WANG J , PAN L , et al. Research and implementation of SQL injection prevention method based on ISR[C]// IEEE Interna-tional Conference on Computer and Communications. 2017: 1153-1156.
|
[3] |
BARUA A , ZULKERNINE M , WELDEMARIAM K . Protecting Web browser extensions from JavaScript injection attacks[C]// The International Conference on Engineering of Complex Computer Systems. 2013: 188-197.
|
[4] |
汤战勇, 李光辉, 房鼎益 , 等. 一种具有指令集随机化的代码虚拟化保护系统[J]. 华中科技大学学报(自然科学版), 2016,44(3): 28-33.
|
|
TANG Z Y , LI G H , FANG D Y , et al. Code virtualized protection system with instruction set randomization[J]. Journal of Huazhong University of Science and Technology(Natural Science Edition), 2016,44(3): 28-33.
|
[5] |
DANGER J L , GUILLEY S , PRADEN F . Hardware-enforced protection against Software reverse-engineering based on an in-struction set encoding[C]// ACM Sigplan on Program Protection and Reverse Engineering Workshop. 2014: 5.
|
[6] |
LIU B , WANG B . reconfigurable logic for ASIC design obfuscation against supply chain attacks[C]// Design,Automation and Test in Europe Conference and Exhibition. 2014: 1-6.
|
[7] |
KC G S , KEROMYTIS A D , PREVELAKIS V . Countering code-injection attacks with instruction-set randomization[C]// ACM Conference on Computer and Communications Security. 2003: 272-280.
|
[8] |
PORTOKALIDIS G , KEROMYTIS A D . Fast and practical instruc-tion-set randomization for commodity systems[C]// Computer Secu-rity Applications Conference. 2010: 41-48.
|
[9] |
PORTOKALIDIS G , KEROMYTIS A D . Global ISR:toward a comprehensive defense against unauthorized code execution[M]. Moving Target Defense. New York: Springer. 2011:49-76.
|
[10] |
王奕森, 舒辉, 谢耀滨 , 等. 基于指令集随机化的代码注入型攻击防御技术[J]. 计算机应用与软件, 2016,33(5): 312-316.
|
|
WANG Y S , SHU H , XIE Y B , et al. Defense technology against code-injection attacks based on instruction set randomization[J]. Computer Applications and Software, 2016,33(5): 312-316.
|
[11] |
SOVAREL A N , EVANS D , PAUL N . Where's the FEEB? the effectiveness of instruction set randomization[C]// USENIX Security Symposium. 2005: 10.
|
[12] |
PAPADOGIANNAKIS A , LOUTSIS L , PAPAEFSTATHIOU V , et al. ASIST:architectural support for instruction set randomiza-tion[C]// ACM Sigsac Conference on Computer & Communications Security. 2013:981-992.
|
[13] |
SINHA K , KEMERLIS V P , SETHUMADHAVAN S . Reviving instruction set randomization[C]// IEEE International Symposium on Hardware Oriented Security and Trust. 2017.
|
[14] |
欧海文, 赵静, 于慧红 , 等. 基于振荡器的真随机数发生器的研究[J]. 通信技术, 2011,44(12): 153-155.
|
|
OU H W , ZHAO J , YU H H , et al. Study on oscillator-based truly random number generator[J]. Communications Technology. 2011,44(12): 153-155.
|
[15] |
郭弘, 刘钰, 党安红 , 等. 物理真随机数发生器[J]. 科学通报, 2009(23): 3651-3657.
|
|
GUO H , LIU Y , DANG A H , et al. Physical true random number generator[J]. Chinese Science Bulletin. 2009(23): 3651-3657.
|
[16] |
HENNING J L . SPEC CPU2006 benchmark descriptions[J]. ACM Sigarch Computer Architecture News, 2006,34(4): 1-17.
|