[1] |
Secunia[EB/OL]. . 2014.
|
[2] |
ABADI M , MIHAIBUDIU , ERLINGSSON U . Control-flow integ-rity[A]. Proceedings of the 12th ACM conference on Computer and Communications Security[C]. Raleigh,NC,USA, 2005.340-353.
|
[3] |
BOSMAN E , SLOWINSKA A , BOS H . Minemu: the world's fastest taint tracker[J]. Recent Advances in Intrusion Detection, 2011,6961:1-20.
|
[4] |
NEWSOME J , SONG D . Dynamic taint analysis for automatic detec-tion,analysis,and signature generation of exploits on commodity software[A]. Network and Distributed System Security Symposium[C]. San Diego,California,USA: Internet Society, 2005.
|
[5] |
SCHWARTZ E L , AVGERINOS T , BRUMLEY D . All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)[A]. IEEE Symposium on Security and Privacy[C]. Oakland,CA,USA, 2010.317-331.
|
[6] |
FireEye[EB/OL]. . 2014.
|
[7] |
Argos[EB/OL]. . 2014.
|
[8] |
PORTOKALIDIS G , SLOWINSKA A , BOS H . Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with auto-matic signature generation[J]. Proceedings of the 1st ACM SI-GOPS/EuroSys European Conference on Computer Systems 2006[C]. New York,NY,USA: ACM, 2006.15-27.
|
[9] |
YIN H , SONG D , EGELE M . Capturing system-wide information flow for malware detection and analysis[A]. Proceeding of the 14th ACM Conference of Computer and Communication Security[C]. Alexandria,VA,USA, 2007.116-127.
|
[10] |
ZHANG M W , SEKAR R . Control flow integrity for COTS bina-ries[A]. Proceedings of the 22nd USENIX Conference on Security 2013[C]. Berkeley,CA,USA, 2013.
|
[11] |
PRAKASH A , YIN H , LIANG Z K . Enforcing system-wide control flow integrity for exploit detection and diagnosis[A]. 8th ACM Sym-posium on Information,Computer and Communications Security[C]. Hangzhou,China, 2013.311-322.
|
[12] |
ZHANG C , WEI T , CHEN Z F . Practical control flow integrity &randomization for binary executables[A]. The 34th IEEE Symposium on Security & Privacy[C]. San Francisco,CA,USA, 2013.559-573.
|
[13] |
ZHANG C , WEI T , CHEN Z F . FPGate: The Last Building Block For A Practical CFI Solution[R]. Technical Report For Microsoft BlueHat Prize Contest, 2012.
|
[14] |
ROEMER R , BUCHANAN E , SHACHAM H . Return-oriented pro-gramming: systems,languages,and applications[J]. ACM Transactions on Information and System Security, 2012,15(1).
|
[15] |
DING Y , WEI T , WANG TL . Heap Taichi: exploiting memory alloca-tion granularity in heap-spraying attacks[A]. Proceedings of the 26th Annual Computer Security Applications Conference[C]. New York,NY,USA: ACM, 2010.327-336.
|
[16] |
Heap FengShui[EB/OL]. . 2014.
|
[17] |
BELLARD F . Qemu,a fast and portable dynamic translator[A]. Pro-ceedings of the 14th USENIX conference on Security[C]. Baltimore,MD,USA, 2005.
|
[18] |
WANG MH , SU PR , LI Q . Automatic polymorphic exploit generation for software vulnerabilities[A]. 9th International Conference on Secu-rity and Privacy in Communication Networks[C]. Sydney,Australia. 2013.216-233.
|
[19] |
IDA Pro[EB/OL]. , 2014.
|
[20] |
Metasploit[EB/OL]. , 2014.
|