[1] |
方滨兴 . 定义网络空间安全[J]. 网络与信息安全学报, 2018,4(1): 1-5.
|
|
FANG B X . Define cyberspace security[J]. Chinese Journal of Network and Information Security, 2018,4(1): 1-5.
|
[2] |
邵思豪, 高庆, 马森 ,等. 缓冲区溢出漏洞分析技术研究进展[J]. 软件学报, 2018,29(5): 1179-1198.
|
|
SHAO S H , GAO Q , MA S ,et al. Progress in research on buffer overflow vulnerability analysis technologies[J]. Journal of Software, 2018,29(5): 1179-1198.
|
[3] |
BLETSCH T , JIANG X X , FREEH V W ,et al. Jump-oriented programming:a new class of code-reuse attack[C]// Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security - ASIACCS '11. 2011: 30-40.
|
[4] |
LEVY E . Smashing the stack for fun and profit[J]. Phrack Maga-zine, 1996,8(49): 1-25.
|
[5] |
SHACHAM H , . The geometry of innocent flesh on the bone:return-into-libc without function calls (on the x86)[C]// Proceedings of the 14th ACM conference on Computer and communications security. 2007: 552-561.
|
[6] |
王丰峰, 张涛, 徐伟光 ,等. 进程控制流劫持攻击与防御技术综述[J]. 网络与信息安全学报, 2019,5(6): 10-20.
|
|
WANG F F , ZHANG T , XU W G ,et al. Overview of control-flow hijacking attack and defense techniques for process[J]. Chinese Journal of Network and Information Security, 2019,5(6): 10-20.
|
[7] |
COWAN C , PU C , MAIER D ,et al. StackGuard:automatic adaptive detection and prevention of buffer-overflow attacks[C]// Proceedings of 7th USENIX Security Conference. 1998: 63-78.
|
[8] |
COWAN C , BARRINGER M , BEATTIE S ,et al. FormatGuard:automatic protection from printf format string vulnerabilities[C]// Proceedings of 10th USENIX Security Symposium. 2001: 13-17.
|
[9] |
BITTAU A , BELAY A , MASHTIZADEH A ,et al. Hacking blind[C]// Proceedings of 2014 IEEE Symposium on Security and Privacy. 2014: 227-242.
|
[10] |
WANG Z , JIANG X X . HyperSafe:a lightweight approach to provide lifetime hypervisor control-flow integrity[C]// Proceedings of 2010 IEEE Symposium on Security and Privacy. 2010: 380-395.
|
[11] |
马博林, 张铮, 陈源 ,等. 基于指令集随机化的抗代码注入攻击方法[J]. 信息安全学报, 2020,5(4): 30-43.
|
|
MA B L , ZHANG Z , CHEN Y ,et al. The defense method for code-injection attacks based on instruction set randomization[J]. Journal of Cyber Security, 2020,5(4): 30-43.
|
[12] |
COX B , EVANS D , FILIPI A ,et al. N-variant systems a secretless framework for security through diversity[J]. 15th USENIX Security Symposium, 2006: 105-120.
|
[13] |
SALAMAT B , JACKSON T , GAL A ,et al. Orchestra:intrusion detection using parallel execution and monitoring of program variants in user-space[C]// Proceedings of the 4th ACM European conference on Computer systems. 2009: 33-46.
|
[14] |
KONING K , BOS H , GIUFFRIDA C . Secure and efficient multi-variant execution using hardware-assisted process virtualization[C]// Proceedings of 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 2016: 431-442.
|
[15] |
张铮, 王立群, 李卫超 . 面向非相似余度信息系统的攻击面模型[J]. 通信学报, 2018,39(S2): 223-230.
|
|
ZHANG Z , WANG L Q , LI W C . Research on formal model for an information system's attack surface with dissimilar redundant ar-chitecture[J]. Journal on Communications, 2018,39(S2): 223-230.
|
[16] |
潘传幸, 张铮, 马博林 ,等. 面向进程控制流劫持攻击的拟态防御方法[J]. 通信学报, 2021,42(1): 37-47.
|
|
PAN C X , ZHANG Z , MA B L ,et al. Method against process con-trol-flow hijacking based on mimic defense[J]. Journal on Commu-nications, 2021,42(1): 37-47.
|
[17] |
马博林, 张铮, 刘浩 ,等. SQLMVED:基于多变体执行的 SQL注入运行时防御系统[J]. 通信学报, 2021,42(4): 127-138.
|
|
MA B L , ZHANG Z , LIU H ,et al. SQLMVED:SQL injection runtime prevention system based on multi-variant execution[J]. Journal on Communications, 2021,42(4): 127-138.
|
[18] |
MANADHATA P K , WING J M . A formal model for a system's attack surface[M]// Advances in Information Security. New York,NY: Springer New York, 2011: 1-28.
|
[19] |
MANADHATA P K . Game theoretic approaches to attack surface shifting[M]// Moving Target Defense II. New York,NY: Springer New York, 2012: 1-13.
|