咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 25 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 76 篇 工学
    • 67 篇 计算机科学与技术...
    • 22 篇 电气工程
    • 20 篇 软件工程
    • 19 篇 信息与通信工程
    • 9 篇 网络空间安全
    • 6 篇 电子科学与技术(可...
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 80 篇 return-oriented ...
  • 7 篇 code reuse
  • 7 篇 buffer overflow
  • 6 篇 control flow int...
  • 6 篇 security
  • 5 篇 rop
  • 5 篇 shadow stack
  • 4 篇 xtensa
  • 4 篇 control-flow int...
  • 4 篇 jump-oriented pr...
  • 4 篇 code reuse attac...
  • 3 篇 code-reuse attac...
  • 3 篇 code reuse attac...
  • 3 篇 reverse engineer...
  • 3 篇 system security
  • 3 篇 software securit...
  • 3 篇 jop
  • 3 篇 arm
  • 3 篇 malware analysis
  • 3 篇 gadgets

机构

  • 4 篇 singapore manage...
  • 3 篇 univ chinese aca...
  • 3 篇 univ calif san d...
  • 2 篇 beijing nanbao t...
  • 2 篇 chinese acad sci...
  • 2 篇 南京大学
  • 2 篇 oregon state uni...
  • 2 篇 singapore manage...
  • 2 篇 beijing inst tec...
  • 2 篇 univ calif san d...
  • 2 篇 chinese acad sci...
  • 2 篇 univ n carolina ...
  • 2 篇 btu cottbus senf...
  • 2 篇 natl univ def te...
  • 1 篇 the national ins...
  • 1 篇 penn state univ ...
  • 1 篇 dept. of comput....
  • 1 篇 saarland univ sa...
  • 1 篇 nanjing univ sof...
  • 1 篇 grad univ chines...

作者

  • 6 篇 gao debin
  • 5 篇 lehniger kai
  • 5 篇 shacham hovav
  • 4 篇 langendoerfer pe...
  • 4 篇 davi lucas
  • 3 篇 sadeghi ahmad-re...
  • 3 篇 min changwoo
  • 3 篇 jia xiaoqi
  • 2 篇 xue jingfeng
  • 2 篇 tian donghai
  • 2 篇 wang yongjun
  • 2 篇 roascio gianluca
  • 2 篇 usui toshinori
  • 2 篇 zou dabi
  • 2 篇 payer mathias
  • 2 篇 buchanan erik
  • 2 篇 savage stefan
  • 2 篇 roemer ryan
  • 2 篇 weidler nathanae...
  • 2 篇 tullsen dean m.

语言

  • 74 篇 英文
  • 3 篇 其他
  • 3 篇 中文
检索条件"主题词=Return-oriented programming"
80 条 记 录,以下是1-10 订阅
排序:
return-oriented programming on a resource constrained device
收藏 引用
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS 2019年 22卷 244-256页
作者: Weidler, Nathanael R. Brown, Dane Mitchell, Samuel A. Anderson, Joel Williams, Jonathan R. Costley, Austin Kunz, Chase Wilkinson, Christopher Wehbe, Remy Gerdes, Ryan Utah State Univ Logan UT 84322 USA Virginia Tech Arlington VA 22203 USA
Microcontrollers are found in many everyday devices and will only become more prevalent as the Internet of Things (IoT) and other low power devices gain momentum. As such, it is increasingly important that they are re... 详细信息
来源: 评论
return-oriented programming: Systems, Languages, and Applications
收藏 引用
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 2012年 第1期15卷 1–34页
作者: Roemer, Ryan Buchanan, Erik Shacham, Hovav Savage, Stefan Univ Calif San Diego San Diego CA 92103 USA
We introduce return-oriented programming, a technique by which an attacker can induce arbitrary behavior in a program whose control flow he has diverted, without injecting any code. A return-oriented program chains to... 详细信息
来源: 评论
return-oriented programming Attack on the Xen Hypervisor
Return-Oriented Programming Attack on the Xen Hypervisor
收藏 引用
7th International Conference on Availability, Reliability and Security (ARES)
作者: Ding, Baozeng Wu, Yanjun He, Yeping Tian, Shuo Guan, Bei Wu, Guowei Chinese Acad Sci Inst Software Beijing 100190 Peoples R China Grad Univ Chinese Acad Sci Beijing 100049 Peoples R China Dalian Univ Technol Sch Software Dalian Peoples R China
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies the data in the hypervisor that controls whether a VM is privileged or not and thus can es... 详细信息
来源: 评论
return-oriented programming Gadget Catalog for the Xtensa Architecture
Return-Oriented Programming Gadget Catalog for the Xtensa Ar...
收藏 引用
20th IEEE International Conference on Pervasive Computing and Communications (IEEE PerCom)
作者: Amatov, Batyi Lehniger, Kai Langendoerfer, Peter Brandenburg Tech Univ Cottbus Senftenberg Cottbus Germany IHP Leibniz Inst Innovat Mikroelekt Frankfurt Germany
This paper shows that the modern high customizable Xtensa architecture for embedded devices is exploitable by return-oriented programming (ROP) attacks. We used a simple Hello-World application written with the RIOT O... 详细信息
来源: 评论
return-oriented programming protection in the IBM POWER10  22
Return-oriented programming protection in the IBM POWER10
收藏 引用
19th ACM International Conference on Computing Frontiers (CF)
作者: Moreira, Jose E. Chatterjee, Debapriya Ekanadham, K. Flores, Arnold IBM Corp Armonk NY 10504 USA
return-oriented programming (ROP) is a technique for hijacking the control-flow of a program and forcing it to perform computations that were never originally intended. ROP is achieved by modifying the values of retur... 详细信息
来源: 评论
return-oriented programming without returns  10
Return-Oriented Programming without Returns
收藏 引用
17th ACM Conference on Computer and Communications Security (CCS)
作者: Checkoway, Stephen Davi, Lucas Dmitrienko, Alexandra Sadeghi, Ahmad-Reza Shacham, Hovav Winandy, Marcel Univ Calif San Diego Dept Comp Sci & Engn La Jolla CA 92093 USA Ruhr Univ Bochum Syst Secur Lab Bochum Germany
We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of certain instruction sequences that beha... 详细信息
来源: 评论
Finding gadgets in incremental code updates for return-oriented programming attacks on resource-constrained devices
收藏 引用
ANNALS OF TELECOMMUNICATIONS 2023年 第3-4期78卷 209-220页
作者: Lehniger, Kai Saad, Abdelaziz Langendoerfer, Peter IHP Leibniz Inst Innovat Mikroelekt Wireless Syst Technol Pk 25 D-15236 Frankfurt Brandenburg Germany Brandenburg Tech Univ Cottbus Cottbus SenftenbergPl Deutsch Einheit 1 D-03046 Cottbus Brandenburg Germany
Code-reuse attacks pose a threat to embedded devices since they are able to defeat common security defences such as non-executable stacks. To succeed in his code-reuse attack, the attacker has to gain knowledge of som... 详细信息
来源: 评论
ROP-Hunt: Detecting return-oriented programming Attacks in Applications  1
收藏 引用
9th International Conference on Security, Privacy, and Anonymity in Computation, Communication and Storage (SpaCCS)
作者: Si, Lu Yu, Jie Luo, Lei Ma, Jun Wu, Qingbo Li, Shasha Natl Univ Def Technol Coll Comp Changsha 410073 Hunan Peoples R China
return-oriented programming (ROP) is a new exploitation technique that can perform arbitrary unintended operations by constructing a gadget chain reusing existing small code sequences. Although many defense mechanisms... 详细信息
来源: 评论
deRop: Removing return-oriented programming from Malware  11
deRop: Removing Return-Oriented Programming from Malware
收藏 引用
27th Annual Computer Security Applications Conference (ACSAC))
作者: Lu, Kangjie Zou, Dabi Wen, Weiping Gao, Debin Peking Univ Beijing Peoples R China Singapore Management Univ Singapore 178902 Singapore
Over the last few years, malware analysis has been one of the hottest areas in security research. Many techniques and tools have been developed to assist in automatic analysis of malware. This ranges from basic tools ... 详细信息
来源: 评论
When Good Instructions Go Bad: Generalizing return-oriented programming to RISC  08
When Good Instructions Go Bad: Generalizing Return-Oriented ...
收藏 引用
15th ACM Conference on Computer and Communications Security
作者: Buchanan, Erik Roemer, Ryan Shacham, Hovav Savage, Stefan Univ Calif San Diego Dept Comp Sci & Engn La Jolla CA 92093 USA
This paper reconsiders the threat posed by Shacham's "return-oriented programming"-a technique by which W circle plus X-style hardware protections arc evaded via carefully crafted stack frames that diver... 详细信息
来源: 评论