咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 11 篇 期刊文献

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 21 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 7 篇 信息与通信工程
    • 5 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
  • 1 篇 法学
    • 1 篇 政治学

主题

  • 25 篇 code reuse attac...
  • 3 篇 access control
  • 3 篇 information leak...
  • 3 篇 aslr
  • 3 篇 control flow int...
  • 3 篇 return-oriented ...
  • 2 篇 component
  • 2 篇 jump oriented pr...
  • 2 篇 software and sys...
  • 2 篇 cfi
  • 2 篇 memory disclosur...
  • 2 篇 code probes
  • 1 篇 object oriented ...
  • 1 篇 rop
  • 1 篇 information hidi...
  • 1 篇 turing
  • 1 篇 runtime
  • 1 篇 compilers
  • 1 篇 tinyjop
  • 1 篇 microarchitectur...

机构

  • 2 篇 amirkabir univ t...
  • 2 篇 suny binghamton ...
  • 1 篇 saarland univ sa...
  • 1 篇 iit delhi sch in...
  • 1 篇 mpi sws saarbruc...
  • 1 篇 chinese acad sci...
  • 1 篇 china univ min &...
  • 1 篇 cumt sch comp sc...
  • 1 篇 univ chinese aca...
  • 1 篇 univ chinese aca...
  • 1 篇 fraunhofer aisec...
  • 1 篇 georgia inst tec...
  • 1 篇 technol china un...
  • 1 篇 google mountain ...
  • 1 篇 dartmouth coll h...
  • 1 篇 chinese univ hon...
  • 1 篇 vietnam natl uni...
  • 1 篇 univ calif irvin...
  • 1 篇 mine digitizat e...
  • 1 篇 iit delhi comp s...

作者

  • 4 篇 li yonggang
  • 4 篇 chung yeh-ching
  • 4 篇 bao yu
  • 3 篇 holz thorsten
  • 2 篇 abu ghazaleh nae...
  • 2 篇 kayaalp mehmet
  • 2 篇 ponomarev dmitry
  • 1 篇 li wenxin
  • 1 篇 brown michael d.
  • 1 篇 cai jiazhen
  • 1 篇 osterloh martin
  • 1 篇 chen pengpeng
  • 1 篇 cohen cory f.
  • 1 篇 krein nikolai
  • 1 篇 wang weike
  • 1 篇 wellons christop...
  • 1 篇 tuong phi lau
  • 1 篇 guo shanqing
  • 1 篇 shahriari hamid-...
  • 1 篇 spang christoph

语言

  • 25 篇 英文
检索条件"主题词=code reuse attacks"
25 条 记 录,以下是1-10 订阅
排序:
code reuse attacks in PHP: Automated POP Chain Generation  14
Code Reuse Attacks in PHP: Automated POP Chain Generation
收藏 引用
21st ACM Conference on Computer and Communications Security (CCS)
作者: Dahse, Johannes Krein, Nikolai Holz, Thorsten Ruhr Univ Bochum Horst Gortz Inst It Secur HGI Bochum Germany
Memory corruption vulnerabilities that lead to control-flow hijacking attacks are a common problem for binary executables and such attacks are known for more than two decades. Over the last few years, especially code ... 详细信息
来源: 评论
Efficiently Securing Systems from code reuse attacks
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2014年 第5期63卷 1144-1156页
作者: Kayaalp, Mehmet Ozsoy, Meltem Abu Ghazaleh, Nael Ponomarev, Dmitry SUNY Binghamton Dept Comp Sci Binghamton NY 13902 USA
code reuse attacks (CRAs) are recent security exploits that allow attackers to execute arbitrary code on a compromised machine. CRAs, exemplified by return-oriented and jump-oriented programming approaches, reuse frag... 详细信息
来源: 评论
Signature-Based Protection from code reuse attacks
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2015年 第2期64卷 533-546页
作者: Kayaalp, Mehmet Schmitt, Timothy Nomani, Junaid Ponomarev, Dmitry Abu Ghazaleh, Nael SUNY Binghamton Dept Comp Sci Binghamton NY 13902 USA
code reuse attacks (CRAs) recently emerged as a new class of security exploits. CRAs construct malicious programs out of small fragments (gadgets) of existing code, thus eliminating the need for code injection. Existi... 详细信息
来源: 评论
Counterfeit Object-oriented Programming On the Difficulty of Preventing code reuse attacks in C plus plus Applications  36
Counterfeit Object-oriented Programming On the Difficulty of...
收藏 引用
IEEE Symposium on Security and Privacy SP
作者: Schuster, Felix Tendyck, Thomas Liebchen, Christopher Davi, Lucas Sadeghi, Ahmad-Reza Holz, Thorsten Ruhr Univ Bochum HGI Bochum Germany Tech Univ Darmstadt CASED Darmstadt Germany
code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. A variety of corresponding defenses has been proposed, o... 详细信息
来源: 评论
A Generic Technique for Automatically Finding Defense-Aware code reuse attacks  20
A Generic Technique for Automatically Finding Defense-Aware ...
收藏 引用
ACM SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Schwartz, Edward J. Cohen, Cory F. Gennari, Jeffrey S. Schwartz, Stephanie M. Carnegie Mellon Univ Software Engn Inst Pittsburgh PA 15213 USA Millersville Univ Pennsylvania Comp Sci Dept Millersville PA USA
code reuse attacks have been the subject of a substantial amount of research during the past decade. This research largely resulted from early work on Return-Oriented Programming (ROP), which showed that the then newl... 详细信息
来源: 评论
Tazhi: A Novel Technique for Hunting Trampoline Gadgets of Jump Oriented Programming (A Class of code reuse attacks)  11
Tazhi: A Novel Technique for Hunting Trampoline Gadgets of J...
收藏 引用
11th International ISC Conference on Information Security and Cryptology (ISCISC)
作者: Sadeghi, Ali-Akbar Aminmansour, Farzane Shahriari, Hamid-Reza Amirkabir Univ Technol Dept Comp Engn & Informat Technol Tehran Iran
code reuse attacks enable attackers to manipulate the memory and execute their own code on a target system without the need to inject any operating code in the memory space. Jump Oriented Programming is known as a cla... 详细信息
来源: 评论
A Technique Preventing code reuse attacks Based on RISC Processor
A Technique Preventing Code Reuse Attacks Based on RISC Proc...
收藏 引用
2018 International Conference on Computer,Communication and Network Technology(CCNT 2018)
作者: Yang LI Zi-bin DAI Jun-wei LI Zhengzhou Information Science and Technology Institute
A full-process tag inspection system was designed and experimentally verified. This system based on RISC processors can defend code reuse attacks, as well as prevent high overhead caused by the implementation of softw... 详细信息
来源: 评论
Timely address space rerandomization for resisting code reuse attacks
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2017年 第16期29卷 1-14页
作者: Chen, Xiaoquan Xue, Rui Wu, Chuankun Chinese Acad Sci Inst Informat Engn State Key Lab Informat Secur Beijing Peoples R China Univ Chinese Acad Sci Beijing Peoples R China
The major weakness of address space layout randomization is the address space of the program being randomized only once at loading. Therefore, it cannot prevent those advanced code reuse attacks, such as just-in-time ... 详细信息
来源: 评论
Tiny Jump-Oriented Programming Attack  12
Tiny Jump-Oriented Programming Attack
收藏 引用
12th International ISC Conference on Information Security & Cryptology (ISCISC)
作者: Sadeghi, AliAkbar Aminmansour, Farzanc Shahriari, Hamid Reza Amirkabir Univ Technol Dept Comp Engn & Informat Technol Tehran Iran
code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. A large number of practical and non-practical defenses have been propo... 详细信息
来源: 评论
DExIE-An IoT-Class Hardware Monitor for Real-Time Fine-Grained Control-Flow Integrity
收藏 引用
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY 2022年 第7期94卷 739-752页
作者: Spang, Christoph Lavan, Yannick Hartmann, Marco Meisel, Florian Koch, Andreas Tech Univ Darmstadt Embedded Syst & Applicat Grp Darmstadt Germany
The Dynamic Execution Integrity Engine (DExIE) is a lightweight hardware monitor that can be flexibly attached to many IoT-class processor pipelines. It is guaranteed to catch both inter- and intra-function illegal co... 详细信息
来源: 评论