반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현

논문상세정보
' 반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • code reuse attack
  • malware defense
  • return-oriented programming
  • software security
  • 반환지향프로그래밍공격
  • 소프트웨어보안
  • 악성코드방어
  • 코드재사용공격
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
26 0

0.0%

' 반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현' 의 참고문헌

  • 스택 공격 탐지와 방어를 위한 반환 주소 이중 인코딩
    김경태 정보과학회 컴퓨팅의 실제 논문지 17 (3) : 159 ~ 164 [2011]
  • 간접 분기 감시와 프로그램 카운터 인코딩에 의한 제어 흐름 보호 방법
    김경태 정보과학회 컴퓨팅의 실제 논문지 20 (7) : 392 ~ 397 [2014]
  • Zero-Sum Defender: Fast and Space-Efficient Defense against Return-Oriented Programming Attacks
    J. Kim IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences E97-A (1) : 303 ~ 305 [2014]
  • Transparent ROP Exploit Mitigation Using Indirect Branch Tracing
    V. Pappas Proc. of USENIX Security Symposium : 447 ~ 462 [2013]
  • The Latest Adobe Exploit and Session Upgrading
    jduck
  • The Geometry of Innocent Flesh on the Bone : Return-Into-Libc without Function Calls(on the x86)
    H. Shacham Proc. of ACM Conference on Computer and Communications Security : 552 ~ 561 [2007]
  • TPM을 도입한 프로그램 카운터 인코딩의 구현
    박수현 정보과학회 컴퓨팅의 실제 논문지 17 (1) : 13 ~ 19 [2011]
  • Smashing the Stack for Fun and Profit
    Aleph One Phrack Magazine 49 (1) : 14 ~ 16 [1996]
  • Signatrue-Based Protection form Code Reuse Attacks
    M. Kayaalp IEEE Transactions on Computers [2014]
  • Return-Oriented Rootkits : Bypassing Kernel Code Integrity Protection Mechanisms
    R. Hund Proc. of USENIX Security Symposium : 1 ~ 16 [2009]
  • Return-Oriented Programming without Returns
    S. Checoway Proc. ACM Conference on Computer and Communications Security : 559 ~ 572 [2010]
  • ROPdefender : A Detection Tool to Defend against Return-Oriented Programming Attacks
    L. Davi Proc. of ACM Symposium on Information, Computer and Communications Security : 40 ~ 51 [2011]
  • Payload already Inside: Deta Re-Use for ROP Exploits
    L. Le Blackhat USA : 1 ~ 21 [2010]
  • PaX Non-Executable Page Design & Implementation
    PaX Team
  • Native Client : A Sandbox for Portable, Untrusted x86 Native Code
    B. Yee Proc. IEEE Symposium on Security and Privacy : 79 ~ 93 [2009]
  • Jump-Oriented Programming : A New Class of Code-Reuse Attack
    T. Bletsch Proc. Annual Computer Security Applications Conference : 30 ~ 40 [2011]
  • JailbreakMe Released for Apple Devices
  • ILR : Where’d My Gadgets Go?
    J. Hiser Proc. IEEE Symposium on Security and Privacy : 571 ~ 585 [2012]
  • Getting around Non-Executable Stack (and Fix)
    Solar designer
  • G-Free : Defeating Return-Oriented Programming through Gadget-Less Binaries
    K. Onariloglu Proc. Annual Computer Security Applications Conference : 49 ~ 58 [2010]
  • Evaluating SFI for a CISC Architecture
    McCamant, S. Morrisett, G. Proc. of USENIX Security Symposium : 1 ~ 16 [2006]
  • Efficiently Securing Systems from Code Reuse Attack
    M. Kayaalp IEEE Transactions on Computers 63 (5) : 1144 ~ 1156 [2014]
  • Defeating Return-Oriented Programming through Gadget-Less Kernels
    J. Li Proc. European Conference on Computer Systems : 195 ~ 208 [2010]
  • Data Execution Prevention
    Microsoft
  • Control-Flow Integrity
    M. Abadi Proc. ACM Conference on Computer and Communications Security : 340 ~ 353 [2005]
  • Code Shredding : Byte-Granular Randomization of Program Layout for Detecting Code-Reuse Attacks
    E. Shioji Proc. Annual Computer Security Applications Conference : 309 ~ 318 [2012]
  • Binary stirring : Self-randomizing instruction addresses of legacy x86 binary code
    R. Wartell Proc. ACM Conference on Computer and Communications Security : 157 ~ 168 [2012]
  • Basic Integer Overflows
    Blexim Phrack Magazine 60 (10) : 10 ~ 16 [2002]
  • Apple QuickTime Backdoor Creates Code-Execution Peril
  • Advances in Format String Exploitation
    gera Phrack Magazine 59 (7) : 7 ~ 18 [2002]