최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE access : practical research, open solutions, v.8, 2020년, pp.36267 - 36280
Jeong, Seunghoon (Sejong University, Seoul, South Korea) , Hwang, Jaejoon (Hanwha Systems, Seongnam, South Korea) , Kwon, Hyukjin (Korea Ministry of National Defense, Information Planning Bureau, Seoul, South Korea) , Shin, Dongkyoo (Sejong University, Seoul, South Korea)
In the Unix-like system, the Global Offset Table (GOT) overwrite attack is a long-lasting control flow hijacking attack. The attack, by leveraging the dynamic symbol binding mechanism, overwrites any GOT entry into the attacker's target address to take the execution flow on the library function call...
arXiv 1407 0549 Lockdown: Dynamic control-flow integrity payer 2014
Qiu, Pengfei, Lyu, Yongqiang, Zhang, Jiliang, Wang, Dongsheng, Qu, Gang. Control Flow Integrity Based on Lightweight Encryption Architecture. IEEE transactions on computer-aided design of integrated circuits and systems : a publication of the IEEE Circuits and Systems Society, vol.37, no.7, 1358-1369.
arXiv 1910 03034 Methodologies for quantifying (Re-)randomization security and timing under JIT-ROP salman ahmed 2019
Control Flow Integrity Design Documentation 0
Zhang, Jiliang, Qi, Binhang, Qin, Zheng, Qu, Gang. HCIC: Hardware-Assisted Control-Flow Integrity Checking. IEEE Internet of things journal : a joint publication of the IEEE Sensors Council, the IEEE Communications Society, the IEEE Computer Society, the IEEE Signal Processing Society, vol.6, no.1, 458-471.
Presser, Leon, White, John R.. Linkers and Loaders. ACM computing surveys, vol.4, no.3, 149-167.
Too much PIE is bad for performance payer 2012
Proc 24th Secur Symp (USENIX Secur ) Control-flow bending: On the effectiveness of control-flow integrity carlini 2015 161
Squeezing the Dynamic Loader for Fun and Profit zhang 2015
How to Hijack the Global Offset Table With Pointers for Root Shells 2020
Proc 23rd USENIX Secur Symp (USENIX Secur ) Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection davi 2014 401
Proc 23rd USENIX Secur Symp (USENIX Secur ) Enforcing forward-edge control-flow integrity in GCC & LLVM tice 2014 941
Chronobiologia 2020
LLVM Language Reference Manual 2020
Cross DSO CFI—LLVM and Android rohlf 2020
LLVM Link Time Optimization Design and Implementation 2020
LLD—The LLVM Linker 2020
Writing an LLVM Pass 2020
Name Mangling Demystified kefallonitis 2007
Symbol Versioning 2020
gdb and Binutils 2020
PaX address space layout randomization (ASLR) 2020
Burow, Nathan, Carr, Scott A., Nash, Joseph, Larsen, Per, Franz, Michael, Brunthaler, Stefan, Payer, Mathias. Control-Flow Integrity : Precision, Security, and Performance. ACM computing surveys, vol.50, no.1, 1-33.
Data Execution Prevention (DEP) 2019
Proc NDSS MoCFI: A framework to mitigate control-flow attacks on smartphones davi 2012 26 27
Proc IEEE Symp Secur Privacy Practical control flow integrity and randomization for binary executables zhang 2013 559
Proc 23rd Secur Symp (USENIX Secur ) ROP is still dangerous: Breaking modern defenses carlini 2014 385
Dynamic Linking With Large Number of DSOs Degrades Into Linear Lookup pluzhnikov 2020
Control flow guard 2020
Proc ACM Conf Comput Commun Secur The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86) shacham 2007 552
Proc Usenix Secur Symp Control flow integrity for COTS binaries zhang 2013 337
Control-flow integrity 2020
Proc of USENIX Symp on Operating Systems Design and Implementation (OSDI) Shuffler: Fast and deployable continuous code re-randomization williams-king 2016 367
Niu, Ben, Tan, Gang. Modular control-flow integrity. ACM SIGPLAN notices : a monthly publication of the Special Interest Group on Programming Languages, vol.49, no.6, 577-587.
Proc 21st Secur Symp (USENIX Secur ) Enhanced operating system security through efficient and fine-grained address space randomization giuffrida 2012 475
Conti, Mauro, Crane, Stephen, Frassetto, Tommaso, Homescu, Andrei, Koppen, Georg, Larsen, Per, Liebchen, Christopher, Perry, Mike, Sadeghi, Ahmad-Reza. Selfrando: Securing the Tor Browser against De-anonymization Exploits. Proceedings on privacy enhancing technologies, vol.2016, no.4, 454-469.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.