2014
DOI: 10.1007/978-3-319-04897-0_1
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Code Reuse Attacks with a Model of Conformant Program Execution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 35 publications
0
16
0
Order By: Relevance
“…Jacobson et al [19] define conformant program execution as a set of run-time checks on program states, where a state represents elements of a machine that are affected by program execution (e.g. registers and memory).…”
Section: Run-time Integrity Checkingmentioning
confidence: 99%
“…Jacobson et al [19] define conformant program execution as a set of run-time checks on program states, where a state represents elements of a machine that are affected by program execution (e.g. registers and memory).…”
Section: Run-time Integrity Checkingmentioning
confidence: 99%
“…Before the advent of CRAs, some researchers of prior work [39,40] realized that the unintended instructions could be a potential security problem, and solved it by imposing alignment in the environment of a sandbox. Since the advent of CRAs, previous CRA defenses rely on dynamic binary instrumentation tools monitoring unintended instructions without the help of hardware [34,35], which limits their practical use.…”
Section: Related Workmentioning
confidence: 99%
“…Since JOP is a recently proposed technique, there are only a few proposals that target for JOP defenses. Among these defense techniques, [34], [35] and [36] are pure software approaches. To distinguish normal program execution from CRA attacks, they rely on the software dynamic binary instrumentation.…”
Section: Related Workmentioning
confidence: 99%
“…Binary code analysis is used in a wide range of applications, including performance analysis [1,15,33], software reverse engineering [12,18], debugging [2], software reliability [31], software forensics [42] and security [19,23,36]. The analysis of binary code is a critical capability in these applications because it does not require source code to be available and targets the actual software artifact that is executed.…”
Section: Introductionmentioning
confidence: 99%
“…These code complexities influence the ability of an analyst to understand the operation and intent of a program, and the ability of a tool to correctly instrument or transform the binary program to trace, debug, test, monitor, or sandbox it. Supporting these code constructs in our own open source Dyninst tool kit [37] brings a universal benefit, as Dyninst is widely used in building debugging tools including STAT [2] and SystemTap [17], performance tools including COBI [34], Extrae [30], HPCToolKit [1], and Open|SpeedShop [45], and many other tools for security analysis [19,23,39,44,50,53] and reverse engineering [10,24,27,41,43].…”
Section: Introductionmentioning
confidence: 99%