2012
DOI: 10.1007/978-1-4614-5416-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Diversifying the Software Stack Using Randomized NOP Insertion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 21 publications
0
24
0
Order By: Relevance
“…Memory disclosure may take the form of direct memory leakage [53] (i.e., as part of the system output), or it can take the form of indirect memory leakage, where fault or timing side-channel analysis attacks are used to leak the contents of memory [9,47]. Other forms of randomization-based techniques include instruction set randomization (ISR) [8] or the multicompiler techniques [26]. Unfortunately, they are also vulnerable to information leakage attacks [53,47].…”
Section: Introductionmentioning
confidence: 99%
“…Memory disclosure may take the form of direct memory leakage [53] (i.e., as part of the system output), or it can take the form of indirect memory leakage, where fault or timing side-channel analysis attacks are used to leak the contents of memory [9,47]. Other forms of randomization-based techniques include instruction set randomization (ISR) [8] or the multicompiler techniques [26]. Unfortunately, they are also vulnerable to information leakage attacks [53,47].…”
Section: Introductionmentioning
confidence: 99%
“…By comparison, Jackson et al [30] reported higher overhead for their diversifying GCC and LLVM compilers. Similar to G-Free, their compiler adds alignment sleds in front of candidate gadgets in order to remove unintended gadgets from the binary.…”
Section: Custom Code Analysis and Code Generationmentioning
confidence: 96%
“…No support for operating system diversification: In contrast, several compile-time diversification approaches support operating system protection [12], [27], [34]. Rewriting kernel code is not impossible but it is rather involved because kernels differ from application code in numerous ways.…”
Section: The Diversification Engine Increases the Trusted Computing Bmentioning
confidence: 99%