Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization

by Michalis Polychronakis , Angelos D. Keromytis
Citations:16 - 4 self

Documents Related by Co-Citation

123 The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86 – Hovav Shacham - 2007
153 On the effectiveness of address-space randomization – Hovav Shacham, Eu-jin Goh, Nagendra Modadugu, Ben Pfaff, Dan Boneh - 2004
173 Building Diverse Computer Systems – Stephanie Forrest, Anil Somayaji , David H. Ackley
10 J.W.: ILR: Where’d My Gadgets Go – J Hiser, A Nguyen-Tuong, M Co, M Hall, Davidson
20 G-Free: defeating return-oriented programming through gadget-less binaries – K Onarlioglu, L Bilge, A Lanzi, D Balzarotti, E Kirda - 2010
101 Efficient Techniques for Comprehensive Protection from Memory Error Exploits – Sandeep Bhatkar, R. Sekar, Daniel C. DuVarney - 2005
33 Return-Oriented Programming without Returns – Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy - 2010
18 Surgically Returning to Randomized lib(c – Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi
21 Defeating return-oriented rootkits with ”return-less” kernels – J Li, Z Wang, X Jiang, M Grace, S Bahram - 2010
43 The advanced return-into-lib(c) exploits: PaX case study – Nergal - 2001
71 Operating System Protection Through Program Evolution – F Cohen - 1993
105 Control-flow integrity – M Abadi, M Budiu, U Erlingsson, J Ligatti - 2005
19 x86-64 Buffer Overflow Exploits and the Borrowed Code Chunks Exploitation Technique,” 2005: http://www .suse .de/~krahmer/no-nx .pdf – Sebastian Krahmer
10 Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code – Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin - 2012
18 Efficient detection of the return-oriented programming malicious code – P Chen, X Xing, H Han, B Mao, L Xie - 2010
53 When Good Instructions Go Bad: Generalizing Return-Oriented Programming to RISC ABSTRACT – Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage
6 CVE-2012-0769, the case of the perfect info leak – F J Serna - 2012
18 Q: Exploit hardening made easy – Edward J. Schwartz, Thanassis Avgerinos, David Brumley - 2011
22 Address space layout permutation (ASLP): Towards fine-grained randomization of commodity software – Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning - 2006