共 16 条
[1]
SHAO Sihao, GAO Qing, MA Sen, Et al., Progress in research on buffer overflow vulnerability analysis technologies, Journal of Software, 29, 5, pp. 1177-1198, (2018)
[2]
GAO Yingchun, ZHOU Anmin, LIU Liang, Data-execution prevention technology in windows system, Information Security and Communications Privacy, 7, pp. 77-79, (2013)
[3]
WEI Qiang, WEI Tao, WANG Jiajie, Evolution of exploitation and exploit mitigation, Journal of Tsinghua University(Science & Technology), 51, 10, pp. 1274-1280, (2011)
[4]
Shacham H., The geometry of innocent flesh on the bone, Proceedings of the ACM Conference on Computer and Communications Security, pp. 552-561, (2007)
[5]
Buchanan E, Roemer R, Shacham H, Et al., When good instructions go bad: generalizing return-oriented programming to RISC, Proceedings of the ACM Conference on Computer and Communications Security, pp. 27-38, (2008)
[6]
Lu K J, Zou D B, Wen W P, Et al., Packed, printable, and polymorphic return-oriented programming, Proceedings of International Workshop on Recent Advances in Intrusion Detection, pp. 101-120, (2011)
[7]
CHANG Chao, LIU Kesheng, TAN Longdan, Et al., Data flow analysis for C program based on graph model, Journal of Zhejiang University (Engineering Science), 51, 5, pp. 1007-1015, (2017)
[8]
Chipounov V, Kuznetsov V, Candea G., The S2E platform: design, implementation, and applications, ACM Transactions on Computer Systems, 30, 1, pp. 1-49, (2012)
[9]
Huang S K, Huang M H, Huang P Y, Et al., CRAX: software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations, Proceedings of IEEE Sixth International Conference on Software Security and Reliability (SERE), pp. 78-87, (2012)
[10]
Cha S K, Avgerinos T, Rebert A, Et al., Unleashing mayhem on binary code, Proceedings of IEEE Symposium on Security and Privacy, pp. 380-394, (2012)