[1]
Shacham H. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)[C]/Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007: 552-561.
DOI: 10.1145/1315245.1315313
Google Scholar
[2]
Baratloo A, Singh N, Tsai T. Libsafe: Protecting critical elements of stacks[J]. (1999).
Google Scholar
[3]
Jones R W M, Kelly P H J. Backwards-compatible bounds checking for arrays and pointers in C programs[J]. Automated and Algorithmic Debugging, 1997, 25.
Google Scholar
[4]
Dhurjati D, Adve V. Backwards-compatible array bounds checking for C with very low overhead[C]/Proceedings of the 28th international conference on Software engineering. ACM, 2006: 162-171.
DOI: 10.1145/1134285.1134309
Google Scholar
[5]
Cowan C, Pu C, Maier D, et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks[C]/Proceedings of the 7th USENIX Security Symposium. 1998, 81: 346-355.
Google Scholar
[6]
Cowan C, Beattie S, Johansen J, et al. Pointguard TM: protecting pointers from buffer overflow vulnerabilities[C]/Proceedings of the 12th conference on USENIX Security Symposium. 2003, 12: 91-104.
Google Scholar
[7]
Chen P, Xiao H, Shen X, et al. DROP: Detecting return-oriented programming malicious code[M]/Information Systems Security. Springer Berlin Heidelberg, 2009: 163-177.
DOI: 10.1007/978-3-642-10772-6_13
Google Scholar
[8]
Kayaalp M, Schmitt T, Nomani J, et al. SCRAP: Architecture for Signature-Based Protection from Code Reuse Attacks[J].
DOI: 10.1109/hpca.2013.6522324
Google Scholar
[9]
Kayaalp M, Ozsoy M, Abu-Ghazaleh N, et al. Branch Regulation: Low-overhead protection from code reuse attacks[C]/Computer Architecture (ISCA), 2012 39th Annual International Symposium on. IEEE, 2012: 94-105.
DOI: 10.1109/isca.2012.6237009
Google Scholar
[10]
Bletsch T, Jiang X, Freeh V W, et al. Jump-oriented programming: a new class of code-reuse attack[C]/Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011: 30-40.
DOI: 10.1145/1966913.1966919
Google Scholar
[11]
Jacobson E R, Bernat A R, Williams W R, et al. Preventing Code Reuse Attacks with a Model of Conformant Program Execution[J].
Google Scholar
[12]
Pappas V. kBouncer: Efficient and Transparent ROP Mitigation[J]. (2012).
Google Scholar
[13]
Li J, Wang Z, Jiang X, et al. Defeating return-oriented rootkits with return-less kernels[C]/Proceedings of the 5th European conference on Computer systems. ACM, 2010: 195-208.
DOI: 10.1145/1755913.1755934
Google Scholar
[14]
Onarlioglu K, Bilge L, Lanzi A, et al. G-Free: defeating return-oriented programming through gadget-less binaries[C]/Proceedings of the 26th Annual Computer Security Applications Conference. ACM, 2010: 49-58.
DOI: 10.1145/1920261.1920269
Google Scholar
[15]
Pappas V, Polychronakis M, Keromytis A D. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization[C]/Security and Privacy (SP), 2012 IEEE Symposium on. IEEE, 2012: 601-615.
DOI: 10.1109/sp.2012.41
Google Scholar
[16]
Team PaX. PaX non-executable pages design & implementation[J]. (2003).
Google Scholar
[17]
Information on http: /boomerang. sourceforge. net.
Google Scholar