Librando: transparent code randomization for just-in-time compilers

作者: Andrei Homescu , Stefan Brunthaler , Per Larsen , Michael Franz

DOI: 10.1145/2508859.2516675

关键词:

摘要: … create new binary code containing the necessary gadgets by supplying … code into native code containing ROP gadgets. The C3 byte encodes the RET instruction at the end of a gadget…

参考文章(28)
Ping Chen, Yi Fang, Bing Mao, Li Xie, JITDefender: A Defense against JIT Spraying Attacks information security conference. pp. 142- 153 ,(2011) , 10.1007/978-3-642-21424-0_12
Todd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal, Stefan Brunthaler, Christian Wimmer, Michael Franz, Compiler-Generated Software Diversity Moving Target Defense. pp. 77- 98 ,(2011) , 10.1007/978-1-4614-0977-9_4
Nicholas Nethercote, Julian Seward, Valgrind: A Program Supervision Framework Electronic Notes in Theoretical Computer Science. ,vol. 89, pp. 44- 66 ,(2003) , 10.1016/S1571-0661(04)81042-9
Greg Morrisett, Stephen McCamant, Evaluating SFI for a CISC architecture usenix security symposium. pp. 15- ,(2006)
Tyler Bletsch, Xuxian Jiang, Vince W. Freeh, Zhenkai Liang, Jump-oriented programming Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11. pp. 30- 40 ,(2011) , 10.1145/1966913.1966919
A. Homescu, S. Neisius, P. Larsen, S. Brunthaler, M. Franz, Profile-guided automated software diversity symposium on code generation and optimization. pp. 1- 11 ,(2013) , 10.1109/CGO.2013.6494997
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis, Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization ieee symposium on security and privacy. pp. 601- 615 ,(2012) , 10.1109/SP.2012.41
Lingjia Tang, Jason Mars, Mary Lou Soffa, Compiling for niceness: mitigating contention for QoS in warehouse scale computers symposium on code generation and optimization. pp. 1- 12 ,(2012) , 10.1145/2259016.2259018
Jinku Li, Zhi Wang, Xuxian Jiang, Michael Grace, Sina Bahram, Defeating return-oriented rootkits with "Return-Less" kernels european conference on computer systems. pp. 195- 208 ,(2010) , 10.1145/1755913.1755934
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki Okasaka, Neha Narula, Nicholas Fullagar, Native Client: A Sandbox for Portable, Untrusted x86 Native Code ieee symposium on security and privacy. pp. 79- 93 ,(2009) , 10.1109/SP.2009.25