Revisiting Address Space Randomization
Address space randomization is believed to be a strong defense against memory error exploits. Many code and data objects in a potentially vulnerable program and the system could be randomized, including those on the stack and heap, base address of code, order of functions, PLT, GOT, etc. Randomizing...
Saved in:
Main Authors: | WANG, Zhi, CHENG, Renquan, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1321 https://ink.library.smu.edu.sg/context/sis_research/article/2320/viewcontent/icisc10_av.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables
by: LIU, Limin, et al.
Published: (2011) -
deRop: Removing Return-Oriented Programming from Malware
by: LU, Kangjie, et al.
Published: (2011) -
On return oriented programming threats in Android runtime
by: RAJA, Akshaya Venkateswara, et al.
Published: (2017) -
RopSteg: Program steganography with return oriented programming
by: LU, Kangjie, et al.
Published: (2014) -
RopSteg: Program Steganography with Return Oriented Programming
by: Lu, Kangjie, et al.
Published: (2014)