Stack Layout Randomization with Minimal Rewriting of Android Binaries
Stack-based attacks typically require that attackers have a good understanding of the stack layout of the victim program. In this paper, we leverage specific features on ARM architecture and propose a practical technique that introduces randomness to the stack layout when an Android application exec...
Saved in:
Main Authors: | Liang, Yu, Ma, Xinjie, Wu, Daoyuan, Tang, Xiaoxiao, GAO, Debin, Peng, Guojun, Jia, Chunfu, Zhang, Huanguo |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2015
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/2919 https://ink.library.smu.edu.sg/context/sis_research/article/3919/viewcontent/icisc15.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Active warden attack: On the (in)effectiveness of Android app repackage-proofing
by: MA, Haoyu, et al.
Published: (2022) -
Measuring the declared SDK versions and their consistency with API calls in android apps
by: WU, Daoyuan, et al.
Published: (2017) -
On the effectiveness of code-reuse-based Android application obfuscation
by: TANG, Xiaoxiao, et al.
Published: (2017) -
FA3: Fine-Grained Android Application Analysis
by: LIN, Yan, et al.
Published: (2023) -
On-the-fly Android static analysis with applications in vulnerability discovery
by: WU, Daoyuan
Published: (2019)