[1] Shacham T. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86)[C]//Proc. of ACM CCS’07. New York, USA: ACM Press, 2007. [2] Kornau T. Return Oriented Programming for the ARM Architecture[D]. Bochum, German: Ruhr-University, 2010. [3] Chen Ping, Xiao Hai, Shen Xiaobin, et al. Drop: Detecting Return- oriented Programming Malicious Code[C]//Proc. of ICISS’10. Gandhinagar Gujarat, India: [s. n.], 2010. [4] Davi L, Sadeghi A. Winandy M. Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-oriented Programming Attacks[C]//Proc. of ACM Workshop on Scalable Trusted Computing. Chicago, USA: ACM Press, 2009. [5] Davi L, Sadeghi A, Winandy M. Ropdefender: A Detection Tool to Defend Against Return-oriented Programming Attacks[R]. Ruhr-University, Tech. Rep.: HGI-TR-2010-001, 2010. [6] Francillon A, Perito D. Defending Embedded Systems Against Control Flow Attacks[C]//Proc. of ACM Workshop on Secure Execution of Untrusted Code. New York, USA: ACM Press, 2009. [7] Kernels J L, Zhi Wang, Jiang Xuxian, et al. Defeating Return- oriented Rootkits with Return-less Kernels[C]//Proc. of EUROSYS’10. New York, USA: [s. n.], 2010. [8] Checkoway S, Shacham T. Escape from Return-oriented Programming: Return-oriented Programming Without Returns[C]// Proc. of ACM CCS’10. San Diego, USA: [s. n.], 2010. [9] Bletsch T, Jiang Xuxian. Jump-oriented Programming: A New Class of Code-reuse Attack[R]. Association for Computing Machinery, Tech. Rep.: TR-2010-8, 2010. [10] Luk C K, Cohn P. Building Customized Program Analysis Tools with Dynamic Instrumentation[C]//Proc. of ACM SIGPLAN Conference on Programming Language Design and Implement- ation. New York, USA: [s. n.], 2005. [11] Eagle C. IDA Pro权威指南[M]. 石华耀, 段桂菊, 译. 北京: 人民邮电出版社, 2010. [12] Levine J R. 链接器和加载器[M]. 李 勇, 译. 北京: 北京航空航天大学出版社, 2009. [13] 房 陈, 茅 兵, 谢 立. 基于动态染色的内存漏洞定位技 术[J]. 计算机工程, 2010, 36(7): 139-141.
|