1 |
FRANZ M. E unibus pluram: massive-scale software diversity as a defense mechanism[C]//Proceedings of 2010 New Security Paradigms Workshop. New York, USA: ACM Press, 2010: 7-16.
|
2 |
LARSEN P, HOMESCU A, BRUNTHALER S, et al. SoK: automated software diversity[C]//Proceedings of 2014 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2014: 276-291.
|
3 |
COHEN F B. Operating system protection through program evolution. Computers & Security, 1993, 12(6): 565- 584.
|
4 |
蒋楚, 王永杰. 一种基于表达式树的gadget语义分析技术. 计算机工程, 2021, 47(1): 109- 116.
URL
|
|
JIANG C, WANG Y J. A technique of gadget semantic analysis based on expression tree. Computer Engineering, 2021, 47(1): 109- 116.
URL
|
5 |
LUO L, SHAO X H, LING Z, et al. fASLR: function-based ASLR via TrustZone-M and MPU for resource-constrained IoT systems. IEEE Internet of Things Journal, 2022, 9(18): 17120- 17135.
doi: 10.1109/JIOT.2022.3190374
|
6 |
LU H, JIN C J, HELU X H, et al. Research on intelligent detection of command level stack pollution for binary program analysis. Mobile Networks and Applications, 2021, 26(4): 1723- 1732.
doi: 10.1007/s11036-019-01507-0
|
7 |
WARTELL R, MOHAN V, HAMLEN K W, et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2012: 157-168.
|
8 |
|
9 |
COFFMAN J, KELLY D M, WELLONS C C, et al. ROP gadget prevalence and survival under compiler-based binary diversification schemes[C]//Proceedings of 2016 ACM Workshop on Software Protection. New York, USA: ACM Press, 2016: 15-26.
|
10 |
ROGLIA G F, MARTIGNONI L, PALEARI R, et al. Surgically returning to randomized lib(c)[C]//Proceedings of 2009 Annual Computer Security Applications Conference. Washington D. C., USA: IEEE Press, 2009: 60-69.
|
11 |
MURPHY M, LARSEN P, BRUNTHALER S, et al. Software profiling options and their effects on security based diversification[C]//Proceedings of the 1st ACM Workshop on Moving Target Defense. New York, USA: ACM Press, 2014: 87-96.
|
12 |
HOMESCU A, JACKSON T, CRANE S, et al. Large-scale automated software diversity—program evolution redux. IEEE Transactions on Dependable and Secure Computing, 2017, 14(2): 158- 171.
doi: 10.1109/TDSC.2015.2433252
|
13 |
HOMESCU A, NEISIUS S, LARSEN P, et al. Profile-guided automated software diversity[C]//Proceedings of 2013 IEEE/ACM International Symposium on Code Generation and Optimization. Washington D. C., USA: IEEE Press, 2013: 1-11.
|
14 |
XU H, ZHOU Y F, KANG Y, et al. Manufacturing resilient bi-opaque predicates against symbolic execution[C]//Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Washington D. C., USA: IEEE Press, 2018: 666-677.
|
15 |
PRIYADARSHAN S, NGUYEN H, SEKAR R. Practical fine-grained binary code randomization[C]//Proceedings of the 36th Annual Computer Security Applications Conference. New York, USA: ACM Press, 2020: 401-414.
|
16 |
ZHAO Y, TANG Z, YE G, et al. Semantics-aware obfuscation scheme prediction for binary. Computers & Security, 2020, 99, 102072.
|
17 |
CHEN Y, WANG Z, WHALLEY D, et al. Remix: on-demand live randomization[C]//Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. New York, USA: ACM Press, 2016: 50-61.
|
18 |
PAPPAS V, POLYCHRONAKIS M, KEROMYTIS A D. Smashing the gadgets: hindering return-oriented programming using in-place code randomization[C]//Proceedings of 2012 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2012: 601-615.
|
19 |
张贵民, 李清宝, 曾光裕, 等. 运行时代码随机化防御代码复用攻击. 软件学报, 2019, 30(9): 2772- 2790.
|
|
ZHANG G M, LI Q B, ZENG G Y, et al. Defensing code reuse attacks using live code randomization. Journal of Software, 2019, 30(9): 2772- 2790.
|
20 |
HISER J, NGUYEN-TUONG A, CO M, et al. ILR: where'd my gadgets go?[C]//Proceedings of 2012 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2012: 571-585.
|
21 |
WILLIAMS-KING D, KOBAYASHI H, WILLIAMS-KING K, et al. Egalito: layout-agnostic binary recompilation[C]//Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems. New York, USA: ACM Press, 2020: 133-147.
|
22 |
AZAB A, LAYTON R, ALAZAB M, et al. Mining malware to detect variants[C]//Proceedings of 2014 Cybercrime and Trustworthy Computing Conference. Washington D. C., USA: IEEE Press, 2014: 44-53.
|
23 |
肖睿卿, 费金龙, 祝跃飞, 等. 基于社团检测算法的固件二进制比对技术. 计算机研究与发展, 2022, 59(1): 209- 235.
|
|
XIAO R Q, FEI J L, ZHU Y F, et al. Firmware binary comparison technology based on community detection algorithm. Journal of Computer Research and Development, 2022, 59(1): 209- 235.
|
24 |
GIONTA J, ENCK W, NING P. HideM: protecting the contents of userspace memory in the face of disclosure vulnerabilities[C]//Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. New York, USA: ACM Press, 2015: 325-336.
|
25 |
|