Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Wei J and Chen P. DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming. Journal of Computer Security. 10.3233/JCS-230053. 32:3. (221-246).

    https://www.medra.org/servlet/aliasResolver?alias=iospress&doi=10.3233/JCS-230053

  • Li Y, Bao Y and Chung Y. Randomize the Running Function When It Is Disclosed. IEEE Transactions on Computers. 10.1109/TC.2024.3371776. 73:6. (1516-1530).

    https://ieeexplore.ieee.org/document/10458890/

  • Chen K, Yang Q, Wang J, Ma D, Wang L and Xu Z. (2024). What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 10.1109/CSCWD61410.2024.10580487. 979-8-3503-4918-4. (2870-2875).

    https://ieeexplore.ieee.org/document/10580487/

  • Gaidis A, Moreira J, Sun K, Milburn A, Atlidakis V and Kemerlis V. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. (527-546).

    https://doi.org/10.1145/3607199.3607219

  • Wichelmann J, Pätschke A, Wilke L and Eisenbarth T. Cipherfix. Proceedings of the 32nd USENIX Conference on Security Symposium. (6789-6806).

    /doi/10.5555/3620237.3620617

  • Ahmed S, Liljestrand H, Jamjoom H, Hicks M, Asokan N and Yao D. Not all data are created equal. Proceedings of the 32nd USENIX Conference on Security Symposium. (1433-1450).

    /doi/10.5555/3620237.3620318

  • Tang Z, Ma D, Sun X, Chen K, Wang L and Jiang J. (2023). Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense 2023 IEEE Symposium on Computers and Communications (ISCC). 10.1109/ISCC58397.2023.10218253. 979-8-3503-0048-2. (568-574).

    https://ieeexplore.ieee.org/document/10218253/

  • Ghosh P, Gholap Y and Singh V. (2023). On-Chip SRAM Disclosure Attack Prevention Technique for SoC 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS). 10.1109/IOLTS59296.2023.10224860. 979-8-3503-4135-5. (1-7).

    https://ieeexplore.ieee.org/document/10224860/

  • Nie X, Chen L, Wei H, Zhang Y, Cui N and Shi G. (2023). KPDFI. Computers and Security. 128:C. Online publication date: 1-May-2023.

    https://doi.org/10.1016/j.cose.2023.103183

  • Shen Z, Dharsee K and Criswell J. Randezvous: Making Randomization Effective on MCUs. Proceedings of the 38th Annual Computer Security Applications Conference. (28-41).

    https://doi.org/10.1145/3564625.3567970

  • Blackburn C, Wang X and Ravindran B. Rave: A Modular and Extensible Framework for Program State Re-Randomization. Proceedings of the 9th ACM Workshop on Moving Target Defense. (3-10).

    https://doi.org/10.1145/3560828.3564008

  • Xu J, Lin H, Yuan Z, Shen W, Zhou Y, Chang R, Wu L and Ren K. RegVault. Proceedings of the 59th ACM/IEEE Design Automation Conference. (715-720).

    https://doi.org/10.1145/3489517.3530549

  • Liu Z, Zhang Z, Xi R, Zhu P and Ma B. (2022). SoK: A Survey on Redundant Execution Technology 2021 International Conference on Advanced Computing and Endogenous Security. 10.1109/IEEECONF52377.2022.10013333. 978-1-6654-2449-3. (1-14).

    https://ieeexplore.ieee.org/document/10013333/

  • Vinck J, Abrath B, Coppens B, Voulimeneas A, De Sutter B and Volckaert S. Sharing is caring. Proceedings of the Seventeenth European Conference on Computer Systems. (99-116).

    https://doi.org/10.1145/3492321.3519558

  • Cheng L, Ahmed S, Liljestrand H, Nyman T, Cai H, Jaeger T, Asokan N and Yao D. (2021). Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Transactions on Privacy and Security. 24:4. (1-36). Online publication date: 30-Nov-2021.

    https://doi.org/10.1145/3462699

  • Lau T. (2021). Software Reuse Exploits in Node.js Web Apps 2021 5th International Conference on System Reliability and Safety (ICSRS). 10.1109/ICSRS53853.2021.9660640. 978-1-6654-0049-7. (190-197).

    https://ieeexplore.ieee.org/document/9660640/

  • Volckaert S. Randomization-based Defenses against Data-Oriented Attacks. Proceedings of the 8th ACM Workshop on Moving Target Defense. (1-2).

    https://doi.org/10.1145/3474370.3485657

  • Palit T, Firose Moon J, Monrose F and Polychronakis M. (2021). DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection 2021 IEEE Symposium on Security and Privacy (SP). 10.1109/SP40001.2021.00082. 978-1-7281-8934-5. (1919-1937).

    https://ieeexplore.ieee.org/document/9519446/