Google Security Research.Wireshark-file_read(wtap_read_bytes_or_eof/mp2t_find_next_pcr)Stack-Based Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/38997/.
[2]
FOLLNER A,BODDEN E.ROPocop—Dynamic mitigation of code-reuse attacks[J].Journal of Information Security&Applications,2015(29):16-26.
[3]
PAPPAS V,POLYCHRONAKIS M,KEROMYTIS A D.Transparent ROP Exploit Mitigation Using Indirect Branch Tracing[C]//22nd USENIX Security Symposium.Berkeley:USENIX,2013:447-462.
[4]
ZHOU H W,WU X,SHI W C,et al.HDROP:Detecting ROP attacks using performance monitoring counters[C]//International Conference on Information Security Practice and Experience.Berlin:Springer,2014:172-186.
[5]
Alberto Ortega.No-IP Dynamic Update Client(DUC)2.1.9-Local IP Address Stack Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/25411.
[6]
Google Security Research.Glibc-getaddrinfo StackBased Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/39454.
[7]
Google Security Research.pdfium CPDF_Function::CallStack-Based Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/39165/.
[8]
CHENG Y,ZHOU Z,MIAO Y,et al.ROPecker:A generic and practical approach for defending against ROP attack[J].Proceedings of the 21th Annual Network and Distributed System Security Symposium,2014(2):1-14.
[9]
CARLINI N,WAGNER D.ROP is still dangerous:Breaking modern defenses[C]//23rd USENIX Security Symposium(USENIX Security 14).Berkeley:USENIX,2014:385-399.
[10]
GKTAS E,ATHANASOPOULOS E,POLYCHRONAKIS M,et al.Size does matter:Why using gadget-chain length to prevent code-reuse attacks is hard[C]//23rd USENIX Security Symposium(USENIX Security 14).Berkeley:USENIX,2014:417-432.
[11]
ICL of University of Tennessee.PAPI Programmer’s Reference[DB/OL].[2016-01-04].http://icl.cs.utk.edu/papi.
[12]
PFAFF D,HACK S,HAMMER C.Learning how to prevent return-oriented programming efficiently[C]//International Symposium on Engineering Secure Software and Systems.Berlin:Springer,2015:68-85.
[13]
SHACHAM H.The geometry of innocent flesh on the bone:Return-into-libc without function calls(on the x86)[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.New York:ACM,2007:552-561.
[14]
Google Security Research.glibc-getaddrinfo StackBased Buffer Overflow[DB/OL].[2016-03-04].https://www.exploit-db.com/exploits/39454/.
[15]
Standard Performance Evaluation Corporation.Standard Performance Evaluation Corporation[DB/OL].[2016-03-04].http://www.spec.org.
[16]
The PaX Team.Homepage of The PaX Team[DB/OL].[2016-01-04].https://pax.grsecurity.net/.
[17]
VAN DE VEN A.New security enhancements in red hat enterprise linux v.3,update 3[DB/OL].[2016-01-05].http://www.redhat.com/f/pdf/rhel/WHP0006US_Execshield.pdf.
[18]
BUCHANAN E,ROEMER R,SHACHAM H,et al.When good instructions go bad:Generalizing returnoriented programming to RISC[C]//Proceedings of the 15th ACM conference on Computer and communications security.New York:ACM,2008:27-38.
[19]
CHECKOWAY S,DAVI L,DMITRIENKO A,et al.Return-oriented programming without returns[C]//Proceedings of the 17th ACM conference on Computer and communications security.New York:ACM,2010:559-572.
[20]
The PaX Team.Address space layout randomization[DB/OL].[2016-02-12].https://pax.grsecurity.net/docs/aslr.txt.
[21]
DAVI L,SADEGHI A R,LEHMANN D,et al.Stitching the gadgets:On the ineffectiveness of coarsegrained control-flow integrity protection[C]//23rd USENIX Security Symposium(USENIX Security14).Berkeley:USENIX,2014:401-416.
[22]
刘露平,方勇,刘亮,等.基于动态插桩的缓冲区溢出漏洞检测技术研究[J].信息安全与通信保密,2015(4):80-82.LIU L P,FANG Y,LIU L,et al.Buffer overflow vulnerability detection technology based on dynamic instrumentation[J].Information Security and Communications Privacy,2015(4):80-82(Ch).
[23]
BLETSCH T,JIANG X,FREEH V W,et al.Jumporiented programming:A new class of code-reuse attack[C]//Proceedings of the 6th ACM Symposium on Information,Computer and Communications Security.New York:ACM,2011:30-40.
[24]
尹茗,张功萱.基于源码分析的缓冲区溢出漏洞检测方法[J].江苏大学学报:自然科学版,2016,37(4):450-455.YIN M,ZHANG G X.Buffer overflow detection method based on source code analysis[J].Journal of Jiangsu University:Natural Science Edition,2016,37(4):450-455(Ch).