Page 287 - 《软件学报》2020年第11期
P. 287
3602 Journal of Software 软件学报 Vol.31, No.11, November 2020
[13] Carlini N, Wagner D. ROP is still dangerous: Breaking modern defenses. In: Proc. of the 23rd USENIX Security Symp. (USENIX
Security 2014). San Diego: USENIX Association, 2014. 385−399.
[14] Xia Y, Liu Y, Chen H, Zang B. CFIMon: Detecting violation of control flow integrity using performance counters. In: Proc. of the
IEEE/IFIP Int’l Conf. on Dependable Systems and Networks (DSN 2012). Boston: IEEE, 2012. 1−12. [doi: 10.1109/DSN.2012.
6263958]
[15] Christoulakis N, Christou G, Athanasopoulos E, Christoulakis N, Ioannidis S. HCFI: Hardware-enforced control-flow integrity. In:
Proc. of the 6th ACM on Conf. on Data and Application Security and Privacy (CODASPY 2016). New Orleans: ACM, 2016. 38−49.
[doi: 10.1145/2857705.2857722]
[16] Das S, Zhang W, Liu Y. A fine-grained control flow integrity approach against runtime memory attacks for embedded systems.
IEEE Trans. on Very Large Scale Integration Systems, 2016,24(11):3193−3207. [doi: 10.1109/TVLSI.2016.2548561]
[17] He W, Das S, Zhang W, Liu Y. No-jump-into-basic-block: Enforce basic block CFI on the fly for real-world binaries. In: Proc. of
the 54th Annual Design Automation Conf. (DAC). Austin: ACM, 2017. 23:1−23:6. [doi: 10.1145/3061639.3062291]
[18] Davi LV, Dmitrienko A, Nürnberger S, Sadeghi AR. Gadge me if you can: Secure and efficient ad-hoc instruction-level
randomization for x86 and ARM. In: Proc. of the 8th ACM Symp. on Information, Computer and Communications Security
(ASIACCS 2013). Hangzhou: ACM, 2013. 299−310. [doi: 10.1145/2484313.2484351]
[19] Koo H, Polychronakis M. Juggling the gadgets: Binary-level code randomization using instruction displacement. In: Proc. of the
11th ACM Symp. on Information, Computer and Communications Security (ASIACCS 2016). Xi’an: ACM, 2016. 23−34. [doi: 10.
1145/2897845.2897863]
[20] Pappas V, Polychronakis M, Keromytis AD. Smashing the gadgets: Hindering return-oriented programming using in-place code
randomization. In: Proc. of the 2012 IEEE Symp. on Security and Privacy (SP). San Francisco: IEEE, 2012. 601−615. [doi: 10.
1109/SP.2012.41]
[21] Chen X, Bos H, Giuffrida C. CodeArmor: Virtualizing the code space to counter disclosure attacks. In: Proc. of the 2017 IEEE
European Symp. on Security and Privacy (EuroS&P 2017). Paris: IEEE, 2017. 514−529. [doi: 10.1109/EuroSP.2017.17]
[22] Sinha K, Kemerlis VP, Sethumadhavan S. Reviving instruction set randomization. In: Proc. of the IEEE Int’l Symp. on Hardware
Oriented Security and Trust. McLean: IEEE, 2017. 21−28. [doi: 10.1109/HST.2017.7951732]
[23] Schwartz EJ, Avgerinos T, Brumley D. Q: Exploit hardening made easy. In: Proc. of the 20th USENIX Conf. on Security. San
Francisco: USENIX Association, 2011. 25−25.
[24] Wilander J, Nikiforakis N, Younan Y, et al. RIPE: Runtime intrusion prevention evaluator. In: Proc. of the 27th Annual Computer
Security Applications Conf. (ACSAC). Orlando: ACM, 2011. 41−50. [doi: 10.1145/2076732.2076739]
李威威(1990-),男,博士生,主要研究领域 高伟毅(1992-),男,助理研究员,主要研究
为软件安全. 领域为图像识别,目标检测.
马越(1984-),男,博士,高级工程师,主要 杨秋松(1977-),男,博士,研究员,博士生
研究领域为形式化方法,系统安全. 导师,CCF 专业会员,主要研究领域为软件
工程,形式化方法,系统安全.
王俊杰(1987-),女,博士,副研究员,主要 李明树(1966-),男,博士,研究员,博士生
研究领域为智能软件工程. 导师,CCF 会士,主要研究领域为操作系统
深度设计(包括安全操作系统、数据操作
系统等),可信软件过程以及基础软硬件核
心技术与应用.