Page 222 - 《软件学报》2021年第8期
P. 222

2504                                   Journal of Software  软件学报 Vol.32, No.8,  August 2021

                 [110]    Hu H, Shinde S, Adrian S, et al. Data-oriented programming: On the expressiveness of non-control data attacks. In: Proc. of the
                      2016 IEEE Symp. on Security and Privacy (SP 2016). 2016. 969−986. [doi: 10.1109/SP.2016.62]
                 [111]    Castro M, Costa  M, Harris T.  Securing  software  by enforcing data-flow  integrity.  In:  Proc.  of  the 2006 USENIX Symp.  on
                      Operating Systems Design and Implementation (OSDI 2006). 2006. 147−160.
                 [112]    Chen P, Fang Y, Mao B, et al. JITDefender: A defense against JIT spraying attacks. In: Proc. of the Future Challenges in Security
                      and Privacy for Academia and Industry (SEC 2011). 2011. 142−153. [doi: 10.1007/978-3-642-21424-0_12]
                 [113]    Crane S, Liebchen C, Homescu A, et al. Readactor: Practical code randomization resilient to memory disclosure. In: Proc. of the
                      2015 IEEE Symp. on Security and Privacy (SP 2015). 2015. 763−780. [doi: 10.1109/SP.2015.52]
                 [114]    Mooji DJ. W^X JIT-code enabled in firefox. 2015. https://jandemooij.nl/blog/2015/12/29/wx-jit-code-enabled-in-firefox/
                 [115]    Chen P, Wu R, Mao B. JITSafe: A framework against Just-in-time spraying attacks. In: Proc. of the IET Information Security.
                      2013. 283−292. [doi: 10.1049/iet-ifs.2012.0142]
                 [116]    Frassetto T, Gens D, Liebchen C,  et  al. JITGuard: Hardening just-in-time  compilers  with  SGX. In: Proc. of the 2017 ACM
                      SIGSAC Conf. on Computer and Communications Security (CCS 2017). 2017. 2405−2419. [doi: 10.1145/3133956.3134037]
                 [117]    Maisuradze G, Backes M, Rossow C. What cannot be read, cannot be leveraged? Revisiting assumptions of JIT-ROP defenses. In:
                      Proc. of the 2016 USENIX Security Symp. (USENIX Security 2016). 2016. 139−156.
                 [118]    Niu B, Tan G. RockJIT:  Securing just-in-time compilation  using modular control-flow integrity.  In:  Proc.  of  the  2014  ACM
                      SIGSAC Conf. on Computer and Communications Security (CCS 2014). 2014. 1317−1328. [doi: 10.1145/2660267.2660281]
                 [119]    Goltzsche D, Wulf C, Muthukumaran D, et al. Trustjs: Trusted client-side execution of JavaScript. In: Proc. of the 2017 European
                      Workshop on Systems Security (EuroSec 2017). 2017. 1−6. [doi: 10.1145/3065913.3065917]
                 [120]    Eskandarian S, Cogan J, Birnbaum S, et al. Fidelius: Protecting user secrets from compromised browsers. In: Proc. of the 2019
                      IEEE Symp. on Security and Privacy (SP 2019). 2019. 264−280. [doi: 10.1109/SP.2019.00036]
                 [121]    West M. Play safely in sandboxed IFrames. 2013. https://www.html5rocks.com/en/tutorials/security/sandboxed-iframes/

                 附中文参考文献:
                 [97]  刘剑,苏璞睿,杨珉,等.软件与网络安全研究综述.软件学报,2018,29(1):42−68. http://www.jos.org.cn/1000-9825/5320.htm  [doi:
                     10.13328/j.cnki.jos.005320]



                              罗武(1994-),男,博士,主要研究领域为操                      吴鹏飞(1994-),男,博士,主要研究领域为
                              作系统与虚拟化安全,云计算,可信计算,                          分布式系统安全,隐私保护,大数据安全.
                              浏览器安全.



                              沈晴霓(1970-),女,博士,教授,博士生导                      董春涛(1991-),男,博士生,主要研究领域
                              师,CCF 高级会员,主要研究领域为操作系                        为分布式系统安全,云计算和大数据安全,
                              统与虚拟化安全,云计算和大数据安全与                           可信计算.
                              隐私,可信计算.


                              吴中海(1968-),男,博士,教授,博士生导                      夏玉堂(1989-),男,博士生,主要研究领域
                              师,CCF 杰出会员,主要研究领域为大数据                        为云计算和大数据安全,可信计算.
                              系统与分析,云计算和大数据安全,嵌入式
                              系统.
   217   218   219   220   221   222   223   224   225   226   227