skip to main content
10.1145/3469213.3471315acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicaiisConference Proceedingsconference-collections
research-article

Research on SSTI attack defense technology based on instruction set randomization

Authors Info & Claims
Published:18 August 2021Publication History
First page image

References

  1. M.Y. Ma, L.W. Chen, D. Meng. A Survey of Memory Corruption Attack and Defense[J]. Journal of Cyber Security, 2017, 2(4):. 82-98.Google ScholarGoogle Scholar
  2. F.F. Wang, T. Zhang, W.G. Xu, Overview of control-flow hi-jacking attack and defense techniques for process[J]. Chinese Journal of Network and Information Security, 2019, 5(6): 10-20.Google ScholarGoogle Scholar
  3. Kc G S, Keromytis A D, Prevelakis V. Countering Code-injection Attacks with Instruction-set Randomization[C]. The 10th ACM conference on Computer and communication security, 2003: 272-280.Google ScholarGoogle Scholar
  4. Keromytis A D. Randomized Instruction Sets and Runtime Envi-ronments Past Research and Future Directions[J]. IEEE Security & Privacy Magazine, 2009, 7(1): 18-25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Du, H. Shu, F. Kang. Design and implementation of hard-ware-based dynamic instruction set randomization frame-work[J]. Chinese Journal of Network and Information Security, 2017, 3(11): 29-39.Google ScholarGoogle Scholar
  6. Barrantes E G, Ackley D H, Palmer T S, Randomized In-struction Set Emulation to Disrupt Binary Code Injection At-tacks[C]. The 10th ACM conference on Computer and communi-cation security, 2003: 281-289.Google ScholarGoogle Scholar
  7. T. Liu, G. Shi, D. Meng. A Survey of Code Reuse Attack and De-fense Mechanisms[J]. Journal of Cyber Security, 2016, 1(2): 15-27.Google ScholarGoogle Scholar
  8. X.D. Qiao, R.X. Guo, Y. Zhao. Research progress in code reuse at-tacking and defending[J]. Chinese Journal of Network and Infor-mation Security, 2018,4(3): 1-12Google ScholarGoogle Scholar
  9. W. Wu, W. Huo, W. Zou. Survey on Attacking and Defending Technologies of Dynamic Code Generation[J]. Journal of Cyber Security, 2016, 1(4): 52-64.Google ScholarGoogle Scholar
  10. G.M. Zhang, Q.B. Li, G.Y. Zeng, Defensing Code Reuse Attacks Using Live Code Randomization[J]. Journal of Soft-ware, 2019, 30(9): 2772-2790.Google ScholarGoogle Scholar
  11. Boyd S W, Keromytis A D. SQLrand: Preventing SQL Injection Attacks[M]. Applied Cryptography and Network Security. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004: 292-30.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems
    May 2021
    2053 pages
    ISBN:9781450390200
    DOI:10.1145/3469213

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 18 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)31
    • Downloads (Last 6 weeks)3

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format