By preventing attacks which exploit stack buffer overflow vulnerabilities, address space layout randomization is an effective way for embedded systems protection. However, ASLR will probably suffer exhaustive attacks because the pertinence is not strong. At present only coarse-grained randomization has been implemented because one of the key bottlenecks for fine-grained randomization is the dependencies between functions cannot be constructed completely due to indirect calls. As a result, we give a static inter-procedural backtracking recognition mechanism in this paper by using intermediate code analysis technologies to identify the destination addresses of indirect callings generated by function pointers. © 2014 Springer International Publishing.
CITATION STYLE
Gao, S., Zheng, T., Zhan, X., Tao, X., Zhu, Q., Xie, J., & Bai, W. (2014). A static recognition mechanism for indirect call based on static single assignment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8351 LNCS, pp. 110–117). Springer Verlag. https://doi.org/10.1007/978-3-319-09265-2_12
Mendeley helps you to discover research relevant for your work.