A static recognition mechanism for indirect call based on static single assignment

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

By preventing attacks which exploit stack buffer overflow vulnerabilities, address space layout randomization is an effective way for embedded systems protection. However, ASLR will probably suffer exhaustive attacks because the pertinence is not strong. At present only coarse-grained randomization has been implemented because one of the key bottlenecks for fine-grained randomization is the dependencies between functions cannot be constructed completely due to indirect calls. As a result, we give a static inter-procedural backtracking recognition mechanism in this paper by using intermediate code analysis technologies to identify the destination addresses of indirect callings generated by function pointers. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Gao, S., Zheng, T., Zhan, X., Tao, X., Zhu, Q., Xie, J., & Bai, W. (2014). A static recognition mechanism for indirect call based on static single assignment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8351 LNCS, pp. 110–117). Springer Verlag. https://doi.org/10.1007/978-3-319-09265-2_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free