Affiliation:
1. NTT Secure Platform Laboratories
2. Institute of Industrial Science, The University of Tokyo
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Artificial Intelligence,Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Hardware and Architecture,Software
Reference37 articles.
1. [1] H. Shacham, “The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86),” Proc. 14th ACM Conference on Computer and Communications Security (CCS '07), pp.552-561, ACM, 2007. 10.1145/1315245.1315313
2. [2] Sophos, “Office exploit generators.” https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/sophos-office-exploit-generators-szappanos.pdf. (accessed: 2020-01-07).
3. [3] McAfee, “Threadkit exploit kit.” https://www.mcafee.com/enterprise/ja-jp/threat-center/threat-landscape-dashboard/exploit-kits-details.threadkit-exploit-kit.html. (accessed: 2020-01-07).
4. [4] Z. Tzermias, G. Sykiotakis, M. Polychronakis, and E.P. Markatos, “Combining static and dynamic analysis for the detection of malicious documents,” Proc. Fourth European Workshop on System Security (EUROSEC '11), pp.1-6, ACM, 2011. 10.1145/1972551.1972555
5. [5] B. Stancill, K.Z. Snow, N. Otterness, F. Monrose, L. Davi, and A.-R. Sadeghi, “Check my profile: Leveraging static analysis for fast and accurate detection of rop gadgets,” Lecture Notes in Computer Science, vol.8145 (Proc. 16th International Symposium on Research in Attacks, Intrusions, and Defenses (RAID '13)), pp.62-81, Springer, 2013. 10.1007/978-3-642-41284-4_4
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献