Entry Philippaerts:2013:CMC from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Philippaerts:2013:CMC,
author = "Pieter Philippaerts and Yves Younan and Stijn Muylle
and Frank Piessens and Sven Lachmund and Thomas
Walter",
title = "{CPM}: Masking Code Pointers to Prevent Code Injection
Attacks",
journal = j-TISSEC,
volume = "16",
number = "1",
pages = "1:1--1:??",
month = jun,
year = "2013",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2487222.2487223",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Fri Jun 14 19:25:26 MDT 2013",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Code Pointer Masking (CPM) is a novel countermeasure
against code injection attacks on native code. By
enforcing the correct semantics of code pointers, CPM
thwarts attacks that modify code pointers to divert the
application's control flow. It does not rely on secret
values such as stack canaries and protects against
attacks that are not addressed by state-of-the-art
countermeasures of similar performance. This article
reports on two prototype implementations on very
distinct processor architectures, showing that the idea
behind CPM is portable. The evaluation also shows that
the overhead of using our countermeasure is very small
and the security benefits are substantial.",
acknowledgement = ack-nhfb,
articleno = "1",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- addressed,
1(1)3,
13(4)31,
13(4)32,
13(4)36,
15(2)10,
17(3)9
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2,
18(2)7
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)2,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)2,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- architecture,
2(2)177,
2(3)269,
4(3)289,
8(2)187,
10(4)6,
11(1)2,
11(1)3,
13(4)37,
14(1)3,
15(1)2,
15(3)13,
16(2)5,
16(3)11,
17(2)8,
18(2)8
- art, state-of-the-,
16(2)8
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- behind,
15(4)16,
18(1)1
- benefit,
9(2)181,
9(4)461,
10(1)3,
10(3)11,
10(4)4,
11(4)20,
11(4)23,
12(2)13,
13(4)31,
14(1)7,
14(1)9,
16(3)11
- code,
5(3)238,
6(2)258,
11(4)23,
12(2)10,
12(2)11,
12(3)14,
12(3)19,
13(1)10,
13(2)17,
13(3)21,
15(1)2,
15(1)3,
15(2)10,
16(2)6,
16(2)7,
16(3)9,
18(4)12
- correct,
10(2)6,
13(3)27,
15(2)10,
15(3)11,
17(2)7
- countermeasure,
12(2)12,
17(2)6,
18(1)2,
18(1)4
- distinct,
13(4)35,
17(2)5
- do,
2(3)230,
2(3)269,
9(4)421,
10(4)1,
11(1)4,
11(2)2,
11(4)19,
12(1)3,
12(2)10,
13(2)13,
13(4)33,
13(4)35,
14(3)23,
14(3)27,
14(4)28,
16(3)12,
16(4)13,
17(1)1,
18(3)9
- enforcing,
1(1)26,
2(1)34,
10(2)5,
12(2)8,
13(1)6,
13(3)21,
14(3)25,
14(4)31,
17(1)3
- evaluation,
2(3)295,
3(4)262,
10(1)3,
11(1)3,
11(4)20,
11(4)22,
12(2)8,
12(2)11,
12(4)20,
13(2)14,
13(3)24,
13(3)25,
16(1)2,
16(3)9,
16(4)13,
16(4)17,
17(4)14,
18(1)1
- flow,
1(1)26,
1(1)93,
10(2)7,
12(1)5,
12(2)11,
13(3)26,
14(3)24,
15(1)2,
16(2)6,
18(2)8
- idea,
1(1)93,
10(3)9,
12(1)2,
12(2)11,
14(1)4,
15(1)4,
16(2)7
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)2,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- injection,
12(2)11,
13(2)14,
14(1)13,
16(4)13,
17(4)16
- masking,
14(1)3
- modify,
2(2)159,
14(1)8,
17(4)13
- native,
16(2)7,
16(3)9
- not,
1(1)26,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(4)390,
9(4)421,
10(1)3,
10(4)2,
11(1)3,
11(1)4,
11(2)2,
11(2)4,
11(2)5,
11(3)12,
11(3)13,
11(3)15,
11(3)16,
11(4)19,
11(4)20,
11(4)22,
12(1)1,
12(1)2,
12(1)3,
12(1)6,
12(2)10,
12(2)11,
12(2)13,
12(3)14,
12(4)22,
13(1)10,
13(3)28,
13(4)33,
13(4)35,
13(4)36,
13(4)37,
13(4)39,
13(4)40,
14(3)23,
14(3)27,
14(4)28,
14(4)29,
14(4)31,
15(2)6,
15(2)9,
15(2)10,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)9,
16(3)12,
16(4)13,
16(4)15,
16(4)16,
17(1)2,
17(3)10,
17(4)15,
18(1)1,
18(3)9,
18(4)13
- novel,
2(3)269,
9(4)461,
10(1)4,
10(3)12,
11(1)2,
11(1)3,
11(2)2,
11(4)18,
11(4)19,
12(1)4,
12(3)16,
14(1)5,
15(1)4,
16(4)16,
17(1)2,
17(3)9,
17(4)14,
18(1)4,
18(4)12
- of-the-art, state-,
16(2)8
- overhead,
2(3)269,
11(2)5,
11(4)18,
11(4)23,
12(2)8,
12(3)14,
13(3)25,
14(1)5,
15(2)6,
15(2)9,
16(2)6,
16(2)7,
16(3)9,
16(3)11,
17(3)10,
17(4)15,
18(3)11,
18(4)12
- performance,
1(1)3,
1(1)26,
1(1)66,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
10(4)4,
11(1)2,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)35,
13(4)38,
14(1)3,
15(1)4,
16(2)6,
16(2)8,
16(3)9,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- pointer,
12(2)10
- prevent,
2(4)354,
13(1)10,
13(4)37,
14(1)11,
14(3)27,
15(1)2,
15(2)10,
16(1)3
- processor,
2(3)332
- protect,
2(3)332,
11(1)3,
12(3)15,
13(3)22,
13(3)28,
13(4)32,
15(4)18,
16(2)6,
17(1)4,
17(3)10,
18(1)1
- prototype,
1(1)3,
2(1)34,
10(1)4,
10(4)4,
11(1)2,
11(1)3,
11(4)18,
12(1)4,
12(2)13,
13(4)30,
14(1)3,
16(2)6,
17(2)5
- rely,
10(4)3,
10(4)6,
11(2)6,
12(1)3,
13(4)38,
14(1)9,
15(1)3,
16(4)13,
16(4)14,
18(1)2
- report,
10(1)4,
10(4)4,
13(3)24,
16(4)14,
17(2)5
- secret,
8(3)259,
9(4)461,
10(3)10,
13(4)34,
14(1)4,
14(4)28,
16(4)15,
18(1)1
- semantic,
1(1)93,
10(2)8,
10(4)2,
11(4)21,
12(2)13,
12(3)14,
13(2)12,
13(3)21,
13(4)36,
14(3)25,
15(3)13,
16(2)7,
17(1)2,
17(1)3,
17(2)7
- showing,
2(2)138,
11(3)14,
13(3)27,
17(3)9
- similar,
9(4)391,
10(4)1,
11(4)18,
13(1)10,
17(1)1,
17(1)2
- small,
2(3)295,
10(3)11,
10(4)3,
10(4)5,
12(1)6,
12(3)15,
12(3)16,
12(3)18,
12(4)21,
14(1)12,
15(1)3,
15(1)4,
15(4)15,
17(4)15,
18(2)5
- stack,
13(1)10
- state-of-the-art,
16(2)8
- substantial,
12(3)18,
14(1)14
- the-art, state-of-,
16(2)8
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
10(4)4,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- value,
10(3)10,
10(4)1,
10(4)4,
11(2)5,
11(4)18,
12(1)6,
12(2)10,
13(1)10,
14(1)9,
14(1)14,
15(1)4,
15(2)9,
15(4)17,
17(3)10,
18(1)1,
18(2)5,
18(3)10
- very,
1(1)3,
2(1)65,
2(3)269,
10(4)1,
11(2)5,
11(3)14,
11(4)18,
13(3)22,
13(3)27,
14(1)2,
15(1)2,
15(3)12,
16(3)11,
16(4)13,
17(3)10,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)12,
18(4)14