Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
{teEther}: Gnawing at ethereum to automatically exploit smart contracts
Cryptocurrencies like Bitcoin not only provide a decentralized currency, but also provide a
programmatic way to process transactions. Ethereum, the second largest cryptocurrency …
programmatic way to process transactions. Ethereum, the second largest cryptocurrency …
Data-oriented programming: On the expressiveness of non-control data attacks
As control-flow hijacking defenses gain adoption, it is important to understand the remaining
capabilities of adversaries via memory exploits. Non-control data exploits are used to mount …
capabilities of adversaries via memory exploits. Non-control data exploits are used to mount …
Code-pointer integrity
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
Exploitation techniques for data-oriented attacks with existing and potential defense approaches
Data-oriented attacks manipulate non-control data to alter a program's benign behavior
without violating its control-flow integrity. It has been shown that such attacks can cause …
without violating its control-flow integrity. It has been shown that such attacks can cause …
Block oriented programming: Automating data-only attacks
With the widespread deployment of Control-Flow Integrity (CFI), control-flow hijacking
attacks, and consequently code reuse attacks, are significantly more difficult. CFI limits …
attacks, and consequently code reuse attacks, are significantly more difficult. CFI limits …
Where does it go? refining indirect-call targets with multi-layer type analysis
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …
However, indirect-calls also bring challenges to constructing a precise control-flow graph …
HDFI: Hardware-assisted data-flow isolation
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …
defense mechanisms are inadequate; in general, the software-based approaches are not …
Semfuzz: Semantics-based automatic generation of proof-of-concept exploits
Patches and related information about software vulnerabilities are often made available to
the public, aiming to facilitate timely fixes. Unfortunately, the slow paces of system updates …
the public, aiming to facilitate timely fixes. Unfortunately, the slow paces of system updates …
[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
Practical {Data-Only} attack generation
As control-flow hijacking is getting harder due to increasingly sophisticated CFI solutions,
recent work has instead focused on automatically building data-only attacks, typically using …
recent work has instead focused on automatically building data-only attacks, typically using …