Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Code-pointer integrity
V Kuznetzov, L Szekeres, M Payer, G Candea… - The Continuing Arms …, 2018 - dl.acm.org
In this chapter, we describe code-pointer integrity (CPI), a new design point that guarantees
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
the integrity of all code pointers in a program (eg, function pointers, saved return addresses) …
Finding the dwarf: recovering precise types from WebAssembly binaries
The increasing popularity of WebAssembly creates a demand for understanding and reverse
engineering WebAssembly binaries. Recovering high-level function types is an important …
engineering WebAssembly binaries. Recovering high-level function types is an important …
Fineibt: Fine-grain control-flow enforcement with indirect branch tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
Practical program modularization with type-based dependence analysis
K Lu - 2023 IEEE Symposium on Security and Privacy (SP), 2023 - ieeexplore.ieee.org
Today's software programs are bloating and have become extremely complex. As there is
typically no internal isolation among modules in a program, a vulnerability can be exploited …
typically no internal isolation among modules in a program, a vulnerability can be exploited …
CodeArmor: Virtualizing the code space to counter disclosure attacks
X Chen, H Bos, C Giuffrida - 2017 IEEE European Symposium …, 2017 - ieeexplore.ieee.org
Code diversification is an effective strategy to prevent modern code-reuse exploits.
Unfortunately, diversification techniques are inherently vulnerable to information disclosure …
Unfortunately, diversification techniques are inherently vulnerable to information disclosure …
Using logic programming to recover c++ classes and methods from compiled executables
EJ Schwartz, CF Cohen, M Duggan, J Gennari… - Proceedings of the …, 2018 - dl.acm.org
High-level C++ source code abstractions such as classes and methods greatly assist human
analysts and automated algorithms alike when analyzing C++ programs. Unfortunately …
analysts and automated algorithms alike when analyzing C++ programs. Unfortunately …
Typeminer: Recovering types in binary programs using machine learning
A Maier, H Gascon, C Wressnegger, K Rieck - Detection of Intrusions and …, 2019 - Springer
Closed-source software is a major hurdle for assessing the security of computer systems. In
absence of source code, it is particularly difficult to locate vulnerabilities and malicious …
absence of source code, it is particularly difficult to locate vulnerabilities and malicious …
Typesqueezer: When static recovery of function signatures for binary executables meets dynamic analysis
Control-Flow Integrity (CFI) is considered a promising solution in thwarting advanced code-
reuse attacks. While the problem of backward-edge protection in CFI is nearly closed …
reuse attacks. While the problem of backward-edge protection in CFI is nearly closed …
RevARM: A platform-agnostic ARM binary rewriter for security applications
ARM is the leading processor architecture in the emerging mobile and embedded market.
Unfortunately, there has been a myriad of security issues on both mobile and embedded …
Unfortunately, there has been a myriad of security issues on both mobile and embedded …
cfi: Type-assisted control flow integrity for x86-64 binaries
Programs aiming for low runtime overhead and high availability draw on several object-
oriented features available in the C/C++ programming language, such as dynamic object …
oriented features available in the C/C++ programming language, such as dynamic object …