[1] McDonald J. Defeating Solaris/SPARC non-executable stack protection[J]. Bugtraq, 1999.
[2] Buchanan E, Roemer R, Shacham H, et al. When good instructions go bad: generalizing return-oriented programming to RISC[C]//Proceedings of the 15th ACM conference on Computer and Communications Security. New York: ACM, 2008: 27-38.
[3] Roglia G F, Martignoni L, Paleari R, et al. Surgically returning to randomized lib (c)[C]//25th Amual Computer Security Applications Conference. Honolulu: IEEE, 2009: 60-69.
[4] 吴咏, 汪晓茵, 刘凤霞. Linux系统缓冲区溢出防护技术[J]. 保密科学技术, 2012(5): 21-25. Wu Yong, Wang Xiaoyin, Liu Fengxia. Buffer overflow protection technology of Linux system[J]. Secrecy Science and Technology, 2012(5): 21-25.
[5] Bulba K. Bypassing stackguard and stackshield[J]. Phrack, 2000, 10(56).
[6] Bittau A, Belay A, Mashtizadeh A, et al. Hacking blind[C]//2014 IEEE Symposium on Security and Privacy. San Jose: IEEE, 2014: 227-242.
[7] Gutterman Z, Pinkas B, Reinman T. Analysis of the linux random number generator[C]//2006 IEEE Symposium on Security and Privacy. Berkeley/Oakland: IEEE, 2006: 371-385.
[8] 俞甲子, 石凡, 潘爱民. 程序员的自我修养[M].北京: 电子工业出版社, 2009: 175-176. |