JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM ›› 2018, Vol. 41 ›› Issue (6): 1-6,13.doi: 10.13190/j.jbupt.2018-017
• Papers • Next Articles
A Protection Framework for Android Native Code Based on CFI
ZHANG Wen1, LIU Wen-ling2, LI Hui2, CHEN Ze2, NIU Shao-zhang1
- 1. Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing 100876, China;
2. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
-
Received:
2018-01-15Online:
2018-12-28Published:
2018-12-24
CLC Number:
Cite this article
ZHANG Wen, LIU Wen-ling, LI Hui, CHEN Ze, NIU Shao-zhang. A Protection Framework for Android Native Code Based on CFI[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2018, 41(6): 1-6,13.
share this article
Add to citation manager EndNote|Ris|BibTeX
URL: https://journal.bupt.edu.cn/EN/10.13190/j.jbupt.2018-017
[1] Abadi M, Budiu M, Erlingsson U, et al. A theory of secure control flow[C]//International Conference on Formal Engineering Methods and Software Engineering. Berlin:Springer, 2005:111-124. [2] Abadi M, Budiu M, Erlingsson U, et al. Control-flow integrity[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security. New York:ACM, 2005:340-353. [3] Abadi M, Budiu M, Erlingsson U, et al. Control-flow integrity principles, implementations, and applications[J]. ACM Transactions on Information and System Security, 2009, 13(1):4. [4] Zhang Chao, Wei Tao, Chen Zhaofeng, et al. Practical control flow integrity and randomization for binary executables[C]//IEEE Symposium on Security and Privacy (SP). New York:IEEE Press, 2013:559-573. [5] Zhang Mingwei, Sekar R. Control flow integrity for COTS binaries[C]//Proceedings of USENIX Conference on Security. Berkeley:USENIX Association, 2013:337-352. [6] Zhang Mingwei, Sekar R. Control flow and code integrity for COTS binaries:An effective defense against real-world ROP attacks[C]//Proceedings of the 31st Annual Computer Security Applications Conference. New York:ACM, 2015:91-100. [7] Göktas E, Athanasopoulos E, Bos H, et al. Out of control:Overcoming control-flow integrity[C]//IEEE Symposium on Security and Privacy (SP). New York:IEEE Press, 2014:575-589. [8] Mashtizadeh A J, Bittau A, Boneh D, et al. CCFI:cryptographically enforced control flow integrity[C]//22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). New York:ACM, 2015:941-951. [9] Niu Ben, Tan Gang. RockJIT:securing just-in-time compilation using modular control-flow integrity[C]//Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2014:1317-1328. [10] Criswell J, Dautenhahn N, Adve V. KCoFI:complete control-flow integrity for commodity operating system kernels[C]//IEEE Symposium on Security and Privacy (SP). New York:IEEE Press, 2014:292-307. [11] van der Veen V, Andriesse D, Gökta?, et al. Practical context-sensitive CFI[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2015:927-940. [12] Mohan V, Larsen P, Brunthaler S, et al. Opaque control-flow integrity[C]//Proc of the 22nd Network and Distributed System Security Symposium. Washington, DC:Internet Society, 2015. [13] Wang Minghua, Yin Heng, Bhaskar A V, et al. Binary code continent:finer-grained control flow integrity for stripped binaries[C]//Proceedings of the 31st Annual Computer Security Applications Conference. New York:ACM, 2015:331-340. [14] Ge Xinyang, Talele N, Payer M, et al. Fine-grained control-flow integrity for kernel software[C]//IEEE European Symposium on Security and Privacy (EuroS&P). New York:IEEE Press, 2016:179-194. [15] Davi L, Dmitrienko A, Egele M, et al. MoCFI:a framework to mitigate control-flow attacks on smartphones[C]//Annual Network and Distributed System Security Symposium, San Diego, February 2012. [16] Pewny J, Holz T. Control-flow restrictor:compiler-based CFI for iOS[C]//Proceedings of the 29th Annual Computer Security Applications Conference. New York:ACM, 2013:309-318. [17] Tice C, Roeder T, Collingbourne P, et al. Enforcing forward-edge control-flow integrity in GCC & LLVM[C]//Proceedings of USENIX Conference on Security. Berkeley:USENIX Association, 2014, 26:27-40. [18] Payer M, Barresi A, Gross T R. Fine-grained control-flow integrity through binary hardening[C]//International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Berlin:Springer, 2015:144-164. |
[1] | ZHANG Chenyu, WEN Xiangming, CHEN Yawen. High-Precision and Low-Cost Timing Method of Mobile Cellular Network [J]. Journal of Beijing University of Posts and Telecommunications, 2023, 46(1): 103-108. |
[2] | . Intent-driven Demand-aware Resource Service in Autonomous Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(6): 85-91. |
[3] | CHU Xing-he, LU Zhao-ming, WANG Lu-han, WU Mu-qing, WEN Xiang-ming. Multi-Path Assisted Cooperative Radio-Based Localization for Connected Vehicles [J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 116-123. |
[4] | ZHANG Tian-kui, WANG Xiao-fei, YANG Li-wei, YANG Ding-cheng. A SFC Deployment and Computation Resource Allocation Joint Algorithm in Mobile Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(1): 7-13. |
[5] | Lü Ting-jie, SONG Luo-na, TENG Ying-lei, FENG Ye-yuan. The Architecture Design and Evaluation Method for Eco-Sustainabability Oriented Next Generation Communication Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 18-26,35. |
[6] | HE Jian-hua, ZHAO Hui, XU Xiao-bin, YAN Lei, WANG Shang-guang. Data Collection Method of Space-Based Internet of Things Based on Improved Double Level Distributed LT Code [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 118-125. |
[7] | MA Lu, LIU Ming, LI Chao, LU Zhao-ming, MA Huan. A Cloud-Edge Collaborative Computing Task Scheduling Algorithm for 6G Edge Networks [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 66-73. |
[8] | GUAN Wan-qing, ZHANG Hai-jun, LU Zhao-ming. Intelligent Resource Allocation Algorithm for 6G Multi-Tenant Network Slicing Based on Deep Reinforcement Learning [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(6): 132-139. |
[9] | LUO Yi, WANG Yu-ting, SHI Rong-hua, YAN Meng-chun, ZENG Hao. Secrecy Outage Probability Analysis of Underlay Cognitive Cooperative Relay Network with Energy Harvesting [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(3): 105-111,124. |
[10] | LI Jun-yao, CHANG Yong-yu, ZENG Tian-yi. Channel Correlation Based LOS/NLOS Identification for 3D Massive MIMO Systems [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 1-7. |
[11] | JIANG Fang, ZHANG Nan-fei, HU Yan-jun, WANG Yi. BP Neural Network Based CSI Device-Free Target Classification Method [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 40-45. |
[12] | REN Jia-zhi, TIAN Hui, NIE Gao-feng. Proactive Caching Scheme with Local Content Popularity Prediction [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 80-91. |
[13] | XU Jiu-yun, SUN Zhong-shun, ZHANG Ru-ru. Mobile Phone Energy Saving Based on Link Prediction [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 8-13,27. |
[14] | LI Xiao-hui, DU Yang-fan, SHI Xiao-zhu, YANG Xu. NLOS Ranging Error Compensation Algorithm Based on Fuzzy Association Channel Identification [J]. Journal of Beijing University of Posts and Telecommunications, 2020, 43(1): 21-27. |
[15] | LI Peng, WANG De-yong, SHI Wen-xi, JIANG Zhi-guo. Research on Person Re-Identification Based on Deep Learning under Big Data Environment [J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2019, 42(6): 29-34. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||