Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits

@inproceedings{Bhatkar2003AddressOA,
  title={Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits},
  author={Sandeep Bhatkar and Daniel C. DuVarney and R. Sekar},
  booktitle={USENIX Security Symposium},
  year={2003}
}
Attacks which exploit memory programming errors (such as buffer overflows) are one of today’s most serious security threats. These attacks require an attacker to have an in-depth understanding of the internal details of a victim program, including the locations of critical data and/or code. Program obfuscation is a general technique for securing programs by making it difficult for attackers to acquire such a detailed understanding. This paper develops a systematic study of a particular kind of… CONTINUE READING
Highly Influential
This paper has highly influenced 46 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 595 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 390 extracted citations

New Exploit Methods against Ptmalloc of GLIBC

2016 IEEE Trustcom/BigDataSE/ISPA • 2016
View 7 Excerpts
Highly Influenced

Automatic Generation of Data-Oriented Exploits

View 6 Excerpts
Highly Influenced

Network and System Security

Lecture Notes in Computer Science • 2013
View 19 Excerpts
Highly Influenced

Binary stirring: self-randomizing instruction addresses of legacy x86 binary code

ACM Conference on Computer and Communications Security • 2012
View 20 Excerpts
Highly Influenced

Too much PIE is bad for performance

Mathias Payermathias
2012
View 9 Excerpts
Highly Influenced

595 Citations

0204060'03'06'10'14'18
Citations per Year
Semantic Scholar estimates that this publication has 595 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 32 references

Transparent Run-Time Defense Against Stack-Smashing Attacks

USENIX Annual Technical Conference, General Track • 2000
View 4 Excerpts
Highly Influenced

Benign software mutations: A novel approach to protect against large-scale network attacks. Center for Cybersecurity White Paper (prepared for Airforce

Daniel C. DuVarney, R. Sekar, Yow-Jian Lin
Office of Scientific Research), • 2002
View 1 Excerpt

Big loop integer protection

Oded Horovitz
2002
View 1 Excerpt

Cyclone: A Safe Dialect of C

USENIX Annual Technical Conference, General Track • 2002
View 1 Excerpt

Mitigating buffer overflows by operating system randomization

Monica Chew, Dawn Song
Technical Report CMU-CS-02-197, • 2002
View 2 Excerpts

Similar Papers

Loading similar papers…