[1]胡钋, 李莉莉. 智能电网的信息物理安全综述[J]. 信息安全研究, 2019, 5(12): 10681075[2]Avgerinos T, Sang K C, Rebert A, et al. Automatic exploit generation[J]. Communications of the ACM, 2014, 57(2): 7484[3]Yan S, Wang R, Salls C, et al. SOK: (State of) The art of war: Offensive techniques in binary analysis[C] Proc of 2016 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2016: 138157[4]Cha S K, Avgerinos T, Rebert A, et al. Unleashing mayhem on binary code[C] Proc of 2012 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2012: 380394[5]Bao T, Wang R, Yan S, et al. Your exploit is mine: Automatic shellcode transplant for remote exploits[C] Proc of 2017 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2017: 824839[6]Newsome J. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software[J]. Chinese Journal of Engineering Mathematics, 2005, 29(5): 720724[7]Jones R E, Lins R D. Garbage Collection: Algorithms for Automatic Dynamic Memory Management[M]. USA: Wiley, 1996: 141[8]Szekeres L, Payer M, Wei T, et al. SOK: Eternal war in memory[C] Proc of 2013 IEEE Symp Security and Privacy. Piscataway, NJ: IEEE, 2013: 4862[9]Lhee K S, Chapin S J. Buffer overflow and format string overflow vulnerabilities[J]. Software: Practice and Experience, 2003, 33(5): 423460[10]Gloger W. Ptmalloc[EBOL]. (20060605) [20200525]. http:www.malloc.deen[11]Blomgren M. Introduction to Shellcoding: How to exploit buffer overflows[EBOL]. 2004 [20200525]. http:tigerteam.sedlpapersintro_to_shellcoding.pdf[12]Silberman P, Johnson R. A comparison of buffer overflow prevention implementation sand weaknesses[EBOL]. 2004 [20200530]. https:www.blackhat.compresentationsbhusa04bhus04silbermanbhus04silbermanpaper.pdf[13]Roemer R, Buchanan E, Shacham H, et al. Returnoriented programming: Systems, languages, and applications[J]. ACM Trans on Information and System Security, 2012, 15(1): 134[14]Team P X. PaX address space layout randomization (ASLR)[EBOL]. 2006 [20200530]. https:pax.grsecurity.netdocsaslr.txt[15]Tuexen M, Risso F, Bongertz J, et al. PCAP next generation (PCAPNG) dump file format[EBOL]. (20140626) [20200531]. https:datatracker.ietf.orgdochtmldrafttuexenopswgpcapng[16]Jacobson V, Leres C, McCanne S. The tcpdump manual page[EBOL]. (20220117) [20220312]. https:www.tcpdump.orgmanpagestcpdump.1.html |