{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T13:06:32Z","timestamp":1746536792436},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642214233"},{"type":"electronic","value":"9783642214240"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21424-0_12","type":"book-chapter","created":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T11:52:47Z","timestamp":1308138767000},"page":"142-153","source":"Crossref","is-referenced-by-count":12,"title":["JITDefender: A Defense against JIT Spraying Attacks"],"prefix":"10.1007","author":[{"given":"Ping","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yi","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Mao","sequence":"additional","affiliation":[]},{"given":"Li","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Google chrome 0.2.149.27 \u2019saveas\u2019 function buffer overflow vulnerability, http:\/\/seclists.org\/bugtraq\/2008\/Sep\/70"},{"key":"12_CR2","unstructured":"KVM, www.linux-kvm.org\/"},{"key":"12_CR3","unstructured":"QEMU, http:\/\/wiki.qemu.org\/Main_Page"},{"key":"12_CR4","unstructured":"The Webkit open source project, webkit.org\/"},{"key":"12_CR5","unstructured":"x86 shellcode detection and emulation, http:\/\/libemu.mwcollect.org\/"},{"key":"12_CR6","unstructured":"The Pax project (2004), http:\/\/pax.grsecurity.net\/"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1145\/1102120.1102165","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)","author":"M. Abadi","year":"2005","unstructured":"Abadi, M., Budiu, M., Ligatti, J.: Control-flow integrity. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pp. 340\u2013353. ACM, New York (2005)"},{"key":"12_CR8","unstructured":"Bania, P.: JIT spraying and mitigations (2010), http:\/\/arxiv.org\/abs\/1009.1038"},{"key":"12_CR9","unstructured":"Bhatkar, E., Duvarney, D.C., Sekar, R.: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, pp. 105\u2013120 (2003)"},{"key":"12_CR10","unstructured":"Blazakis, D.: Interpreter exploitation. In: Proceedings of tth USENIX Workshop on Offensive Technologies (WOOT 2010), pp. 1\u20139 (2010)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Kolbitsch, C., Holz, T., Kruegel, C., Kirda, E.: Inspector gadget: Automated extraction of proprietary gadgets from malware binaries. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, pp 29\u201344 (2010)","DOI":"10.1109\/SP.2010.10"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Caballero, J., Johnson, N.M., McCamant, S., Song, D.: Binary code extraction and interface identification for security applications. In: Proceedings of the 17th Annual Network and Distributed System Security Symposium (2010)","DOI":"10.21236\/ADA538737"},{"key":"12_CR13","first-page":"11","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation","author":"M. Castro","year":"2006","unstructured":"Castro, M., Costa, M., Harris, T.: Securing software by enforcing data-flow integrity. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, vol.\u00a07, p. 11. USENIX Association, Berkeley (2006)"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-642-02918-9_6","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"M. Egele","year":"2009","unstructured":"Egele, M., Wurzinger, P., Kruegel, C., Kirda, E.: Defending browsers against drive-by downloads: Mitigating heap-spraying code injection attacks. In: Flegel, U., Bruschi, D. (eds.) DIMVA 2009. LNCS, vol.\u00a05587, pp. 88\u2013106. Springer, Heidelberg (2009)"},{"key":"12_CR15","first-page":"6","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation","author":"U. Erlingsson","year":"2006","unstructured":"Erlingsson, U., Valley, S., Abadi, M., Vrable, M., Budiu, M., Necula, G.C.: XFI: Software guards for system address spaces. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, vol.\u00a07, p. 6. USENIX Association, Berkeley (2006)"},{"key":"12_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-11747-3_1","volume-title":"Engineering Secure Software and Systems","author":"F. Gadaleta","year":"2010","unstructured":"Gadaleta, F., Younan, Y., Joosen, W.: BuBBle: A javascript engine level countermeasure against heap-spraying attacks. In: Massacci, F., Wallach, D., Zannone, N. (eds.) ESSoS 2010. LNCS, vol.\u00a05965, pp. 1\u201317. Springer, Heidelberg (2010)"},{"key":"12_CR17","unstructured":"de Groef, W., Nikiforakis, N., Younan, Y., Piessens, F.: Jitsec: Just-in-time security for code injection attacks. In: Benelux Workshop on Information and System Security (WISSEC 2010), pp. 1\u201315 (2010)"},{"key":"12_CR18","unstructured":"Google Inc.: V8 javascript engine, code.google.com\/apis\/v8\/intro.html"},{"key":"12_CR19","unstructured":"Payer, M.: I control your code attack vectors through the eyes of software-based fault isolation. In: 27C3 (2010)"},{"key":"12_CR20","unstructured":"Ratanaworabhan, P., Livshits, B., Zorn, B.: Nozzle: A defense against heap-spraying code injection attacks. In: Proceedings of 18th USENIX Security Symposium (2009)"},{"key":"12_CR21","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1145\/1315245.1315313","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)","author":"H. Shacham","year":"2007","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pp. 552\u2013561. ACM, New York (2007)"},{"key":"12_CR22","unstructured":"Sintsov, A.: JIT spraying attack on safari, http:\/\/www.exploit-db.com\/exploits\/12614\/"},{"key":"12_CR23","unstructured":"Sintsov, A.: Oracle document capture (easymail objects emsmtp.dll 6.0.1) activex control bof - JIT-spray exploit, http:\/\/dsecrg.com\/files\/exploits\/QuikSoft-reverse.zip"},{"key":"12_CR24","unstructured":"Sintsov, A.: SAP GUI 7.10 webviewer3d Activex - JIT-spray exploit, http:\/\/dsecrg.com\/files\/exploits\/SAP-Logon7-System.zip"},{"key":"12_CR25","unstructured":"Sintsov, A.: JIT-spray attacks & advanced shellcode (2010), http:\/\/dsecrg.com\/files\/pub\/pdf\/HITB%20-%20JIT-Spray%20Attacks%20and%20Advanced%20Shellcode.pdf"},{"key":"12_CR26","unstructured":"Sintsov, A.: Writing JIT-spray shellcode for fun and profit. In: Technical Report of Digital Security (2010)"},{"key":"12_CR27","first-page":"738","volume-title":"CCS 2010 Poster","author":"W. Tao","year":"2010","unstructured":"Tao, W., Tielei, W., Lei, D., Jing, L.: Secure dynamic code generation against spraying. In: CCS 2010 Poster, pp. 738\u2013740. ACM, New York (2010)"},{"key":"12_CR28","unstructured":"Wang, T.: Integer overflow on QEMU, http:\/\/lists.nongnu.org\/archive\/html\/qemu-devel\/2008-08\/msg01052.html"},{"key":"12_CR29","unstructured":"Wikipedia: Heap spraying (2010), http:\/\/en.wikipedia.org\/wiki\/Heap_spraying"}],"container-title":["IFIP Advances in Information and Communication Technology","Future Challenges in Security and Privacy for Academia and Industry"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21424-0_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:03:31Z","timestamp":1606187011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21424-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642214233","9783642214240"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21424-0_12","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}