Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.
Eitaro ShiojiYuhei KawakoyaMakoto IwamuraTakeo HariuPublished in: ACSAC (2012)
Keyphrases
- code reuse
- source code
- static analysis
- program understanding
- malicious code
- software engineering
- java card
- software evolution
- error correcting codes
- programs written
- software systems
- software maintenance
- open source
- computer programs
- java programs
- design patterns
- program code
- network intrusion detection systems
- detect malicious
- countermeasures
- software projects
- dynamic analysis
- privacy preserving
- software development
- detecting malicious
- rough sets
- data mining
- fault localization
- case study
- high level
- malicious activities
- fuzzy sets
- real world
- multi agent
- granular computing
- business process
- databases