MAN Yujia, YIN Qing, ZHU Xiaodong. Fine-grained data randomization technique based on field-sensitive pointer analysis[J]. Journal of Computer Applications, 2016, 36(6): 1567-1572.
[1] PORTOKALIDIS G, KEROMYTIS A D. Fast and practical instruction-set randomization for commodity systems[C]//Proceedings of the 26th Annual Computer Security Applications Conference. New York: ACM, 2010: 41-48. [2] JAJODIA S, GHOSH A K, SWARUP V, et al. Moving target defense:creating asymmetric uncertainty for cyber threats[M]. Berlin: Springer, 2011: 49-76. [3] GIUFFRIDA C, KUIJSTEN A, TANENBAUM A S. Enhanced operating system security through efficient and fine-grained address space randomization[C]//Security'12: Proceedings of the 21st USENIX Conference on Security Symposium. Berkeley: USENIX Association, 2012: 40. [4] LI L X, JUST J E, SEKAR R. Address-space randomization for windows systems[C]//ACSAC'06: Proceedings of the 200622nd Annual Computer Security Applications Conference. Piscataway, NJ: IEEE, 2006: 329-338. [5] BHATKAR S, SEKAR R. Data space randomization[C]//DIMVA 2008: Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, LNCS 5137. Berlin: Springer, 2008: 1-22. [6] CADAR C, AKRITIDIS P, COSTA M, et al. Data randomization[EB/OL].[2015-10-18]. http://research.microsoft.com/en-us/um/people/mcastro/publications/tr-2008-120.pdf. [7] SRIDHARAN M, CHANDRA S, DOLBY J, et al. Alias analysis for object-oriented programs[M]//Aliasing in Object-Oriented Programming. Berlin: Springer, 2013: 196-232. [8] NASRE R, GOVINDARAJAN R. Prioritizing constraint evaluation for efficient points-to analysis[C]//Proceedings of the 9th Annual IEEE/ACM International Symposium on Code Generation and Optimization. Washington, DC: IEEE Computer Society, 2011: 267-276. [9] DAS M. Unification-based pointer analysis with directional assignments[C]//PLDI 2000: Proceedings of the ACM SIGPLAN 2000 Conference on Programming Language Design and Implementation ACM Sigplan Notice. New York: ACM, 2000: 35-46. [10] STEENSGAARD B. Points-to analysis by type inference of programs with structures and unions[C]//CC'96: Proceedings of the 6th International Conference on Compiler Construction, LNCS 1060. Berlin: Springer, 1996: 136-150. [11] 于洪涛,张兆庆.激进域敏感基于合并的指针分析[J].计算机学报,2009,32(9):1722-1735.(YU H T, ZHANG Z Q. An aggressively field-sensitive unification-based pointer analysis[J]. Chinese Journal of Computers, 2009, 32(9): 1722-1735.) [12] BROWN A, WILSON G. The architecture of open source applications[M/OL]. (2011-05-23)[2015-12-10].[S.l.]: Lulu.com, 2011: 155-170. http://www.aosabook.org/en/llvm.html.