ing fine-grained memory randomization practical by
allowing code sharing. In Proceedings of the 23rd
USENIX Conference on Security Symposium, SEC’14,
page 433–447, USA. USENIX Association.
Bittau, A., Belay, A., Mashtizadeh, A., Mazi
`
eres, D., and
Boneh, D. (2014). Hacking Blind. In 2014 IEEE Sym-
posium on Security and Privacy, pages 227–242.
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A.
(1999). The keynote trust-management system ver-
sion 2. RFC, 2704:1–37.
Bletsch, T., Jiang, X., Freeh, V. W., and Liang, Z. (2011).
Jump-oriented programming: A new class of code-
reuse attack. In Proceedings of the 6th ACM Sym-
posium on Information, Computer and Communica-
tions Security, ASIACCS ’11, pages 30–40, New
York, NY, USA. ACM. http://doi.acm.org/10.1145/
1966913.1966919.
Bovet, D. P. and Cesati, M. (2005). Page Fault Exception
Handler. In Understanding the Linux Kernel, 3rd Edi-
tion, chapter 9.4. O’Reilly.
Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.-
R., Shacham, H., and Winandy, M. (2010). Return-
oriented programming without returns. In Proceed-
ings of the 17th ACM Conference on Computer and
Communications Security, CCS ’10, pages 559–572,
New York, NY, USA. ACM. http://doi.acm.org/10.
1145/1866307.1866370.
Christoulakis, N., Christou, G., Athanasopoulos, E., and
Ioannidis, S. (2016). HCFI: Hardware-enforced
Control-Flow Integrity. In Proceedings of the Sixth
ACM Conference on Data and Application Security
and Privacy, CODASPY ’16, pages 38–49, New
York, NY, USA. ACM.
Common Vulnerabilities and Exposures (2013). CVE-
2013-2028. https://www.cvedetails.com/cve/
CVE-2013-2028/.
Evans, I., Fingeret, S., Gonzalez, J., Otgonbaatar, U., Tang,
T., Shrobe, H., Sidiroglou-Douskos, S., Rinard, M.,
and Okhravi, H. (2015). Missing the point(er): On
the effectiveness of code pointer integrity. In IEEE
Symposium on Security and Privacy, pages 781–796.
Kayaalp, M., Ozsoy, M., Abu-Ghazaleh, N., and Pono-
marev, D. (2012). Branch regulation: Low-overhead
protection from code reuse attacks. In Proceedings
of the 39th Annual International Symposium on Com-
puter Architecture (ISCA), pages 94–105.
Kim, J. W. and Prevelakis, V. (2006). Base Line Perfor-
mance Measurements of Access Controls for Libraries
and Modules. In Proceedings of the 20th International
Conference on Parallel and Distributed Processing,
IPDPS’06, pages 356–356, Washington, DC, USA.
IEEE Computer Society. http://dl.acm.org/citation.
cfm?id=1898699.1898911.
Mithra, Z. and Vipin P. (2015). Evaluating the theoreti-
cal feasibility of an srop attack against oxymoron. In
2015 International Conference on Advances in Com-
puting, Communications and Informatics (ICACCI),
pages 1872–1876.
PaX, T. (2001). Address Space Layout Randomization.
https://pax.grsecurity.net/docs/aslr.txt.
Provos, N. (2003). Improving host security with system call
policies. In Proceedings of the 12th Conference on
USENIX Security Symposium - Volume 12, SSYM’03,
pages 18–18, Berkeley, CA, USA. USENIX Asso-
ciation. http://dl.acm.org/citation.cfm?id=1251353.
1251371.
Roemer, R., Buchanan, E., Shacham, H., and Savage, S.
(2012). Return-oriented programming: Systems, lan-
guages, and applications. ACM Trans. Inf. Syst. Secur.,
15(1):2:1–2:34. http://doi.acm.org/10.1145/2133375.
2133377.
Shacham, H. (2007). The geometry of innocent flesh on
the bone: Return-into-libc without function calls (on
the x86). In Proceedings of the 14th ACM Conference
on Computer and Communications Security, CCS ’07,
pages 552–561, New York, NY, USA. ACM. http:
//doi.acm.org/10.1145/1315245.1315313.
Shacham, H., Page, M., Pfaff, B., Goh, E.-J., Modadugu,
N., and Boneh, D. (2004). On the effectiveness
of address-space randomization. In Proceedings of
the 11th ACM Conference on Computer and Com-
munications Security, CCS ’04, pages 298–307, New
York, NY, USA. ACM. http://doi.acm.org/10.1145/
1030083.1030124.
Snow, K. Z., Monrose, F., Davi, L., Dmitrienko, A.,
Liebchen, C., and Sadeghi, A.-R. (2013). Just-In-
Time Code Reuse: On the Effectiveness of Fine-
Grained Address Space Layout Randomization. In
Proceedings of the 2013 IEEE Symposium on Secu-
rity and Privacy, SP ’13, pages 574–588, Washington,
DC, USA. IEEE Computer Society. http://dx.doi.org/
10.1109/SP.2013.45.
sorbo (2013). Nginx 1.4.0 (Generic Linux x64) - Re-
mote Overflow. https://www.exploit-db.com/exploits/
32277.
Tsantekidis, M. and Prevelakis, V. (2017). Library-
Level Policy Enforcement. In SECURWARE 2017,
The Eleventh International Conference on Emerg-
ing Security Information, Systems and Technologies,
Rome, Italy. http://www.thinkmind.org/index.php?
view=article&articleid=securware 2017 2 20 30034.
Tsantekidis, M. and Prevelakis, V. (2019). Efficient Mon-
itoring of Library Call Invocation. In Sixth In-
ternational Conference on Internet of Things: Sys-
tems, Management and Security (IOTSMS), pages
387–392, Granada, Spain. https://doi.org/10.1109/
IOTSMS48152.2019.8939203.
Venkat, A., Shamasunder, S., Shacham, H., and Tullsen,
D. M. (2016). HIPStR: Heterogeneous-ISA Pro-
gram State Relocation. In Proceedings of the Twenty-
First International Conference on Architectural Sup-
port for Programming Languages and Operating Sys-
tems, ASPLOS ’16, pages 727–741, New York, NY,
USA. ACM.
Wagle, P. and Cowan, C. (2003). Stackguard: Simple stack
smash protection for gcc. In Proc. of the GCC Devel-
opers Summit, pages 243–255.
Watson, R. N. M. (2007). Exploiting concurrency vulner-
abilities in system call wrappers. In Proceedings of
the First USENIX Workshop on Offensive Technolo-
gies, WOOT ’07, pages 2:1–2:8, Berkeley, CA, USA.
USENIX Association. http://dl.acm.org/citation.cfm?
id=1323276.1323278.
MMU-based Access Control for Libraries
691