SSPFA: effective stack smashing protection for Android OS
In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating system and thus causes a false sense of security that affects all Android devices. We detail weaknesses of existing...
Uloženo v:
| Vydáno v: | International journal of information security Ročník 18; číslo 4; s. 519 - 532 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Berlin/Heidelberg
Springer Berlin Heidelberg
01.08.2019
Springer Nature B.V |
| Témata: | |
| ISSN: | 1615-5262, 1615-5270 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating system and thus causes a false sense of security that affects all Android devices. We detail weaknesses of existing SSP implementations, revealing that current SSP is not secure. We propose SSPFA, the first effective and practical SSP for Android devices. SSPFA provides security against stack buffer overflows without changing the underlying architecture. SSPFA has been implemented and tested on several real devices showing that it is not intrusive, and it is binary-compatible with Android applications. Extensive empirical validation has been carried out over the proposed solution. |
|---|---|
| AbstractList | In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating system and thus causes a false sense of security that affects all Android devices. We detail weaknesses of existing SSP implementations, revealing that current SSP is not secure. We propose SSPFA, the first effective and practical SSP for Android devices. SSPFA provides security against stack buffer overflows without changing the underlying architecture. SSPFA has been implemented and tested on several real devices showing that it is not intrusive, and it is binary-compatible with Android applications. Extensive empirical validation has been carried out over the proposed solution. |
| Author | Marco-Gisbert, Héctor Ripoll-Ripoll, Ismael |
| Author_xml | – sequence: 1 givenname: Héctor orcidid: 0000-0001-6976-5763 surname: Marco-Gisbert fullname: Marco-Gisbert, Héctor email: hector.marco@uws.ac.uk organization: University of the West of Scotland – sequence: 2 givenname: Ismael orcidid: 0000-0001-8592-0786 surname: Ripoll-Ripoll fullname: Ripoll-Ripoll, Ismael organization: Universitat Politècnica de València |
| BookMark | eNp9kE1LAzEQhoNUsK3-AU8Bz6sz2Y8k3kqxKhQqVM8hm4-6td2tyVbw37t1RcFDTxnI-8y8PCMyqJvaEXKJcI0A_CYiMOAJoEgAMpYn4oQMscA8yRmHwe9csDMyinENwBAkDolcLp9mk1vqvHemrT4cja02bzRudXyt6hXdhaY9_DQ19U2gk9qGprJ0sTwnp15vorv4ecfkZXb3PH1I5ov7x-lknpi0SNskyzxHb4TNuC-51AjCIhS5L0ufOW-0RAPWuiJDZqWUpSu9KFmheWqt4Dwdk6t-b9fkfe9iq9bNPtTdScWwkDkgS7FLiT5lQhNjcF6ZqtWH2m3Q1UYhqIMo1YtSnSj1LUqJDmX_0F2otjp8HofSHopduF658NfqCPUFbmB7-w |
| CitedBy_id | crossref_primary_10_3390_computers9020048 |
| Cites_doi | 10.1007/s10207-016-0356-7 10.1145/2133375.2133377 10.1109/TVLSI.2016.2548561 10.1016/j.diin.2017.10.002 10.1109/CC.2016.7781725 10.1109/MEMCOD.2016.7797764 10.1109/ACSAC.2006.27 10.1145/2382196.2382216 10.1109/SP.2012.41 10.1109/SP.2014.34 10.1109/CGO.2017.7863729 10.1109/CyberSecPODS.2017.8074849 10.1109/NBiS.2016.11 10.1109/ICIT.2014.57 10.1145/2976749.2978333 10.1145/1102120.1102165 10.1109/ACSAC.2009.16 10.1109/SP.2013.45 10.1109/NCA.2013.12 |
| ContentType | Journal Article |
| Copyright | The Author(s) 2019 International Journal of Information Security is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: The Author(s) 2019 – notice: International Journal of Information Security is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | C6C AAYXX CITATION 0-V 3V. 7SC 7WY 7WZ 7XB 87Z 88F 8AL 8AM 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- K7. L.- L7M L~C L~D M0C M0N M0O M1Q P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS PRQQA Q9U |
| DOI | 10.1007/s10207-018-00425-8 |
| DatabaseName | Springer Nature OA Free Journals CrossRef ProQuest Social Sciences Premium Collection【Remote access available】 ProQuest Central (Corporate) Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Military Database (Alumni Edition) Computing Database (Alumni Edition) Criminal Justice Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni) ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central Business Premium Collection ProQuest Technology Collection Criminology Collection ProQuest One ProQuest Central Korea Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ProQuest Criminal Justice (Alumni) ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Criminal Justice Database Military Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Business ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ProQuest Central Basic |
| DatabaseTitle | CrossRef ProQuest Business Collection (Alumni Edition) Computer Science Database ProQuest Central Student ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest Military Collection ProQuest Central China ABI/INFORM Complete ProQuest One Applied & Life Sciences ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest Business Collection Criminology Collection Criminal Justice Periodicals (Alumni Edition) ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Criminal Justice ProQuest Central Korea Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) ProQuest Computing ProQuest One Social Sciences ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest Military Collection (Alumni Edition) ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest Criminal Justice (Alumni) ProQuest One Business (Alumni) ProQuest Central (Alumni) Business Premium Collection (Alumni) |
| DatabaseTitleList | ProQuest Business Collection (Alumni Edition) |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1615-5270 |
| EndPage | 532 |
| ExternalDocumentID | 10_1007_s10207_018_00425_8 |
| GrantInformation_xml | – fundername: Universitat Politècnica de València grantid: 20160251 funderid: http://dx.doi.org/10.13039/501100004233 |
| GroupedDBID | -59 -5G -BR -EM -~C .4S .86 .DC .VR 0-V 06D 0R~ 0VY 1N0 203 29J 2J2 2JN 2JY 2KG 2LR 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6KP 6NX 7WY 8AO 8FE 8FG 8FL 8FW 8TC 8VB 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDBF ABDZT ABECU ABFTD ABFTV ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABUWG ABWNU ABXPI ACAOD ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACUHS ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEFQL AEGNC AEJHL AEJRE AEMOZ AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFBBN AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHQJS AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJRNO AJZVZ AKVCP ALMA_UNASSIGNED_HOLDINGS ALSLI ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARALO ARAPS ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. B0M BA0 BDATZ BENPR BEZIV BGLVJ BGNMA BGRYB BPHCQ BSONS C6C CCPQU CS3 CSCUP DDRTE DL5 DNIVK DPUIP DU5 DWQXO EAD EAP EBA EBLON EBR EBS EBU ECS EDO EIOEI EIS EJD EMK EPL ESBYG EST ESX FEDTE FERAY FFXSO FIGPU FIL FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GXS HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HVGLF I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K1G K60 K6V K6~ K7- KDC KOV LAS LLZTM M0C M0N M0O M1Q M4Y MA- NB0 NPVJJ NQJWS NU0 O93 O9J P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 Q2X QOS QWB R89 R9I RNS ROL RPX RSV S16 S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TH9 TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z5O Z7R Z7X Z81 Z83 Z88 ZL0 ZMTXR ~8M ~A9 -Y2 1SB 2P1 2VQ AAPKM AARHV AAYXX ABBRH ABDBE ABFSG ABQSL ABRTQ ABULA ACBXY ACSTC ADHKG AEBTG AEKMD AEZWR AFDZB AFFHD AFGCZ AFHIU AFOHR AGQPQ AHPBZ AHSBF AHWEU AIXLP AJBLW ATHPR AYFIA CAG CITATION COF H13 HZ~ N2Q O9- PHGZM PHGZT PQGLB PRQQA S1Z 3V. 7SC 7XB 8AL 8FD 8FK JQ2 K7. L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c363t-44f71fc8d47fb79a108d1065fbbf4efca91c0dde6412d999bebf8b26a73dd8773 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000475616800007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1615-5262 |
| IngestDate | Thu Nov 20 04:30:43 EST 2025 Tue Nov 18 21:53:34 EST 2025 Sat Nov 29 02:59:44 EST 2025 Fri Feb 21 02:37:20 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Stack smashing protector Mobile devices Buffer overflow Security Defenses Android |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c363t-44f71fc8d47fb79a108d1065fbbf4efca91c0dde6412d999bebf8b26a73dd8773 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0001-8592-0786 0000-0001-6976-5763 |
| OpenAccessLink | https://link.springer.com/10.1007/s10207-018-00425-8 |
| PQID | 2169501231 |
| PQPubID | 43999 |
| PageCount | 14 |
| ParticipantIDs | proquest_journals_2169501231 crossref_citationtrail_10_1007_s10207_018_00425_8 crossref_primary_10_1007_s10207_018_00425_8 springer_journals_10_1007_s10207_018_00425_8 |
| PublicationCentury | 2000 |
| PublicationDate | 20190801 2019-8-00 |
| PublicationDateYYYYMMDD | 2019-08-01 |
| PublicationDate_xml | – month: 8 year: 2019 text: 20190801 day: 1 |
| PublicationDecade | 2010 |
| PublicationPlace | Berlin/Heidelberg |
| PublicationPlace_xml | – name: Berlin/Heidelberg – name: Heidelberg |
| PublicationTitle | International journal of information security |
| PublicationTitleAbbrev | Int. J. Inf. Secur |
| PublicationYear | 2019 |
| Publisher | Springer Berlin Heidelberg Springer Nature B.V |
| Publisher_xml | – name: Springer Berlin Heidelberg – name: Springer Nature B.V |
| References | CR19 CR18 CR17 CR39 CR16 CR38 CR15 CR37 CR36 CR13 CR35 CR34 CR11 CR33 CR10 CR32 CR31 CR30 Kananizadeh, Kononenko (CR14) 2017; 16 Das, Zhang, Liu (CR12) 2016; 25 CR4 CR3 CR6 CR5 Buchanan, Chiale, Macfarlane (CR1) 2017; 23 Tian, Jia, Chen, Hu, Xue (CR2) 2016; 1 CR7 CR29 CR28 CR9 CR27 Roemer, Buchanan, Shacham, Savage (CR8) 2012; 15 CR26 CR25 CR24 CR23 CR22 CR21 CR20 S Das (425_CR12) 2016; 25 425_CR29 425_CR28 425_CR27 425_CR26 425_CR25 425_CR24 425_CR23 425_CR22 425_CR21 425_CR20 425_CR7 425_CR9 D Tian (425_CR2) 2016; 1 R Roemer (425_CR8) 2012; 15 425_CR19 425_CR18 S Kananizadeh (425_CR14) 2017; 16 425_CR17 425_CR39 425_CR16 425_CR38 WJ Buchanan (425_CR1) 2017; 23 425_CR15 425_CR37 425_CR36 425_CR13 425_CR35 425_CR34 425_CR11 425_CR33 425_CR10 425_CR32 425_CR31 425_CR30 425_CR4 425_CR3 425_CR6 425_CR5 |
| References_xml | – ident: CR22 – ident: CR18 – volume: 16 start-page: 641 year: 2017 end-page: 651 ident: CR14 article-title: Development of dynamic protection against timing channels publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-016-0356-7 – ident: CR4 – ident: CR39 – ident: CR16 – ident: CR37 – ident: CR30 – ident: CR10 – ident: CR33 – ident: CR35 – ident: CR6 – ident: CR29 – ident: CR25 – ident: CR27 – volume: 15 start-page: 2:1 issue: 1 year: 2012 end-page: 2:34 ident: CR8 article-title: Return-oriented programming: systems, languages, and applications publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/2133375.2133377 – ident: CR23 – volume: 25 start-page: 3193 year: 2016 end-page: 3207 ident: CR12 article-title: A fine-grained control flow integrity approach against runtime memory attacks for embedded systems publication-title: IEEE Trans. Very Large Scale Integr. VLSI Syst. doi: 10.1109/TVLSI.2016.2548561 – ident: CR21 – ident: CR19 – ident: CR3 – ident: CR15 – ident: CR38 – ident: CR17 – ident: CR31 – volume: 23 start-page: 88 issue: Supplement C year: 2017 end-page: 98 ident: CR1 article-title: A methodology for the security evaluation within third-party android marketplaces publication-title: Digit. Investig. doi: 10.1016/j.diin.2017.10.002 – volume: 1 start-page: 143 year: 2016 end-page: 152 ident: CR2 article-title: A practical online approach to protecting kernel heap buffers in kernel modules publication-title: China Commun. doi: 10.1109/CC.2016.7781725 – ident: CR13 – ident: CR11 – ident: CR9 – ident: CR32 – ident: CR34 – ident: CR36 – ident: CR5 – ident: CR7 – ident: CR28 – ident: CR26 – ident: CR24 – ident: CR20 – ident: 425_CR18 – ident: 425_CR13 doi: 10.1109/MEMCOD.2016.7797764 – ident: 425_CR4 doi: 10.1109/ACSAC.2006.27 – ident: 425_CR26 – ident: 425_CR6 doi: 10.1145/2382196.2382216 – ident: 425_CR28 – ident: 425_CR22 – volume: 15 start-page: 2:1 issue: 1 year: 2012 ident: 425_CR8 publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/2133375.2133377 – ident: 425_CR9 doi: 10.1109/SP.2012.41 – volume: 25 start-page: 3193 year: 2016 ident: 425_CR12 publication-title: IEEE Trans. Very Large Scale Integr. VLSI Syst. doi: 10.1109/TVLSI.2016.2548561 – ident: 425_CR35 – volume: 16 start-page: 641 year: 2017 ident: 425_CR14 publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-016-0356-7 – ident: 425_CR39 – ident: 425_CR37 – ident: 425_CR24 doi: 10.1109/SP.2014.34 – ident: 425_CR29 doi: 10.1109/CGO.2017.7863729 – ident: 425_CR31 – ident: 425_CR10 – ident: 425_CR11 doi: 10.1109/CyberSecPODS.2017.8074849 – ident: 425_CR21 – ident: 425_CR19 – ident: 425_CR20 doi: 10.1109/NBiS.2016.11 – ident: 425_CR25 – ident: 425_CR27 – ident: 425_CR17 doi: 10.1109/ICIT.2014.57 – ident: 425_CR23 – volume: 1 start-page: 143 year: 2016 ident: 425_CR2 publication-title: China Commun. doi: 10.1109/CC.2016.7781725 – ident: 425_CR32 – ident: 425_CR34 – ident: 425_CR3 – ident: 425_CR15 – ident: 425_CR33 doi: 10.1145/2976749.2978333 – ident: 425_CR5 doi: 10.1145/1102120.1102165 – ident: 425_CR7 doi: 10.1109/ACSAC.2009.16 – ident: 425_CR36 – ident: 425_CR30 – ident: 425_CR16 doi: 10.1109/SP.2013.45 – ident: 425_CR38 doi: 10.1109/NCA.2013.12 – volume: 23 start-page: 88 issue: Supplement C year: 2017 ident: 425_CR1 publication-title: Digit. Investig. doi: 10.1016/j.diin.2017.10.002 |
| SSID | ssj0021091 |
| Score | 2.1798618 |
| Snippet | In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 519 |
| SubjectTerms | Buffers Coding and Information Theory Communications Engineering Computer Communication Networks Computer Science Cryptology Cybersecurity Management of Computing and Information Systems Mobile operating systems Networks Operating Systems Protectors Regular Contribution Security Windows operating system |
| SummonAdditionalLinks | – databaseName: Military Database dbid: M1Q link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BYWChPEWhIA9sYFHnZZsFVYiKhVJUkLpF8UuqgLY0hd-PnTiNQKILcxIrus---84-3wdwTo001uUxzESgcZSZGAsTMGxMZoOz5DwWpdgE7ffZaMQHfsMt92WVlU8sHLWaSrdHfhWQhMeOAJCb2Qd2qlHudNVLaKzDhiXK3PXOfyBPy4TLNb10CZeN2jbhSgJ_acZfnQuKokuGi3mL2c_AVLPNXwekRdzpNf_7xzuw7Rkn6pZTZBfW9GQPmpWaA_KLex_4cDjoda9RWeFhnSCyxFG-ovy91FtCvqWDBRJZpotcKeR0rNDj8ABeenfPt_fYCytgGSbhAkeRxcdIpiJqBOUZ6TBlU8PYCGEibWTGiexYv5dEJFCWQQotjMUyyWioFKM0PITGZDrRR4CoUlxSqcOMkkhrwnXCQ8FVEEjDCJEtIJVVU-m7jjvxi7e07pfskEgtEmmBRMpacLH8Zlb23Fj5drsyf-rXX57Wtm_BZQVg_fjv0Y5Xj3YCW5Yx8bICsA2NxfxTn8Km_FqM8_lZMfu-Afoj3i8 priority: 102 providerName: ProQuest |
| Title | SSPFA: effective stack smashing protection for Android OS |
| URI | https://link.springer.com/article/10.1007/s10207-018-00425-8 https://www.proquest.com/docview/2169501231 |
| Volume | 18 |
| WOSCitedRecordID | wos000475616800007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: SpringerLINK Contemporary 1997-Present customDbUrl: eissn: 1615-5270 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0021091 issn: 1615-5262 databaseCode: RSV dateStart: 20010801 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZSwMxEB609cEX64n1KHnwTQPNXkl8U7EIYltb75dlc0FRq9jq73f2alVU0JeBZbNhmZnMfEPmANjhTjs0eYIK5VkaJC6kynmCOpegc9ZShiofNsHbbXFzI7tFUdiozHYvryQzS_2h2M3L0iQFzTSNilmoorsT6cCGXv9qEmalrS7TMAt9NYZZkVeUyny_x2d3NMWYX65FM2_Tqv3vPxdhoUCX5CBXhyWYscNlqJWTG0hxkFdA9vvd1sE-ybM50OARBIn6nowe89lKpGjfgEIjiGpJmvb4NDCk01-Fy9bxxdEJLYYoUO1H_pgGAcrCaWEC7hSXCWsKg2Fg6JRygXU6kUw30cZFAfMMokVllUO5RQn3jRGc-2tQGT4N7ToQbozUXFs_4SywlkkbSV9J43naCcZ0HVjJy1gXHcbTQRcP8bQ3csqbGHkTZ7yJRR12J9885_01fl29VYooLs7aKPZYJMMUGrI67JUimb7-ebeNvy3fhHlESzLP_tuCyvjl1W7DnH4bD0YvDZjl17cNqB4et7s9fDrlFOlZ8yijnZSyc6Td8K6R6es7UpXbag |
| linkProvider | Springer Nature |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB61AalcCNBWBFLwAU7Uaux92K6EUFSIWqWESmml3rbrlxQBScgGEH-K39jxPhpRqb3lwHl3rfV-M-Nv1uP5AN4IbzyGPEml5o7GuU-o9lxS73NcnI1Sia7EJsRoJC8v1dkG_G3OwoSyyiYmloHazkz4R37AWaqSQADYh_kPGlSjwu5qI6FRmcXQ_fmNKVvx_uQj4vuW88Gn86NjWqsKUBOl0ZLGMb6cN9LGwmuhctaTFvOixGvtY-dNrpjpodOnMeMW6ZN22uNE0lxE1kohIhx3Ex7EkRTBr4aC3iR4oclmSPCQJWCCl_L6kE59VI-XRZ6Sln5C5b8L4Yrd3tqQLde5Qft_-0JP4HHNqEm_coGnsOGmz6DdqFWQOnhtgxqPzwb9Q1JVsGCQJ0iMzVdSfK_0pEjdsgINlSCTJ6HUczax5Mt4By7WMoFdaE1nU_cciLBWGWFclAsWO8eUS1WkleXceMmY6QBrUMxM3VU9iHt8y1b9oAPyGSKflchnsgPvbp6ZVz1F7r2728Cd1fGlyFZYd2C_MZjV5btHe3H_aK9h6_j882l2ejIavoRHyA5VVe3YhdZy8dPtwUPzazkpFq9KyydwtW5DugayEj2r |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LTxsxEB5BWqFeoC2ghkfxoT0Vi9j7sF2pQqg0KqJKI6VIiMuyfkkISCAJrfhr_XUd73qJigQ3Dpx3d7Te-fz5m_V4BuCD8MYj5UkqNXc0LX1GteeSel_i4myUynTdbEL0evL4WPXn4G9zFiakVTacWBG1HZnwj3yHs1xlQQCwHR_TIvr73d2raxo6SIWd1qadRg2RQ3f7B8O3yZeDffT1R8673359_U5jhwFqkjyZ0jTFF_VG2lR4LVTJOtJijJR5rX3qvCkVMx0kgDxl3KKU0k57HFReisRaKUSCdufhhcAYM6QT9rOTu2AvFNwMwR4qBgz2ch4P7MRje7xK-JS0mjNU_r8ozpTuvc3Zas3rLj3nr_UaFqPSJnv11HgDc274FpaaLhYkktoyqMGg3937TOrMFiR_goLZnJPJZd1nisRSFghgggqfhBTQ0ZklPwcrcPQkA1iF1nA0dO-ACGuVEcYlpWCpc0y5XCVaWc6Nl4yZNrDGo4WJ1dZD04-LYlYnOqCgQBQUFQoK2YZPd89c1bVGHr17o3F9EXlnUsz83obtBjyzyw9bW3vc2hYsIH6KHwe9w3V4haJR1UmQG9Cajm_cJrw0v6dnk_H7ahIQOH1qHP0DlE1Gzw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SSPFA%3A+effective+stack+smashing+protection+for+Android+OS&rft.jtitle=International+journal+of+information+security&rft.au=Marco-Gisbert%2C+H%C3%A9ctor&rft.au=Ripoll-Ripoll%2C+Ismael&rft.date=2019-08-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=18&rft.issue=4&rft.spage=519&rft.epage=532&rft_id=info:doi/10.1007%2Fs10207-018-00425-8&rft.externalDocID=10_1007_s10207_018_00425_8 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon |