SSPFA: effective stack smashing protection for Android OS

In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating system and thus causes a false sense of security that affects all Android devices. We detail weaknesses of existing...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:International journal of information security Ročník 18; číslo 4; s. 519 - 532
Hlavní autoři: Marco-Gisbert, Héctor, Ripoll-Ripoll, Ismael
Médium: Journal Article
Jazyk:angličtina
Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019
Springer Nature B.V
Témata:
ISSN:1615-5262, 1615-5270
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating system and thus causes a false sense of security that affects all Android devices. We detail weaknesses of existing SSP implementations, revealing that current SSP is not secure. We propose SSPFA, the first effective and practical SSP for Android devices. SSPFA provides security against stack buffer overflows without changing the underlying architecture. SSPFA has been implemented and tested on several real devices showing that it is not intrusive, and it is binary-compatible with Android applications. Extensive empirical validation has been carried out over the proposed solution.
AbstractList In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to protect the Android operating system and thus causes a false sense of security that affects all Android devices. We detail weaknesses of existing SSP implementations, revealing that current SSP is not secure. We propose SSPFA, the first effective and practical SSP for Android devices. SSPFA provides security against stack buffer overflows without changing the underlying architecture. SSPFA has been implemented and tested on several real devices showing that it is not intrusive, and it is binary-compatible with Android applications. Extensive empirical validation has been carried out over the proposed solution.
Author Marco-Gisbert, Héctor
Ripoll-Ripoll, Ismael
Author_xml – sequence: 1
  givenname: Héctor
  orcidid: 0000-0001-6976-5763
  surname: Marco-Gisbert
  fullname: Marco-Gisbert, Héctor
  email: hector.marco@uws.ac.uk
  organization: University of the West of Scotland
– sequence: 2
  givenname: Ismael
  orcidid: 0000-0001-8592-0786
  surname: Ripoll-Ripoll
  fullname: Ripoll-Ripoll, Ismael
  organization: Universitat Politècnica de València
BookMark eNp9kE1LAzEQhoNUsK3-AU8Bz6sz2Y8k3kqxKhQqVM8hm4-6td2tyVbw37t1RcFDTxnI-8y8PCMyqJvaEXKJcI0A_CYiMOAJoEgAMpYn4oQMscA8yRmHwe9csDMyinENwBAkDolcLp9mk1vqvHemrT4cja02bzRudXyt6hXdhaY9_DQ19U2gk9qGprJ0sTwnp15vorv4ecfkZXb3PH1I5ov7x-lknpi0SNskyzxHb4TNuC-51AjCIhS5L0ufOW-0RAPWuiJDZqWUpSu9KFmheWqt4Dwdk6t-b9fkfe9iq9bNPtTdScWwkDkgS7FLiT5lQhNjcF6ZqtWH2m3Q1UYhqIMo1YtSnSj1LUqJDmX_0F2otjp8HofSHopduF658NfqCPUFbmB7-w
CitedBy_id crossref_primary_10_3390_computers9020048
Cites_doi 10.1007/s10207-016-0356-7
10.1145/2133375.2133377
10.1109/TVLSI.2016.2548561
10.1016/j.diin.2017.10.002
10.1109/CC.2016.7781725
10.1109/MEMCOD.2016.7797764
10.1109/ACSAC.2006.27
10.1145/2382196.2382216
10.1109/SP.2012.41
10.1109/SP.2014.34
10.1109/CGO.2017.7863729
10.1109/CyberSecPODS.2017.8074849
10.1109/NBiS.2016.11
10.1109/ICIT.2014.57
10.1145/2976749.2978333
10.1145/1102120.1102165
10.1109/ACSAC.2009.16
10.1109/SP.2013.45
10.1109/NCA.2013.12
ContentType Journal Article
Copyright The Author(s) 2019
International Journal of Information Security is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2019
– notice: International Journal of Information Security is a copyright of Springer, (2019). All Rights Reserved. © 2019. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
0-V
3V.
7SC
7WY
7WZ
7XB
87Z
88F
8AL
8AM
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
K7.
L.-
L7M
L~C
L~D
M0C
M0N
M0O
M1Q
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
Q9U
DOI 10.1007/s10207-018-00425-8
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Military Database (Alumni Edition)
Computing Database (Alumni Edition)
Criminal Justice Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials - QC
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
Criminology Collection
ProQuest One
ProQuest Central Korea
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ProQuest Criminal Justice (Alumni)
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database
Military Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
Proquest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ProQuest Central Basic
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
Computer Science Database
ProQuest Central Student
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest Military Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
Criminal Justice Periodicals (Alumni Edition)
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Criminal Justice
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
ProQuest Computing
ProQuest One Social Sciences
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest Military Collection (Alumni Edition)
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest Criminal Justice (Alumni)
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList
ProQuest Business Collection (Alumni Edition)
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1615-5270
EndPage 532
ExternalDocumentID 10_1007_s10207_018_00425_8
GrantInformation_xml – fundername: Universitat Politècnica de València
  grantid: 20160251
  funderid: http://dx.doi.org/10.13039/501100004233
GroupedDBID -59
-5G
-BR
-EM
-~C
.4S
.86
.DC
.VR
0-V
06D
0R~
0VY
1N0
203
29J
2J2
2JN
2JY
2KG
2LR
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6KP
6NX
7WY
8AO
8FE
8FG
8FL
8FW
8TC
8VB
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABUWG
ABWNU
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACUHS
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEFQL
AEGNC
AEJHL
AEJRE
AEMOZ
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHQJS
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJRNO
AJZVZ
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARALO
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
B0M
BA0
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BGRYB
BPHCQ
BSONS
C6C
CCPQU
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EAD
EAP
EBA
EBLON
EBR
EBS
EBU
ECS
EDO
EIOEI
EIS
EJD
EMK
EPL
ESBYG
EST
ESX
FEDTE
FERAY
FFXSO
FIGPU
FIL
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GXS
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HVGLF
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K1G
K60
K6V
K6~
K7-
KDC
KOV
LAS
LLZTM
M0C
M0N
M0O
M1Q
M4Y
MA-
NB0
NPVJJ
NQJWS
NU0
O93
O9J
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
Q2X
QOS
QWB
R89
R9I
RNS
ROL
RPX
RSV
S16
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TH9
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z81
Z83
Z88
ZL0
ZMTXR
~8M
~A9
-Y2
1SB
2P1
2VQ
AAPKM
AARHV
AAYXX
ABBRH
ABDBE
ABFSG
ABQSL
ABRTQ
ABULA
ACBXY
ACSTC
ADHKG
AEBTG
AEKMD
AEZWR
AFDZB
AFFHD
AFGCZ
AFHIU
AFOHR
AGQPQ
AHPBZ
AHSBF
AHWEU
AIXLP
AJBLW
ATHPR
AYFIA
CAG
CITATION
COF
H13
HZ~
N2Q
O9-
PHGZM
PHGZT
PQGLB
PRQQA
S1Z
3V.
7SC
7XB
8AL
8FD
8FK
JQ2
K7.
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c363t-44f71fc8d47fb79a108d1065fbbf4efca91c0dde6412d999bebf8b26a73dd8773
IEDL.DBID RSV
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000475616800007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1615-5262
IngestDate Thu Nov 20 04:30:43 EST 2025
Tue Nov 18 21:53:34 EST 2025
Sat Nov 29 02:59:44 EST 2025
Fri Feb 21 02:37:20 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Stack smashing protector
Mobile devices
Buffer overflow
Security
Defenses
Android
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c363t-44f71fc8d47fb79a108d1065fbbf4efca91c0dde6412d999bebf8b26a73dd8773
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8592-0786
0000-0001-6976-5763
OpenAccessLink https://link.springer.com/10.1007/s10207-018-00425-8
PQID 2169501231
PQPubID 43999
PageCount 14
ParticipantIDs proquest_journals_2169501231
crossref_citationtrail_10_1007_s10207_018_00425_8
crossref_primary_10_1007_s10207_018_00425_8
springer_journals_10_1007_s10207_018_00425_8
PublicationCentury 2000
PublicationDate 20190801
2019-8-00
PublicationDateYYYYMMDD 2019-08-01
PublicationDate_xml – month: 8
  year: 2019
  text: 20190801
  day: 1
PublicationDecade 2010
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle International journal of information security
PublicationTitleAbbrev Int. J. Inf. Secur
PublicationYear 2019
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References CR19
CR18
CR17
CR39
CR16
CR38
CR15
CR37
CR36
CR13
CR35
CR34
CR11
CR33
CR10
CR32
CR31
CR30
Kananizadeh, Kononenko (CR14) 2017; 16
Das, Zhang, Liu (CR12) 2016; 25
CR4
CR3
CR6
CR5
Buchanan, Chiale, Macfarlane (CR1) 2017; 23
Tian, Jia, Chen, Hu, Xue (CR2) 2016; 1
CR7
CR29
CR28
CR9
CR27
Roemer, Buchanan, Shacham, Savage (CR8) 2012; 15
CR26
CR25
CR24
CR23
CR22
CR21
CR20
S Das (425_CR12) 2016; 25
425_CR29
425_CR28
425_CR27
425_CR26
425_CR25
425_CR24
425_CR23
425_CR22
425_CR21
425_CR20
425_CR7
425_CR9
D Tian (425_CR2) 2016; 1
R Roemer (425_CR8) 2012; 15
425_CR19
425_CR18
S Kananizadeh (425_CR14) 2017; 16
425_CR17
425_CR39
425_CR16
425_CR38
WJ Buchanan (425_CR1) 2017; 23
425_CR15
425_CR37
425_CR36
425_CR13
425_CR35
425_CR34
425_CR11
425_CR33
425_CR10
425_CR32
425_CR31
425_CR30
425_CR4
425_CR3
425_CR6
425_CR5
References_xml – ident: CR22
– ident: CR18
– volume: 16
  start-page: 641
  year: 2017
  end-page: 651
  ident: CR14
  article-title: Development of dynamic protection against timing channels
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-016-0356-7
– ident: CR4
– ident: CR39
– ident: CR16
– ident: CR37
– ident: CR30
– ident: CR10
– ident: CR33
– ident: CR35
– ident: CR6
– ident: CR29
– ident: CR25
– ident: CR27
– volume: 15
  start-page: 2:1
  issue: 1
  year: 2012
  end-page: 2:34
  ident: CR8
  article-title: Return-oriented programming: systems, languages, and applications
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/2133375.2133377
– ident: CR23
– volume: 25
  start-page: 3193
  year: 2016
  end-page: 3207
  ident: CR12
  article-title: A fine-grained control flow integrity approach against runtime memory attacks for embedded systems
  publication-title: IEEE Trans. Very Large Scale Integr. VLSI Syst.
  doi: 10.1109/TVLSI.2016.2548561
– ident: CR21
– ident: CR19
– ident: CR3
– ident: CR15
– ident: CR38
– ident: CR17
– ident: CR31
– volume: 23
  start-page: 88
  issue: Supplement C
  year: 2017
  end-page: 98
  ident: CR1
  article-title: A methodology for the security evaluation within third-party android marketplaces
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2017.10.002
– volume: 1
  start-page: 143
  year: 2016
  end-page: 152
  ident: CR2
  article-title: A practical online approach to protecting kernel heap buffers in kernel modules
  publication-title: China Commun.
  doi: 10.1109/CC.2016.7781725
– ident: CR13
– ident: CR11
– ident: CR9
– ident: CR32
– ident: CR34
– ident: CR36
– ident: CR5
– ident: CR7
– ident: CR28
– ident: CR26
– ident: CR24
– ident: CR20
– ident: 425_CR18
– ident: 425_CR13
  doi: 10.1109/MEMCOD.2016.7797764
– ident: 425_CR4
  doi: 10.1109/ACSAC.2006.27
– ident: 425_CR26
– ident: 425_CR6
  doi: 10.1145/2382196.2382216
– ident: 425_CR28
– ident: 425_CR22
– volume: 15
  start-page: 2:1
  issue: 1
  year: 2012
  ident: 425_CR8
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/2133375.2133377
– ident: 425_CR9
  doi: 10.1109/SP.2012.41
– volume: 25
  start-page: 3193
  year: 2016
  ident: 425_CR12
  publication-title: IEEE Trans. Very Large Scale Integr. VLSI Syst.
  doi: 10.1109/TVLSI.2016.2548561
– ident: 425_CR35
– volume: 16
  start-page: 641
  year: 2017
  ident: 425_CR14
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-016-0356-7
– ident: 425_CR39
– ident: 425_CR37
– ident: 425_CR24
  doi: 10.1109/SP.2014.34
– ident: 425_CR29
  doi: 10.1109/CGO.2017.7863729
– ident: 425_CR31
– ident: 425_CR10
– ident: 425_CR11
  doi: 10.1109/CyberSecPODS.2017.8074849
– ident: 425_CR21
– ident: 425_CR19
– ident: 425_CR20
  doi: 10.1109/NBiS.2016.11
– ident: 425_CR25
– ident: 425_CR27
– ident: 425_CR17
  doi: 10.1109/ICIT.2014.57
– ident: 425_CR23
– volume: 1
  start-page: 143
  year: 2016
  ident: 425_CR2
  publication-title: China Commun.
  doi: 10.1109/CC.2016.7781725
– ident: 425_CR32
– ident: 425_CR34
– ident: 425_CR3
– ident: 425_CR15
– ident: 425_CR33
  doi: 10.1145/2976749.2978333
– ident: 425_CR5
  doi: 10.1145/1102120.1102165
– ident: 425_CR7
  doi: 10.1109/ACSAC.2009.16
– ident: 425_CR36
– ident: 425_CR30
– ident: 425_CR16
  doi: 10.1109/SP.2013.45
– ident: 425_CR38
  doi: 10.1109/NCA.2013.12
– volume: 23
  start-page: 88
  issue: Supplement C
  year: 2017
  ident: 425_CR1
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2017.10.002
SSID ssj0021091
Score 2.1798618
Snippet In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails to...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 519
SubjectTerms Buffers
Coding and Information Theory
Communications Engineering
Computer Communication Networks
Computer Science
Cryptology
Cybersecurity
Management of Computing and Information Systems
Mobile operating systems
Networks
Operating Systems
Protectors
Regular Contribution
Security
Windows operating system
SummonAdditionalLinks – databaseName: Military Database
  dbid: M1Q
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV07T8MwED5BYWChPEWhIA9sYFHnZZsFVYiKhVJUkLpF8UuqgLY0hd-PnTiNQKILcxIrus---84-3wdwTo001uUxzESgcZSZGAsTMGxMZoOz5DwWpdgE7ffZaMQHfsMt92WVlU8sHLWaSrdHfhWQhMeOAJCb2Qd2qlHudNVLaKzDhiXK3PXOfyBPy4TLNb10CZeN2jbhSgJ_acZfnQuKokuGi3mL2c_AVLPNXwekRdzpNf_7xzuw7Rkn6pZTZBfW9GQPmpWaA_KLex_4cDjoda9RWeFhnSCyxFG-ovy91FtCvqWDBRJZpotcKeR0rNDj8ABeenfPt_fYCytgGSbhAkeRxcdIpiJqBOUZ6TBlU8PYCGEibWTGiexYv5dEJFCWQQotjMUyyWioFKM0PITGZDrRR4CoUlxSqcOMkkhrwnXCQ8FVEEjDCJEtIJVVU-m7jjvxi7e07pfskEgtEmmBRMpacLH8Zlb23Fj5drsyf-rXX57Wtm_BZQVg_fjv0Y5Xj3YCW5Yx8bICsA2NxfxTn8Km_FqM8_lZMfu-Afoj3i8
  priority: 102
  providerName: ProQuest
Title SSPFA: effective stack smashing protection for Android OS
URI https://link.springer.com/article/10.1007/s10207-018-00425-8
https://www.proquest.com/docview/2169501231
Volume 18
WOSCitedRecordID wos000475616800007&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1615-5270
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021091
  issn: 1615-5262
  databaseCode: RSV
  dateStart: 20010801
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1ZSwMxEB609cEX64n1KHnwTQPNXkl8U7EIYltb75dlc0FRq9jq73f2alVU0JeBZbNhmZnMfEPmANjhTjs0eYIK5VkaJC6kynmCOpegc9ZShiofNsHbbXFzI7tFUdiozHYvryQzS_2h2M3L0iQFzTSNilmoorsT6cCGXv9qEmalrS7TMAt9NYZZkVeUyny_x2d3NMWYX65FM2_Tqv3vPxdhoUCX5CBXhyWYscNlqJWTG0hxkFdA9vvd1sE-ybM50OARBIn6nowe89lKpGjfgEIjiGpJmvb4NDCk01-Fy9bxxdEJLYYoUO1H_pgGAcrCaWEC7hSXCWsKg2Fg6JRygXU6kUw30cZFAfMMokVllUO5RQn3jRGc-2tQGT4N7ToQbozUXFs_4SywlkkbSV9J43naCcZ0HVjJy1gXHcbTQRcP8bQ3csqbGHkTZ7yJRR12J9885_01fl29VYooLs7aKPZYJMMUGrI67JUimb7-ebeNvy3fhHlESzLP_tuCyvjl1W7DnH4bD0YvDZjl17cNqB4et7s9fDrlFOlZ8yijnZSyc6Td8K6R6es7UpXbag
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LbxMxEB61AalcCNBWBFLwAU7Uaux92K6EUFSIWqWESmml3rbrlxQBScgGEH-K39jxPhpRqb3lwHl3rfV-M-Nv1uP5AN4IbzyGPEml5o7GuU-o9lxS73NcnI1Sia7EJsRoJC8v1dkG_G3OwoSyyiYmloHazkz4R37AWaqSQADYh_kPGlSjwu5qI6FRmcXQ_fmNKVvx_uQj4vuW88Gn86NjWqsKUBOl0ZLGMb6cN9LGwmuhctaTFvOixGvtY-dNrpjpodOnMeMW6ZN22uNE0lxE1kohIhx3Ex7EkRTBr4aC3iR4oclmSPCQJWCCl_L6kE59VI-XRZ6Sln5C5b8L4Yrd3tqQLde5Qft_-0JP4HHNqEm_coGnsOGmz6DdqFWQOnhtgxqPzwb9Q1JVsGCQJ0iMzVdSfK_0pEjdsgINlSCTJ6HUczax5Mt4By7WMoFdaE1nU_cciLBWGWFclAsWO8eUS1WkleXceMmY6QBrUMxM3VU9iHt8y1b9oAPyGSKflchnsgPvbp6ZVz1F7r2728Cd1fGlyFZYd2C_MZjV5btHe3H_aK9h6_j882l2ejIavoRHyA5VVe3YhdZy8dPtwUPzazkpFq9KyydwtW5DugayEj2r
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LTxsxEB5BWqFeoC2ghkfxoT0Vi9j7sF2pQqg0KqJKI6VIiMuyfkkISCAJrfhr_XUd73qJigQ3Dpx3d7Te-fz5m_V4BuCD8MYj5UkqNXc0LX1GteeSel_i4myUynTdbEL0evL4WPXn4G9zFiakVTacWBG1HZnwj3yHs1xlQQCwHR_TIvr73d2raxo6SIWd1qadRg2RQ3f7B8O3yZeDffT1R8673359_U5jhwFqkjyZ0jTFF_VG2lR4LVTJOtJijJR5rX3qvCkVMx0kgDxl3KKU0k57HFReisRaKUSCdufhhcAYM6QT9rOTu2AvFNwMwR4qBgz2ch4P7MRje7xK-JS0mjNU_r8ozpTuvc3Zas3rLj3nr_UaFqPSJnv11HgDc274FpaaLhYkktoyqMGg3937TOrMFiR_goLZnJPJZd1nisRSFghgggqfhBTQ0ZklPwcrcPQkA1iF1nA0dO-ACGuVEcYlpWCpc0y5XCVaWc6Nl4yZNrDGo4WJ1dZD04-LYlYnOqCgQBQUFQoK2YZPd89c1bVGHr17o3F9EXlnUsz83obtBjyzyw9bW3vc2hYsIH6KHwe9w3V4haJR1UmQG9Cajm_cJrw0v6dnk_H7ahIQOH1qHP0DlE1Gzw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SSPFA%3A+effective+stack+smashing+protection+for+Android+OS&rft.jtitle=International+journal+of+information+security&rft.au=Marco-Gisbert%2C+H%C3%A9ctor&rft.au=Ripoll-Ripoll%2C+Ismael&rft.date=2019-08-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=18&rft.issue=4&rft.spage=519&rft.epage=532&rft_id=info:doi/10.1007%2Fs10207-018-00425-8&rft.externalDocID=10_1007_s10207_018_00425_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon