Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
暂无分享,去创建一个
Michael Franz | Babak Salamat | Andreas Gal | Todd Jackson | Karthikeyan Manivannan | Gregor Wagner | M. Franz | Babak Salamat | Todd Jackson | Karthikeyan Manivannan | Gregor Wagner | A. Gal
[1] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[2] David Kaeli,et al. A reliable return address stack: microarchitectural features to defeat stack smashing , 2005, CARN.
[3] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[4] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[5] Zhao Zhang,et al. Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks , 2006, IEEE Micro.
[6] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[7] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[8] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[9] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[10] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[11] David H. Ackley,et al. Randomized instruction set emulation , 2005, TSEC.