Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction
暂无分享,去创建一个
[1] Mark David Weiser,et al. Program slices: formal, psychological, and practical investigations of an automatic program abstraction method , 1979 .
[2] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[3] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[4] Garbage Collection and Local Variable Type-Precision and Liveness in Java Virtual Machines , 1998, PLDI.
[5] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[6] David Detlefs,et al. Garbage collection and local variable type-precision and liveness in Java virtual machines , 1998, PLDI.
[7] Swapna S. Gokhale,et al. Quantifying the closeness between program components and features , 2000, J. Syst. Softw..
[8] Andreas Zeller,et al. Visualizing Memory Graphs , 2001, Software Visualization.
[9] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[10] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[12] Space efficient conservative garbage collection , 2004, SIGP.
[13] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[14] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[15] Stéphane Ducasse,et al. Correlating features and code using a compact two-sided trace analysis approach , 2005, Ninth European Conference on Software Maintenance and Reengineering.
[16] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[17] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[18] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[19] Frederic T. Chong,et al. Minos: Architectural support for protecting control data , 2006, TACO.
[20] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[21] Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI.
[22] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[23] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[24] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[25] Simon Heron. Parasitic Malware: Parasitic malware: The resurgence of an old threat , 2008 .
[26] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[27] Julio Canto,et al. Large scale malware collection : lessons learned , 2008 .
[28] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[29] Ravishankar K. Iyer,et al. Discovering Application-Level Insider Attacks Using Symbolic Execution , 2009, SEC.
[30] X. Zhang,et al. Reuse-Oriented Camouflaging Attack : Vulnerability Detection and Attack Construction , 2009 .
[31] Angelos D. Keromytis. Randomized Instruction Sets and Runtime Environments Past Research and Future Directions , 2009, IEEE Security & Privacy Magazine.
[32] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[33] Christopher Krügel,et al. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries , 2010, 2010 IEEE Symposium on Security and Privacy.