Secure program execution via dynamic information flow tracking
暂无分享,去创建一个
David Zhang | G. Edward Suh | Srinivas Devadas | Jae W. Lee | S. Devadas | G. Suh | Jae W. Lee | David Zhang | Edward Suh | Jaewook Lee | Jaewook Lee | Srini Devadas
[1] Harry J. Saal. A hardware architecture for controlling information flow , 1978, ISCA '78.
[2] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[3] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[4] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[5] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[6] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[7] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[8] John L. Henning. SPEC CPU2000: Measuring CPU Performance in the New Millennium , 2000, Computer.
[9] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[10] Norman P. Jouppi,et al. Cacti 3. 0: an integrated cache timing, power, and area model , 2001 .
[11] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[12] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[13] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[14] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[15] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[16] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[17] Jun Xu,et al. Architecture Support for Defending Against Buffer Overflow Attacks , 2002 .
[18] Somesh Jha,et al. Buffer overrun detection using linear programming and static analysis , 2003, CCS '03.
[19] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[20] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[21] Ruby B. Lee,et al. Enlisting Hardware Architecture to Thwart Malicious Code Injection , 2004, SPC.
[22] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[23] Marten van Dijk,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS '03.
[24] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[25] Vitaly Osipov,et al. Format String Attacks , 2005 .