Control-flow integrity principles, implementations, and applications
暂无分享,去创建一个
Mihai Budiu | Úlfar Erlingsson | Martín Abadi | Jay Ligatti | M. Abadi | M. Budiu | Ú. Erlingsson | Jay Ligatti
[1] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[2] Paul Gochet,et al. The Syntactic Approach , 1980 .
[3] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[4] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[5] Tsutomu Hoshino,et al. The PAX project , 1992 .
[6] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[7] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[8] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[9] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] Christopher Small. MiSFIT: A Tool for Constructing Safe Extensible C++ Systems , 1997, COOTS.
[11] Martín Abadi,et al. Protection in Programming-Language Translations , 1998, ICALP.
[12] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[13] Úlfar Erlingsson,et al. SASI enforcement of security policies: a retrospective , 1999, NSPW '99.
[14] Martín Abadi. Protection in Programming-Language Translations , 1999, Secure Internet Programming.
[15] MorrisettGreg,et al. From system F to typed assembly language , 1999 .
[16] David E. Evans,et al. Policy-directed code safety , 2000 .
[17] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[18] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[19] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[20] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[21] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[22] Amitabh Srivastava,et al. Vulcan Binary transformation in a distributed environment , 2001 .
[23] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[24] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[25] Tzi-cker Chiueh,et al. RAD: a compile-time solution to buffer overflow attacks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[26] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[27] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[28] Jack W. Davidson,et al. Safe virtual execution using software dynamic translation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[29] Jun Xu,et al. Architecture Support for Defending Against Buffer Overflow Attacks , 2002 .
[30] Darren C. Atkinson. Call Graph Extraction in the Presence of Function Pointers , 2002 .
[31] Somesh Jha,et al. Detecting Manipulated Remote Call Streams , 2002, USENIX Security Symposium.
[32] Edward J. McCluskey,et al. Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..
[33] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[34] Todd M. Austin,et al. High Coverage Detection of Input-Related Security Faults , 2003, USENIX Security Symposium.
[35] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[36] John P. Hayes,et al. Low-cost on-line fault detection using control flow assertions , 2003, 9th IEEE On-Line Testing Symposium, 2003. IOLTS 2003..
[37] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[38] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[39] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[40] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[41] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[42] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[43] Andrew W. Appel,et al. Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..
[44] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[45] Alan Eustace,et al. ATOM - A System for Building Customized Program Analysis Tools , 1994, PLDI.
[46] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[47] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[48] David Brumley,et al. Privtrans: Automatically Partitioning Programs for Privilege Separation , 2004, USENIX Security Symposium.
[49] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[50] Zhong Shao,et al. A Syntactic Approach to Foundational Proof-Carrying Code , 2004, Journal of Automated Reasoning.
[51] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[52] Deepak Gupta,et al. TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection , 2004, USENIX Security Symposium.
[53] Somesh Jha,et al. Formalizing sensitivity in static analysis for intrusion detection , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[54] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[55] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[56] Úlfar Erlingsson,et al. The Inlined Reference Monitor Approach to Security Policy Enforcement , 2004 .
[57] Samik Basu,et al. Proxy-Annotated Control Flow Graphs: Deterministic Context-Sensitive Monitoring for Intrusion Detection , 2004, ICDCIT.
[58] Barton P. Miller,et al. Practical analysis of stripped binary code , 2005, CARN.
[59] Lujo Bauer,et al. Composing security policies with polymer , 2005, PLDI.
[60] Jan Vitek,et al. Efficient intrusion detection using automaton inlining , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[61] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[62] Manuel M. T. Chakravarty,et al. Secure Untrusted Binaries - Provably! , 2005, Formal Aspects in Security and Trust.
[63] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[64] David I. August,et al. SWIFT: software implemented fault tolerance , 2005, International Symposium on Code Generation and Optimization.
[65] Martín Abadi,et al. A Theory of Secure Control Flow , 2005, ICFEM.
[66] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[67] Tzi-cker Chiueh,et al. Automatic extraction of accurate application-specific sandboxing policy , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[68] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[69] Stephen McCamant,et al. Efficient, Verifiable Binary Sandboxing for a CISC Architecture , 2005 .
[70] Martín Abadi,et al. Architectural support for software-based protection , 2006, ASID '06.
[71] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[72] Josep Torrellas,et al. Proceedings of the 1st workshop on Architectural and system support for improving software dependability , 2006, ASPLOS 2006.
[73] Avishai Wool,et al. Install-time vaccination of Windows executables to defend against stack smashing attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[74] Andrew Kennedy. Securing the .NET programming model , 2006, Theor. Comput. Sci..
[75] David A. Patterson,et al. Computer Architecture - A Quantitative Approach (4. ed.) , 2007 .
[76] David A. Patterson,et al. Computer Architecture, Fifth Edition: A Quantitative Approach , 2011 .