Raksha: a flexible information flow architecture for software security
暂无分享,去创建一个
Christoforos E. Kozyrakis | Michael Dalton | Hari Kannan | C. Kozyrakis | M. Dalton | Hari Kannan | Michael Dalton
[1] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[2] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[3] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[4] Tal Garfinkel,et al. Ostia: A Delegating Architecture for Secure System Call Interposition , 2004, NDSS.
[5] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[6] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[7] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[8] Ravishankar K. Iyer,et al. Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[9] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[10] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[11] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[12] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[13] Tadeusz Pietraszek,et al. Defending Against Injection Attacks Through Context-Sensitive String Evaluation , 2005, RAID.
[14] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[15] Zhendong Su,et al. The essence of command injection attacks in web applications , 2006, POPL '06.
[16] Hsien-Hsin S. Lee,et al. InfoShield: a security architecture for protecting information usage in memory , 2006, The Twelfth International Symposium on High-Performance Computer Architecture, 2006..
[17] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[18] C. Kozyrakis,et al. Deconstructing Hardware Architectures for Security , 2006 .
[19] Benjamin Livshits,et al. SecuriFly: Runtime Protection and Recovery from Web Application Vulnerabilities , 2006 .
[20] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.