Architectural Support for Run-Time Validation of Control Flow Transfer
暂无分享,去创建一个
[1] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[2] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[3] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[4] Jeffrey S. Fenton. Memoryless Subsystems , 1974, Comput. J..
[5] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] Tao Zhang,et al. Anomalous path detection with hardware support , 2005, CASES '05.
[8] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[9] Brad Calder,et al. Automatically characterizing large scale program behavior , 2002, ASPLOS X.
[10] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[11] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[12] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[13] Yale N. Patt,et al. Target prediction for indirect jumps , 1997, ISCA '97.
[14] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[15] Gyungho Lee,et al. Encoded Program Counter: Self-Protection from Buffer Overflow Attacks , 2000, International Conference on Internet Computing.
[16] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[17] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[18] Fredrik Larsson,et al. Simics: A Full System Simulation Platform , 2002, Computer.
[19] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.