LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
暂无分享,去创建一个
Cheng Wang | Zhenmin Li | Yuanyuan Zhou | Feng Qin | Youfeng Wu | Ho-Seop Kim | Yuanyuan Zhou | Zhenmin Li | Ho-Seop Kim | Youfeng Wu | Cheng Wang | Feng Qin
[1] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[2] James Cheney,et al. Region-based memory management in cyclone , 2002, PLDI '02.
[3] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[4] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[5] Jon G. Riecke,et al. The SLam calculus: programming with secrecy and integrity , 1998, POPL '98.
[6] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[7] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[8] Arash Baratloo,et al. Libsafe: Protecting Critical Elements of Stacks , 2003 .
[9] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[10] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[11] Nicholas Nethercote,et al. Valgrind: A Program Supervision Framework , 2003, RV@CAV.
[12] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[13] Saman Amarasinghe,et al. Dynamic native optimization of interpreters , 2003, IVME '03.
[14] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[15] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[16] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[17] Wen-mei W. Hwu,et al. Compiler-directed dynamic computation reuse: rationale and initial results , 1999, MICRO-32. Proceedings of the 32nd Annual ACM/IEEE International Symposium on Microarchitecture.
[18] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[19] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[20] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[21] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[22] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[23] Cheng Wang,et al. Software-based transparent and comprehensive control-flow error detection , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[24] Roy T. Fielding,et al. The Apache HTTP Server Project , 1997, IEEE Internet Comput..
[25] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[26] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[27] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[28] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[29] Rajiv Gupta,et al. Exploiting a Computation Reuse Cache to Reduce Energy in Network Processors , 2005, HiPEAC.
[30] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[31] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .