Efficient and extensible security enforcement using dynamic data flow analysis
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[3] Calvin Lin,et al. Incorporating domain-specific information into the compilation process , 2003 .
[4] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[5] D. Avots,et al. Improving software security with a C pointer analysis , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[6] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[7] D. E. Bell,et al. Secure Computer Systems : Mathematical Foundations , 2022 .
[8] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[9] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[10] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[11] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Ravishankar K. Iyer,et al. Defeating memory corruption attacks via pointer taintedness detection , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[13] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[14] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[15] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[16] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[17] Calvin Lin,et al. Broadway: A Compiler for Exploiting the Domain-Specific Semantics of Software Libraries , 2005, Proceedings of the IEEE.
[18] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[19] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[20] Christos Kozyrakis,et al. Raksha: A flexible architecture for software security , 2007, 2007 IEEE Hot Chips 19 Symposium (HCS).
[21] Úlfar Erlingsson,et al. The Inlined Reference Monitor Approach to Security Policy Enforcement , 2004 .
[22] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[23] Jeffrey D. Ullman,et al. Global Data Flow Analysis and Iterative Algorithms , 1976, J. ACM.
[24] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[25] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[26] Larry Wall,et al. Programming Perl , 1991 .
[27] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[28] Anh Nguyen-Tuong,et al. Automatically Hardening Web Applications Using Precise Tainting , 2005, SEC.
[29] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[30] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[31] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[32] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[33] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[34] K. Thompson. Reflections on trusting trust , 1984, CACM.
[35] Robert E. Strom,et al. Typestate: A programming language concept for enhancing software reliability , 1986, IEEE Transactions on Software Engineering.
[36] Calvin Lin,et al. Client-Driven Pointer Analysis , 2003, SAS.
[37] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[38] Benjamin Livshits,et al. Finding application errors and security flaws using PQL: a program query language , 2005, OOPSLA '05.
[39] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[40] Calvin Lin,et al. An annotation language for optimizing software libraries , 1999, DSL '99.
[41] Matthias Hauswirth,et al. Low-overhead memory leak detection using adaptive statistical profiling , 2004, ASPLOS XI.
[42] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[43] J. C. Huang,et al. Detection of Data Flow Anomaly Through Program Instrumentation , 1979, IEEE Transactions on Software Engineering.
[44] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[45] Tzi-cker Chiueh,et al. A General Dynamic Information Flow Tracking Framework for Security Applications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[46] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[47] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[48] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[49] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..