Defending embedded systems against buffer overflow via hardware/software
暂无分享,去创建一个
[1] Steve J. Chapin,et al. Type-Assisted Dynamic Buffer Overflow Detection , 2002, USENIX Security Symposium.
[2] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[3] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[4] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[5] Proceedings. 19th Annual Computer Security Applications Conference , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[6] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[7] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[8] Matt Bishop,et al. Testing C Programs for Buffer Overflow Vulnerabilities , 2003, NDSS.
[9] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[10] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[11] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[12] Edwin Hsing-Mean Sha,et al. Security protection and checking in embedded system integration against buffer overflow attacks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[13] Matt Bishop,et al. Property-based testing: a new approach to testing for assurance , 1997, SOEN.
[14] Gerardo Richarte. Four dierent tricks to bypass StackShield and StackGuard protection , 2002, WWW 2002.
[15] Donn Seeley,et al. A Tour of the Worm , 1988 .
[16] Karl N. Levitt,et al. An Interface Language Between Specifications and Testing , 1995 .
[17] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[18] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[19] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[20] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[21] Tadayoshi Kohno,et al. Token-based scanning of source code for security problems , 2002, TSEC.
[22] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[23] Karl N. Levitt,et al. Towards a Property-Based Testing Environment With Applications to Security-Critical Software , 1994 .