PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities
暂无分享,去创建一个
John Johansen | Crispin Cowan | Perry Wagle | Steve Beattie | S. Beattie | Crispin Cowan | J. Johansen | P. Wagle | Steve Beattie | Perry Wagle
[1] Brian W. Kernighan,et al. The C Programming Language , 1978 .
[2] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[3] Calton Pu,et al. Protecting Systems from Stack Smashing Attacks with StackGuard , 1999 .
[4] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[5] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[6] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[7] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[8] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[9] Corporate Motorola,et al. MC 68000 16-Bit Microprocessor User's Manual , 1982 .
[10] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[11] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[12] Bjarne Stroustrup,et al. C++ Programming Language , 1986, IEEE Softw..
[13] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[14] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[15] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.