Retrofitting Security in COTS Software with Binary Rewriting
暂无分享,去创建一个
Angelos D. Keromytis | Rajeev Barua | Matthew Smithson | Aparna Kotha | Pádraig O'Sullivan | Kapil Anand | A. Keromytis | R. Barua | M. Smithson | K. Anand | A. Kotha | Pádraig O'Sullivan
[1] Michael F. P. O'Boyle,et al. Using machine learning to focus iterative optimization , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[2] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[3] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[4] Jack W. Davidson,et al. Secure and practical defense against code-injection attacks using software dynamic translation , 2006, VEE '06.
[5] Eric Rescorla. Security Holes . . . Who Cares? , 2003, USENIX Security Symposium.
[6] Gregory R. Andrews,et al. PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture , 2007 .
[7] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[8] Angelos D. Keromytis,et al. On the General Applicability of Instruction-Set Randomization , 2010, IEEE Transactions on Dependable and Secure Computing.
[9] Calton Pu,et al. Buffer overflows: attacks and defenses for the vulnerability of the decade , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[10] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[11] James C. Foster. Buffer overflow attacks : detect, exploit, prevent , 2005 .
[12] Carl E. Landwehr,et al. Does Open Source Improve System Security? , 2001, IEEE Softw..
[13] R. Barua,et al. Binary Rewriting without Relocation Information , 2010 .
[14] K. De Bosschere,et al. DIABLO: a reliable, retargetable and extensible link-time rewriting framework , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[15] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[16] Rajeev Barua,et al. Decompilation to Compiler High IR in a binary rewriter Kapil , 2010 .
[17] Amitabh Srivastava,et al. Vulcan Binary transformation in a distributed environment , 2001 .
[18] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[19] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[20] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[21] Amitabh Srivastava,et al. Analysis Tools , 2019, Public Transportation Systems.
[22] WittenBrian,et al. Does Open Source Improve System Security , 2001 .
[23] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[24] Barton P. Miller,et al. Dynamic program instrumentation for scalable performance tools , 1994, Proceedings of IEEE Scalable High Performance Computing Conference.
[25] Vitaly Osipov,et al. Windows Buffer Overflows , 2005 .
[26] Alec Wolman,et al. Instrumentation and optimization of Win32/intel executables using Etch , 1997 .
[27] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[28] Tzi-cker Chiueh,et al. BIRD: binary interpretation using runtime disassembly , 2006, International Symposium on Code Generation and Optimization (CGO'06).