Defeating memory corruption attacks via pointer taintedness detection
暂无分享,去创建一个
Ravishankar K. Iyer | Nithin Nakka | Zbigniew T. Kalbarczyk | Jun Xu | Shuo Chen | Z. Kalbarczyk | Shuo Chen | Nithin Nakka | R. Iyer | Jun Xu
[1] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[2] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[3] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[4] Ravishankar K. Iyer,et al. Transparent runtime randomization for security , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..
[5] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[6] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[7] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[8] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[9] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[10] Vitaly Osipov,et al. Format String Attacks , 2005 .
[11] David Evans,et al. Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..
[12] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[13] Brian Chess,et al. Improving computer security using extended static checking , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[14] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[15] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[16] Ravishankar K. Iyer,et al. Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics , 2004, SEC.