Runtime verification of authorization hook placement for the linux security modules framework
暂无分享,去创建一个
[1] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[2] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.
[3] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[4] Peter Gutmann,et al. The Design of a Cryptographic Security Architecture , 1999, USENIX Security Symposium.
[5] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[6] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[7] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[8] Marco Pistoia,et al. Access rights analysis for Java , 2002, OOPSLA '02.
[9] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[11] Peter Gutmann. The design and verification of a cryptographic security architecture , 2000 .
[12] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[13] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[14] Trent Jaeger,et al. Using CQUAL for Static Analysis of Authorization Hook Placement , 2002, USENIX Security Symposium.