Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution
暂无分享,去创建一个
[1] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[2] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[3] Chaitali Chakrabarti,et al. A programmable processor for cryptography , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[4] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[5] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[6] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[7] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[8] Jack W. Davidson,et al. Secure and practical defense against code-injection attacks using software dynamic translation , 2006, VEE '06.
[9] U. Bayer,et al. TTAnalyze: A Tool for Analyzing Malware , 2006 .
[10] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[11] Brian Rogers,et al. Memory predecryption: hiding the latency overhead of memory encryption , 2005, CARN.
[12] Peng Ning,et al. Automatic diagnosis and response to memory corruption vulnerabilities , 2005, CCS '05.
[13] Angelos D. Keromytis,et al. On the General Applicability of Instruction-Set Randomization , 2010, IEEE Transactions on Dependable and Secure Computing.
[14] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[15] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[16] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[17] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[18] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[19] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[20] David H. Ackley,et al. Randomized instruction set emulation , 2005, TSEC.
[21] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[22] Angelos D. Keromytis,et al. Drop-in security for distributed and portable computing elements , 2003, Internet Res..
[23] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[24] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[25] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[26] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[27] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[28] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[29] Jonathan D. Pincus,et al. Beyond stack smashing: recent advances in exploiting buffer overruns , 2004, IEEE Security & Privacy Magazine.
[30] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[31] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[32] Salvatore J. Stolfo,et al. FLIPS: Hybrid Adaptive Intrusion Prevention , 2005, RAID.
[33] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[34] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.