Transparent runtime randomization for security
暂无分享,去创建一个
[1] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[2] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[3] Amgad Fayad,et al. Diversity as a Defense Strategy in Information , 2001 .
[4] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[5] Murray Hill,et al. Lint, a C Program Checker , 1978 .
[6] David E. Evans,et al. Static detection of dynamic memory errors , 1996, PLDI '96.
[7] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[8] Calton Pu,et al. A Specialization Toolkit to Increase the Diversity of Operating Systems , 1996 .
[9] Jean-Claude Laprie,et al. Diversity against accidental and deliberate faults , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).
[10] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[11] Amgad Fayad,et al. Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach? , 2001, IICIS.
[12] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[13] Algirdas A. Avi. The Methodology of N-Version Programming , 1995 .
[14] Calton Pu,et al. Optimistic incremental specialization: streamlining a commercial operating system , 1995, SOSP.
[15] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.