Static Binary Analysis And Transformation For Sandboxing Untrusted Plugins A Thesis Presented
暂无分享,去创建一个
[1] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[2] A. Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Applications , 1999 .
[3] George C. Necula,et al. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs , 2002, CC.
[4] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[5] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).
[6] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[7] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[8] Somesh Jha,et al. Testing malware detectors , 2004, ISSTA '04.
[9] Cheng Wang,et al. Software-based transparent and comprehensive control-flow error detection , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[10] Sy-Yen Kuo,et al. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management , 2004, LISA.
[11] David Wagner. Janus: an Approach for Confinement of Untrusted Applications , 1999 .
[12] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[13] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[14] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[15] David A. Wagner,et al. Large-scale analysis of format string vulnerabilities in Debian Linux , 2007, PLAS '07.
[16] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[17] Tzi-cker Chiueh,et al. BIRD: binary interpretation using runtime disassembly , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[18] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[19] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[20] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[21] Úlfar Erlingsson,et al. IRM enforcement of Java stack inspection , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[22] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[23] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[24] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[25] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[26] François Bourdoncle,et al. Efficient chaotic iteration strategies with widenings , 1993, Formal Methods in Programming and Their Applications.
[27] Gregory R. Andrews,et al. Disassembly of executable code revisited , 2002, Ninth Working Conference on Reverse Engineering, 2002. Proceedings..