Architecture Support for Defending Against Buffer Overflow Attacks
暂无分享,去创建一个
[1] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[2] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[3] David E. Evans,et al. Static detection of dynamic memory errors , 1996, PLDI '96.
[4] Arash Baratloo,et al. Libsafe: Protecting Critical Elements of Stacks , 2003 .
[5] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[6] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[7] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[8] Doug Burger,et al. Evaluating Future Microprocessors: the SimpleScalar Tool Set , 1996 .
[9] Margaret Martonosi,et al. Improving prediction for procedure returns with return-address-stack repair mechanisms , 1998, Proceedings. 31st Annual ACM/IEEE International Symposium on Microarchitecture.
[10] Murray Hill,et al. Lint, a C Program Checker , 1978 .
[11] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.