Diagnosis and Emergency Patch Generation for Integer Overflow Exploits
暂无分享,去创建一个
[1] David R. Cok. The SMT-LIBv2 Language and Tools: A Tutorial , 2012 .
[2] Olatunji Ruwase,et al. Decoupled lifeguards: enabling path optimizations for dynamic correctness checking tools , 2010, PLDI '10.
[3] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[4] Jun Xu,et al. Packet vaccine: black-box exploit detection and signature generation , 2006, CCS '06.
[5] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[6] Angelos D. Keromytis,et al. Using Rescue Points to Navigate Software Recovery , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[7] Bart Preneel,et al. Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.
[8] Michael D. Ernst,et al. Automatically patching errors in deployed software , 2009, SOSP '09.
[9] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM 2004.
[10] Zhenkai Liang,et al. Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration , 2009, RAID.
[11] Name M. Lastname. Automatically Finding Patches Using Genetic Programming , 2013 .
[12] Guofei Gu,et al. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution , 2011, TSEC.
[13] Yuanyuan Zhou,et al. Sweeper: a lightweight end-to-end system for defending against fast worms , 2007, EuroSys '07.
[14] Hao Wang,et al. Creating Vulnerability Signatures Using Weakest Preconditions , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[15] Xi Wang,et al. Improving Integer Security for Systems with KINT , 2012, OSDI.
[16] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[17] Zhenkai Liang,et al. Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis , 2012, NDSS.
[18] Fan Long,et al. Automatic input rectification , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[19] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[20] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[21] Angelos D. Keromytis,et al. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware , 2012, NDSS.
[22] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[23] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[24] Zack Coker,et al. Program transformations to fix C integers , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[25] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[26] David Brumley,et al. Tachyon: Tandem Execution for Efficient Live Patch Testing , 2012, USENIX Security Symposium.
[27] Helen J. Wang,et al. ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[28] Manuel Costa,et al. Bouncer: securing software by blocking bad input , 2008, WRAITS '08.
[29] Angelos D. Keromytis,et al. Building a Reactive Immune System for Software Services , 2005, USENIX Annual Technical Conference, General Track.
[30] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[31] Xuxian Jiang,et al. AutoPaG: towards automated software patch generation with source code root cause identification and repair , 2007, ASIACCS '07.
[32] Leyla Bilge,et al. Before we knew it: an empirical study of zero-day attacks in the real world , 2012, CCS.
[33] Angelos D. Keromytis,et al. libdft: practical dynamic data flow tracking for commodity systems , 2012, VEE '12.
[34] Chao Zhang,et al. IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time , 2010, ESORICS.
[35] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[36] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[37] Peng Li,et al. Understanding integer overflow in C/C++ , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[38] Zuoning Yin,et al. How Do Fixes Become Bugs? A Comprehensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating Systems , 2011 .
[39] Angelos D. Keromytis,et al. ASSURE: automatic software self-healing using rescue points , 2009, ASPLOS.
[40] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[41] Ding Yuan,et al. How do fixes become bugs? , 2011, ESEC/FSE '11.
[42] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[43] David Brumley,et al. RICH: Automatically Protecting Against Integer-Based Vulnerabilities , 2007, NDSS.
[44] Peng Ning,et al. Automatic diagnosis and response to memory corruption vulnerabilities , 2005, CCS '05.