SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data
暂无分享,去创建一个
Frédéric Tronel | Eric Totel | Jonathan-Christofer Demay | F. Tronel | Jonathan-Christofer Demay | Eric Totel
[1] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[2] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[3] Christopher Krügel,et al. Automating Mimicry Attacks Using Static Binary Analysis , 2005, USENIX Security Symposium.
[4] Giovanni Vigna,et al. Exploiting Execution Context for the Detection of Anomalous System Calls , 2007, RAID.
[5] Jacob A. Abraham,et al. CEDA: control-flow error detection through assertions , 2006, 12th IEEE International On-Line Testing Symposium (IOLTS'06).
[6] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[7] Enric Rodríguez-Carbonell,et al. Automatic generation of polynomial invariants of bounded degree using abstract interpretation , 2007, Sci. Comput. Program..
[8] Debin Gao,et al. Gray-box extraction of execution graphs for anomaly detection , 2004, CCS '04.
[9] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[10] R. Sekar,et al. Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.
[11] David A. Padua,et al. Dependence graphs and compiler optimizations , 1981, POPL '81.
[12] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[13] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[14] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[15] Massimo Violante,et al. Soft-error detection using control flow assertions , 2003, Proceedings 18th IEEE Symposium on Defect and Fault Tolerance in VLSI Systems.
[16] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[17] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[18] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[19] David W. Binkley,et al. Program slicing , 2008, 2008 Frontiers of Software Maintenance.
[20] R. Sekar,et al. A practical mimicry attack against powerful system-call monitors , 2008, ASIACCS '08.
[21] Christopher Krügel,et al. On the Detection of Anomalous System Call Arguments , 2003, ESORICS.