Architectural Support for Run-Time Validation of Program Data Properties
暂无分享,去创建一个
Srivaths Ravi | Niraj K. Jha | Anand Raghunathan | Divya Arora | N. Jha | A. Raghunathan | S. Ravi | Divya Arora
[1] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[2] Srivaths Ravi,et al. Security as a new dimension in embedded system design , 2004, Proceedings. 41st Design Automation Conference, 2004..
[3] Thomas W. Reps,et al. Debugging via Run-Time Type Checking , 2001, FASE.
[4] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[5] Miodrag Potkonjak,et al. MediaBench: a tool for evaluating and synthesizing multimedia and communications systems , 1997, Proceedings of 30th Annual International Symposium on Microarchitecture.
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] Gary McGraw,et al. Java security: hostile applets, holes&antidotes , 1997 .
[8] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[9] Norman P. Jouppi,et al. CACTI: an enhanced cache access and cycle time model , 1996, IEEE J. Solid State Circuits.
[10] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[11] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[12] Christopher Krügel,et al. Run-time Detection of Heap-based Overflows , 2003, LISA.
[13] Mikhail J. Atallah,et al. Protecting Software Code by Guards , 2001, Digital Rights Management Workshop.
[14] Srivaths Ravi,et al. Secure embedded processing through hardware-assisted run-time monitoring , 2005, Design, Automation and Test in Europe.
[15] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[16] Dan Boneh,et al. Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .
[17] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[18] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[19] Calton Pu,et al. A Toolkit for Specializing Production Operating System Code , 1997 .
[20] Zhen Xiao,et al. Detecting heap smashing attacks through fault containment wrappers , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.
[21] David LeBlanc,et al. Writing Secure Code , 2001 .
[22] David A. Patterson,et al. Computer architecture (2nd ed.): a quantitative approach , 1996 .
[23] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[24] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[25] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[26] Todd M. Austin,et al. The SimpleScalar tool set, version 2.0 , 1997, CARN.
[27] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[28] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[29] David Brumley,et al. Privtrans: Automatically Partitioning Programs for Privilege Separation , 2004, USENIX Security Symposium.
[30] Trevor Mudge,et al. MiBench: A free, commercially representative embedded benchmark suite , 2001 .
[31] Deepak Gupta,et al. TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection , 2004, USENIX Security Symposium.