e-NeXSh: achieving an effectively non-executable stack and heap via system-call policing
暂无分享,去创建一个
[1] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[2] Somesh Jha,et al. Formalizing sensitivity in static analysis for intrusion detection , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[3] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[4] Steve J. Chapin,et al. Type-Assisted Dynamic Buffer Overflow Detection , 2002, USENIX Security Symposium.
[5] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[7] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[8] Dawn Song,et al. Mitigating buffer overflows by operating system randomization , 2002 .
[9] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[10] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[11] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[12] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[13] John Wilander,et al. A Comparison of Publicly Available Tools for Static Intrusion Prevention , 2002 .
[14] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[15] Dan S. Wallach,et al. Understanding Java stack inspection , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[16] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[17] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] Tzi-cker Chiueh,et al. Automatic extraction of accurate application-specific sandboxing policy , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[19] Tzi-cker Chiueh,et al. A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks , 2003, USENIX Annual Technical Conference, General Track.
[20] Tal Garfinkel,et al. Ostia: A Delegating Architecture for Secure System Call Interposition , 2004, NDSS.
[21] Wenliang Du,et al. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths , 2004, RAID.
[22] L.D. Paulson. Viewing the world through interactive panoramic images , 2004, Computer.
[23] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[24] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[25] Paul A. Karger. Using registers to optimize cross-domain call performance , 1989, ASPLOS III.
[26] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[27] Stephen A. Edwards,et al. CASPER: Compiler-Assisted Securing of Programs at Runtime , 2002 .
[28] Pau-Chen Cheng,et al. BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.
[29] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[30] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[31] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[32] Darren C. Atkinson. Call Graph Extraction in the Presence of Function Pointers , 2002 .
[33] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[34] Somesh Jha,et al. Efficient Context-Sensitive Intrusion Detection , 2004, NDSS.
[35] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[36] Christian S. Collberg,et al. Protecting Against Unexpected System Calls , 2005, USENIX Security Symposium.
[37] L.D. Paulson. New chips stop buffer overflow attacks , 2004, Computer.
[38] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[39] Diomidis Spinellis,et al. Sandboxing Applications , 2001, USENIX Annual Technical Conference, FREENIX Track.
[40] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[41] Christopher Krügel,et al. Automating Mimicry Attacks Using Static Binary Analysis , 2005, USENIX Security Symposium.
[42] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[43] Jesse C. Rabek,et al. Detection of injected, dynamically generated, and obfuscated malicious code , 2003, WORM '03.
[44] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[45] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[46] Debin Gao,et al. On Gray-Box Program Tracking for Anomaly Detection , 2004, USENIX Security Symposium.
[47] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[48] Gregory R. Andrews,et al. PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture , 2007 .