Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors
暂无分享,去创建一个
Miguel Castro | Steven Hand | Periklis Akritidis | Manuel Costa | M. Castro | Manuel Costa | S. Hand | P. Akritidis
[1] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[2] Todd M. Austin,et al. High Coverage Detection of Input-Related Security Faults , 2003, USENIX Security Symposium.
[3] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[4] Vikram S. Adve,et al. A Virtual Instruction Set Interface for Operating System Kernels , 2022 .
[5] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[6] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[7] Wei Xu,et al. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks , 2006, USENIX Security Symposium.
[8] Margo I. Seltzer,et al. Dealing with disaster: surviving misbehaved kernel extensions , 1996, OSDI '96.
[9] Michael L. Scott,et al. Programming Language Pragmatics , 1999 .
[10] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[11] Mattia Monga,et al. A Smart Fuzzer for x86 Executables , 2007, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007).
[12] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[13] Jared D. DeMott. The Evolving Art of Fuzzing , 2006 .
[14] Miguel Castro,et al. Can we contain Internet worms , 2004 .
[15] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[16] David A. Wagner,et al. Large-scale analysis of format string vulnerabilities in Debian Linux , 2007, PLAS '07.
[17] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[18] Tal Garfinkel,et al. Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation , 2005, USENIX Security Symposium.
[19] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[20] Aaron B. Brown,et al. A Decompositional Approach to Computer System Performance Evaluation , 1997 .
[21] Wei Xu,et al. An efficient and backwards-compatible transformation to ensure memory safety of C programs , 2004, SIGSOFT '04/FSE-12.
[22] William R. Bush,et al. A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..
[23] Emery D. Berger,et al. DieHard: probabilistic memory safety for unsafe languages , 2006, PLDI '06.
[24] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[25] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[26] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[27] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[28] Hans-Juergen Boehm,et al. Garbage collection in an uncooperative environment , 1988, Softw. Pract. Exp..
[29] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[30] Martin Vuagnoux,et al. Autodafé: an Act of Software Torture , 2005 .
[31] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[32] George C. Necula,et al. SafeDrive: safe and recoverable extensions using language-based techniques , 2006, OSDI '06.
[33] Michael Golm,et al. The JX Operating System , 2002, USENIX Annual Technical Conference, General Track.
[34] Paul H. J. Kelly,et al. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs , 1997, AADEBUG.
[35] Martín Abadi,et al. An Overview of the Singularity Project , 2005 .
[36] Markus S. Miller,et al. Towards a Verified , General-Purpose Operating System Kernel † , 2004 .
[37] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[38] William J. Bolosky,et al. Mach: A New Kernel Foundation for UNIX Development , 1986, USENIX Summer.
[39] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[40] Daniel M. Roy,et al. Enhancing Server Availability and Security Through Failure-Oblivious Computing , 2004, OSDI.
[41] Vikram S. Adve,et al. Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007, PLDI '07.
[42] Mark P. Jones,et al. A principled approach to operating system construction in Haskell , 2005, ICFP '05.
[43] Olatunji Ruwase,et al. A Practical Dynamic Buffer Overflow Detector , 2004, NDSS.
[44] David Brumley,et al. RICH: Automatically Protecting Against Integer-Based Vulnerabilities , 2007, NDSS.
[45] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[46] Christoforos E. Kozyrakis,et al. Real-World Buffer Overflow Protection for Userspace and Kernelspace , 2008, USENIX Security Symposium.
[47] Andrew Warfield,et al. Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .
[48] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[49] Brian N. Bershad,et al. Extensibility safety and performance in the SPIN operating system , 1995, SOSP.
[50] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[51] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[52] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[53] Laurent Réveillère,et al. Devil: an IDL for hardware programming , 2000, OSDI.
[54] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[55] Dinakar Dhurjati,et al. Secure virtual architecture: a safe execution environment for commodity operating systems , 2007, SOSP.
[56] Krste Asanovic,et al. Mondrix: memory isolation for linux using mondriaan memory protection , 2005, SOSP '05.
[57] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[58] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[59] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[60] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[61] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[62] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[63] Nicholas Nethercote,et al. Using Valgrind to Detect Undefined Value Errors with Bit-Precision , 2005, USENIX Annual Technical Conference, General Track.
[64] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[65] Dinakar Dhurjati,et al. Backwards-compatible array bounds checking for C with very low overhead , 2006, ICSE.
[66] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[67] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[68] Robert A. Martin,et al. Vulnerability Type Distributions in CVE , 2007 .
[69] Susan Horwitz,et al. Protecting C programs from attacks via invalid pointer dereferences , 2003, ESEC/FSE-11.
[70] David R. Cheriton,et al. A caching model of operating system kernel functionality , 1994, OSDI '94.
[71] Jonathan Adams,et al. Design Evolution of the EROS Single-Level Store , 2002, USENIX Annual Technical Conference, General Track.
[72] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[73] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[74] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[75] Tom Saulpaugh,et al. Inside the JavaOS operating system , 1999 .
[76] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[77] Brian N. Bershad,et al. Language Support for Extensible Operating Systems , 2007 .
[78] N. Nethercote. Bounds-Checking Entire Programs without Recompiling [ Extended , 2004 .