Minos: Control Data Attack Prevention Orthogonal to Memory Model
暂无分享,去创建一个
[1] Calvin Ko,et al. Detecting and countering system intrusions using software wrappers , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[2] Konrad Lai,et al. Supporting ada memory management in the iAPX-432 , 1982, ASPLOS I.
[3] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[4] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[5] Andy Oram,et al. Understanding the Linux Kernel, Second Edition , 2002 .
[6] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[7] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[8] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[9] Jun Yang,et al. Fast Secure Processor for Inhibiting Software Piracy and Tampering , 2003, MICRO.
[10] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[11] George Varghese,et al. Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[12] Frederic T. Chong,et al. A security assessment of the minos architecture , 2005, CARN.
[13] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[14] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[15] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS.
[16] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[17] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[18] Joel S. Emer,et al. Techniques to reduce the soft error rate of a high-performance microprocessor , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..
[19] Miodrag Potkonjak,et al. Enabling trusted software integrity , 2002, ASPLOS X.
[20] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[21] Krste Asanovic,et al. Mondrian memory protection , 2002, ASPLOS X.
[22] David A. Patterson,et al. Computer Architecture: A Quantitative Approach , 1969 .
[23] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .
[24] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.