StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[2] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[3] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[4] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[5] Barton P. Miller,et al. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services , 1995 .
[6] Calton Pu,et al. Optimistic incremental specialization: streamlining a commercial operating system , 1995, SOSP.
[7] Calton Pu,et al. Fast concurrent dynamic linking for an adaptive operating system , 1996, Proceedings of International Conference on Configurable Distributed Systems.
[8] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[9] Calton Pu,et al. Specialization classes: an object framework for specialization , 1996, Proceedings of the Fifth International Workshop on Object-Orientation in Operation Systems.
[10] Dan S. Wallach,et al. Java security: from HotJava to Netscape and beyond , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[11] Calton Pu,et al. A Toolkit for Specializing Production Operating System Code , 1997 .
[12] Nathan P. Smith,et al. Stack Smashing Vulnerabilities in the UNIX Operating System , 1997 .
[13] Crispin Cowan,et al. Declarative specialization of object-oriented programs , 1997, OOPSLA '97.
[14] Mudge. How to write buffer overflows , 1997 .
[15] Calton Pu,et al. Microlanguages for Operating System Specialization , 1997 .
[16] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).