VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection
暂无分享,去创建一个
[1] Jack W. Davidson,et al. Secure and practical defense against code-injection attacks using software dynamic translation , 2006, VEE '06.
[2] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[3] Aleksandar Milenkovic,et al. Hardware support for code integrity in embedded processors , 2005, CASES '05.
[4] Simon Shiu,et al. Hardware Encapsulation of Security Services , 2003, ESORICS.
[5] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[6] Alessandro De Gloria. VISA: A variable instruction set architecture , 1990, CARN.
[7] Zhiwei Xu,et al. Scalable Parallel Computing: Technology, Architecture, Programming , 1998 .
[8] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[9] Sergey Bratus,et al. The cake is a lie: privilege rings as a policy resource , 2009, VMSec '09.
[10] Mohammad Zulkernine,et al. Taxonomy and classification of automatic monitoring of program security vulnerability exploitations , 2011, J. Syst. Softw..
[11] Sergey Bratus,et al. VM-based security overkill: a lament for applied systems security research , 2010, NSPW '10.
[12] Chris I. Dalton,et al. Separating hypervisor trusted computing base supported by hardware , 2010, STC '10.
[13] Antonio González,et al. Instruction scheduling for clustered VLIW architectures , 2000, ISSS '00.
[14] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[15] Dan Boneh,et al. Address space randomization for mobile devices , 2011, WiSec '11.
[16] Angelos D. Keromytis,et al. Fast and practical instruction-set randomization for commodity systems , 2010, ACSAC '10.
[17] Fred C. Chow,et al. Variable Instruction Set Architecture and Its Compiler Support , 2003, IEEE Trans. Computers.
[18] Nathanael Paul,et al. Where's the FEEB? The Effectiveness of Instruction Set Randomization , 2005, USENIX Security Symposium.
[19] F. Jesús Sánchez Navarro,et al. Instruction scheduling for clustered VLIW architectures , 2000 .
[20] David H. Ackley,et al. Randomized instruction set emulation , 2005, TSEC.