A study of self-propagating mal-packets in sensor networks: Attacks and defenses
暂无分享,去创建一个
[1] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[2] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[3] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[4] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[5] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[6] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[7] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: a software diversity approach , 2008, MobiHoc '08.
[8] Andrew W. Appel,et al. Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..
[9] Claude Castelluccia,et al. Code injection attacks on harvard-architecture devices , 2008, CCS.
[10] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[11] David E. Culler,et al. The nesC language: A holistic approach to networked embedded systems , 2003, PLDI.
[12] Christopher Krügel,et al. Automating Mimicry Attacks Using Static Binary Analysis , 2005, USENIX Security Symposium.
[13] Tzi-cker Chiueh,et al. DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks , 2005, NDSS.
[14] Wenliang Du,et al. Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths , 2004, RAID.
[15] Neeli R. Prasad,et al. Self-propagating worms in wireless sensor networks , 2009, Co-Next Student Workshop '09.
[16] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[17] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[18] Sencun Zhu,et al. SigFree: A Signature-Free Buffer Overflow Attack Blocker , 2010, IEEE Transactions on Dependable and Secure Computing.
[19] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[20] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[21] J. Regehr,et al. Memory Safety and Untrusted Extensions for TinyOS , 2006 .
[22] Eddie Kohler,et al. Harbor: software-based memory protection for sensor nodes , 2007, IPSN '07.
[23] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[24] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[25] Vitaly Osipov,et al. Format String Attacks , 2005 .
[26] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[27] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[28] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[29] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[30] Xiao Ma,et al. AutoISES: Automatically Inferring Security Specification and Detecting Violations , 2008, USENIX Security Symposium.
[31] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[32] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[33] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.