Consistency analysis of authorization hook placement in the Linux security modules framework
暂无分享,去创建一个
[1] Dawson R. Engler,et al. Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.
[2] Somesh Jha,et al. Buffer overrun detection using linear programming and static analysis , 2003, CCS '03.
[3] David A. Wagner,et al. Model Checking One Million Lines of C Code , 2004, NDSS.
[4] Dawson R. Engler,et al. A system and language for building system-specific, static analyses , 2002, PLDI '02.
[5] Marco Pistoia,et al. Access rights analysis for Java , 2002, OOPSLA '02.
[6] Todd M. Austin,et al. High Coverage Detection of Input-Related Security Faults , 2003, USENIX Security Symposium.
[7] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[8] Peter Gutmann,et al. The Design of a Cryptographic Security Architecture , 1999, USENIX Security Symposium.
[9] Trent Jaeger,et al. Runtime verification of authorization hook placement for the linux security modules framework , 2002, CCS '02.
[10] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[11] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[12] Alex Groce,et al. Modular verification of software components in C , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..
[13] Gary McGraw,et al. ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[14] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[15] Emden R. Gansner,et al. Drawing graphs with dot , 2006 .
[16] Trent Jaeger,et al. Using CQUAL for Static Analysis of Authorization Hook Placement , 2002, USENIX Security Symposium.
[17] Peter Gutmann. The design and verification of a cryptographic security architecture , 2000 .
[18] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[19] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[20] Sriram K. Rajamani,et al. SLAM and Static Driver Verifier: Technology Transfer of Formal Methods inside Microsoft , 2004, IFM.
[21] Alexander Aiken,et al. A theory of type qualifiers , 1999, PLDI '99.
[22] Sorin Lerner,et al. ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.
[23] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .