TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting
暂无分享,去创建一个
Bei Yu | Winnie Cheng | Qin Zhao | Scott Hiroshige | Qin Zhao | Bei Yu | Scott Hiroshige | Winnie Cheng
[1] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[2] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[3] Dawson R. Engler,et al. Using programmer-written compiler extensions to catch security holes , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[5] James Newsom,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, Network and Distributed System Security Symposium Conference Proceedings : 2005 , 2005 .
[6] Nicholas Nethercote,et al. Dynamic Binary Analysis and Instrumentation , 2004 .
[7] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[8] Nicholas Nethercote,et al. Using Valgrind to Detect Undefined Value Errors with Bit-Precision , 2005, USENIX Annual Technical Conference, General Track.
[9] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[10] Tal Garfinkel,et al. Understanding data lifetime via whole system simulation , 2004 .
[11] Derek Bruening,et al. Efficient, transparent, and comprehensive runtime code manipulation , 2004 .
[12] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.