Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis
暂无分享,去创建一个
[1] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[2] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[3] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[4] Joseph Robert Horgan,et al. Dynamic program slicing , 1990, PLDI '90.
[5] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[6] Robin Milner,et al. Principal type-schemes for functional programs , 1982, POPL '82.
[7] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[8] Lorenzo Martignoni,et al. Surgically Returning to Randomized lib(c) , 2009, 2009 Annual Computer Security Applications Conference.
[9] Samuel T. King,et al. Digging for Data Structures , 2008, OSDI.
[10] Christopher Krügel,et al. Behavior-based Spyware Detection , 2006, USENIX Security Symposium.
[11] Zhenkai Liang,et al. HookFinder: Identifying and Understanding Malware Hooking Behaviors , 2008, NDSS.
[12] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Frank Tip,et al. Aggregate structure identification and its application to program analysis , 1999, POPL '99.
[14] Martín Abadi,et al. Control-flow integrity , 2005, CCS '05.
[15] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[16] Daniel C. DuVarney,et al. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits , 2003, USENIX Security Symposium.
[17] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[18] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[19] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[20] user surfaces,et al. Data Execution Prevention , 2011 .
[21] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[22] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[23] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[24] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[25] Wenke Lee,et al. K-Tracer: A System for Extracting Kernel Malware Behavior , 2009, NDSS.
[26] Crispin Cowan,et al. StackGuard: Simple Stack Smash Protection for GCC , 2004 .
[27] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[28] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[29] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[30] Samuel T. King,et al. Backtracking intrusions , 2003, SOSP '03.
[31] Heng Yin. TEMU: Binary Code Analysis via Whole-System Layered Annotative Execution , 2010 .
[32] Peng Ning,et al. Automatic diagnosis and response to memory corruption vulnerabilities , 2005, CCS '05.