Automated Software Vulnerability Analysis
暂无分享,去创建一个
[1] Nicholas Nethercote,et al. Dynamic Binary Analysis and Instrumentation , 2004 .
[2] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[3] Zhenkai Liang,et al. Fast and automated generation of attack signatures: a basis for building self-protecting servers , 2005, CCS '05.
[4] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[6] Wei Liu,et al. AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[7] G. Ramalingam,et al. The undecidability of aliasing , 1994, TOPL.
[8] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, SIGP.
[9] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[10] Peng Ning,et al. Memsherlock: an automated debugger for unknown memory corruption vulnerabilities , 2007, CCS '07.
[11] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[12] Somesh Jha,et al. Formalizing sensitivity in static analysis for intrusion detection , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Eric Chien,et al. BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES , 2002 .
[14] Kathryn S. McKinley,et al. Hoard: a scalable memory allocator for multithreaded applications , 2000, SIGP.
[15] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[16] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[17] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[18] Peng Ning,et al. Automated Security Debugging Using Program Structural Constraints , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[19] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[20] Zhendong Su,et al. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits , 2005, CCS '05.
[21] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM 2004.
[22] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[23] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[24] David A. Wagner,et al. Model Checking One Million Lines of C Code , 2004, NDSS.