Switchblade: enforcing dynamic personalized system call models
暂无分享,去创建一个
[1] David Brumley,et al. Sting: An End-to-End Self-Healing System for Defending against Internet Worms , 2007, Malware Detection.
[2] Bill McCarty,et al. Selinux: NSA's Open Source Security Enhanced Linux , 2004 .
[3] Hao Wang,et al. Towards automatic generation of vulnerability-based signatures , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[4] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Calton Pu,et al. SubDomain: Parsimonious Server Security , 2000, LISA.
[6] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[7] Mick Bauer,et al. Paranoid penguin: an introduction to Novell AppArmor , 2006 .
[8] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[9] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] David A. Wagner,et al. Mimicry attacks on host-based intrusion detection systems , 2002, CCS '02.
[11] Robert N. M. Watson,et al. Exploiting Concurrency Vulnerabilities in System Call Wrappers , 2007, WOOT.
[12] Christopher Krügel,et al. On the Detection of Anomalous System Call Arguments , 2003, ESORICS.
[13] Bill MacCarty,et al. SELinux - NSA's open source security enhanced linux: beating the o-day vulnerability threat , 2005 .
[14] Deepak Gupta,et al. Binary rewriting and call interception for efficient runtime protection against buffer overflows , 2006, Softw. Pract. Exp..
[15] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[16] Navjot Singh,et al. Transparent Run-Time Defense Against Stack-Smashing Attacks , 2000, USENIX Annual Technical Conference, General Track.
[17] John Wilander,et al. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention , 2003, NDSS.
[18] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[19] Yuanyuan Zhou,et al. Rx: treating bugs as allergies---a safe method to survive software failures , 2005, SOSP '05.
[20] Tal Garfinkel,et al. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools , 2003, NDSS.
[21] David Litchfield. Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server , 2003 .
[22] Noah Treuhaft,et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, , 2002 .
[23] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .
[24] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[25] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[26] Nicholas Nethercote,et al. How to shadow every byte of memory used by a program , 2007, VEE '07.
[27] AvijitKumar,et al. Binary rewriting and call interception for efficient runtime protection against buffer overflows , 2006 .
[28] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[29] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[30] Crispin Cowan,et al. FormatGuard: Automatic Protection From printf Format String Vulnerabilities , 2001, USENIX Security Symposium.
[31] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[32] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[33] Yuanyuan Zhou,et al. Triage: diagnosing production run failures at the user's site , 2007, SOSP.
[34] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[35] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[36] Peter M. Chen,et al. The impact of recovery mechanisms on the likelihood of saving corrupted state , 2002, 13th International Symposium on Software Reliability Engineering, 2002. Proceedings..
[37] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[38] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[39] Matt Bishop,et al. A Flexible Containment Mechanism for Executing Untrusted Code , 2002, USENIX Security Symposium.
[40] David Brumley,et al. Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software , 2006, NDSS.
[41] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[42] Yuanyuan Zhou,et al. Sweeper: a lightweight end-to-end system for defending against fast worms , 2007, EuroSys '07.
[43] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[44] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[45] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[46] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[47] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[48] David Zhang,et al. Secure program execution via dynamic information flow tracking , 2004, ASPLOS XI.
[49] R. Sekar,et al. Dataflow anomaly detection , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[50] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[51] Cheng Wang,et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).