메뉴 건너뛰기




Volumn , Issue , 2000, Pages 174-183

Operating system enhancements to prevent the misuse of system calls

Author keywords

Access control database; Buffer overflow based attacks; Isolation; Linux; System calls interception

Indexed keywords

ALGORITHMS; CODE CONVERTERS; COMPUTER CONTROL SYSTEMS; DATA STRUCTURES; PROGRAM COMPILERS; SOFTWARE PROTOTYPING; UNIX;

EID: 0034447846     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/352600.352624     Document Type: Conference Paper
Times cited : (50)

References (22)
  • 6
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing StackGuard and stackshield
    • Bulba and Kil3R
    • (2000) Phrack Mag. , vol.10 , Issue.56
  • 9
    • 0002582136 scopus 로고    scopus 로고
    • Buffer overflows: Attacks and defenses for the vulnerability of the decade
    • Cowan, C.1
  • 11
    • 0005001296 scopus 로고    scopus 로고
    • GNU Software, "Patch utility"
  • 15
    • 84924703663 scopus 로고    scopus 로고
    • How to write buffer overflows
  • 16
    • 84943333413 scopus 로고    scopus 로고
    • OpenBSD operating system
  • 18
    • 84881146783 scopus 로고    scopus 로고
    • Non-executable user stack
  • 19
    • 0004229386 scopus 로고    scopus 로고
    • Unix network programming
    • II edition, Prentice Hall 1998
    • Stevens, W.R.1
  • 20
  • 21
    • 84889048953 scopus 로고    scopus 로고
    • Stack shield: A stack smashing technique protection tool for linux
  • 22
    • 21844444349 scopus 로고    scopus 로고
    • Defeating solar designer non-executable stack patch
    • Bugtraq mailing list: January 30 1998
    • Wojtczuk, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.