메뉴 건너뛰기




Volumn , Issue , 2002, Pages 108-120

Enabling trusted software integrity

Author keywords

[No Author keywords available]

Indexed keywords

ARM INSTRUCTION SET; BUFFER OVERFLOWS; COMPILATION TECHNIQUES; COMPUTING SYSTEM; CORE TECHNOLOGY; HARD TASK; INTRUSION PREVENTION; INTRUSION PREVENTION SYSTEMS; KEY PROBLEMS; MALICIOUS CODES; MEDIABENCH; RUNTIMES; SECURITY AND PERFORMANCE; SOFTWARE INSTALLATIONS; SOFTWARE INTEGRITY; SYSTEM SECURITY;

EID: 0036949385     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/605397.605409     Document Type: Conference Paper
Times cited : (46)

References (29)
  • 2
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. MOBICOM, 2001.
    • (2001) MOBICOM
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 11
    • 0012529658 scopus 로고
    • Lint, a C program checker
    • AT&T Bell Laboratories
    • S. Johnson. Lint, a C program checker. Unix Programmer's Manual, AT&T Bell Laboratories, 1978.
    • (1978) Unix Programmer's Manual
    • Johnson, S.1
  • 12
    • 85084164558 scopus 로고    scopus 로고
    • Statically detecting likely buffer overflow vulnerabilities
    • Aug.
    • D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. USENIX Security Symposium, pages 177-89, Aug. 2001.
    • (2001) USENIX Security Symposium , pp. 177-189
    • Larochelle, D.1    Evans, D.2
  • 18
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • A. One. Smashing the stack for fun and profit. Phrack, 49, 1996.
    • (1996) Phrack , vol.49
    • One, A.1
  • 21
    • 77953555228 scopus 로고    scopus 로고
    • Available on-line at
    • Sci-Worx GmbH. AES Rijndael core. Available on-line at http://www.sci-worx.com.
    • AES Rijndael Core
  • 22
    • 0024683697 scopus 로고
    • The internet worm, password cracking: A game of wits
    • June
    • D. Seeley. The internet worm, password cracking: a game of wits. Communications of the ACM, 32(6):700-3, June 1989.
    • (1989) Communications of the ACM , vol.32 , Issue.6 , pp. 700-703
    • Seeley, D.1
  • 23
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing fast intrusion prevention/detection systems from high-level specifications
    • R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. USENIX Security Symposium, pages 63-78, 1999.
    • (1999) USENIX Security Symposium , pp. 63-78
    • Sekar, R.1    Uppuluri, P.2
  • 26
    • 0003081830 scopus 로고
    • An efficient algorithm for exploiting multiple arithmetic units
    • R. Tomasulo. An efficient algorithm for exploiting multiple arithmetic units. IBM Journal, pages 25-33, 1967.
    • (1967) IBM Journal , pp. 25-33
    • Tomasulo, R.1
  • 28
    • 0020180633 scopus 로고
    • OMEGA - A DATA FLOW ANALYSIS TOOL FOR THE C PROGRAMMING LANGUAGE.
    • C. Wilson and L. Osterweil. Omega - a data flow analysis tool for the C programming language. IEEE Trans, on Software Engineering, 11(9):832-8, 1985. (Pubitemid 16574258)
    • (1982) IEEE Transactions on Software Engineering , vol.SE-11 , Issue.9 , pp. 832-838
    • Wilson Cindy1    Osterweil Leon, J.2
  • 29
    • 84860043023 scopus 로고    scopus 로고
    • Available on-line at
    • Zero Knowledge Systems Inc. The Intel Pentium III Exploit Page. Available on-line at http://www.zeroknowledge.com/p3/home.asp.
    • The Intel Pentium III Exploit Page


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.