메뉴 건너뛰기




Volumn , Issue , 2003, Pages 272-280

Countering code-injection attacks with instruction-set randomization

Author keywords

Buffer Overflows; Emulators; Interpreters

Indexed keywords

ALGORITHMS; BINARY CODES; BUFFER STORAGE; COMPUTER HARDWARE; COMPUTER PROGRAMMING LANGUAGES; PROGRAM INTERPRETERS; SOFTWARE PROTOTYPING;

EID: 14844317200     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948143.948146     Document Type: Conference Paper
Times cited : (507)

References (63)
  • 3
    • 84860923810 scopus 로고    scopus 로고
    • Trusted Computing Platform Alliance. http://www.trustedcomputing.org/.
  • 5
    • 84860933402 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-33: November
    • CERT Advisory CA-2001-33: Multiple Vulnerabilities in WU-FTPD. http://www.cert.org/advisories/CA-2001-33.html, November 2001.
    • (2001) Multiple Vulnerabilities in WU-FTPD
  • 6
    • 35048878974 scopus 로고    scopus 로고
    • CERT Advisory CA-2002-12: May
    • CERT Advisory CA-2002-12: Format String Vulnerability in ISC DHCPD. http://www.cert.org/advisories/CA-2002-12.html, May 2002.
    • (2002) Format String Vulnerability in ISC DHCPD
  • 9
    • 2642519394 scopus 로고    scopus 로고
    • Cert Advisory CA-2003-04: January
    • Cert Advisory CA-2003-04: MS-SQL Server Worm. http://www.cert.org/ advisories/CA-2003-04.html, January 2003.
    • (2003) MS-SQL Server Worm
  • 11
    • 85084161234 scopus 로고    scopus 로고
    • Mapbox: Using parameterized behavior classes to confine applications
    • August
    • A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the 9th USENIX Security Symposium, pages 1-17, August 2000.
    • (2000) Proceedings of the 9th USENIX Security Symposium , pp. 1-17
    • Acharya, A.1    Raje, M.2
  • 12
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 14
    • 85084162426 scopus 로고    scopus 로고
    • Security of web browser scripting languages: Vulnerabilities, attacks, and remedies
    • January
    • V. Anupam and A. Mayer. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. In Proceedings of the 7th USENIX Security Symposium, pages 187-200, January 1998.
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 187-200
    • Anupam, V.1    Mayer, A.2
  • 18
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • August
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120, August 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 19
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing StackGuard and StackShield
    • Bulba and Kil3r. May
    • Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 5(56), May 2000.
    • (2000) Phrack , vol.5 , Issue.56
  • 42
    • 0038524497 scopus 로고    scopus 로고
    • January
    • M. Conover and w00w00 Security Team. w00w00 on heap overflows, http://www.w00w00.org/files/articles/heaptut.txt, January 1999.
    • (1999) W00w00 on Heap Overflows
    • Conover, M.1
  • 46
    • 0003508568 scopus 로고
    • January FIPS-46
    • National Bureau of Standards. Data Encryption Standard, January 1977. FIPS-46.
    • (1977) Data Encryption Standard
  • 54
    • 0003545819 scopus 로고
    • The internet worm program: An analysis
    • Purdue University, West Lafayette, IN 47907-2004
    • E. H. Spafford. The Internet Worm Program: An Analysis. Technical Report Technical Report CSD-TR-823, Purdue University, West Lafayette, IN 47907-2004, 1988.
    • (1988) Technical Report Technical Report , vol.CSD-TR-823
    • Spafford, E.H.1
  • 55
    • 18744373147 scopus 로고    scopus 로고
    • Bespoke chips for the common man
    • 14-20 December
    • Technology Quarterly. Bespoke chips for the common man. The Economist, pages 29-30, 14-20 December 2002.
    • (2002) The Economist , pp. 29-30
  • 57
    • 33846266424 scopus 로고    scopus 로고
    • Vendicator. Stack shield. http://www.angelfire.com/sk/stackshield/.
    • Stack Shield.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.