메뉴 건너뛰기




Volumn 8, Issue 1, 2005, Pages 3-40

Randomized instruction set emulation

Author keywords

Automated diversity; Randomized instruction sets; Software diversity

Indexed keywords

AUTOMATED DIVERSITY; BINARY CODE; RANDOMIZED INSTRUCTION SETS; SOFTWARE DIVERSITY;

EID: 16644362894     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/1053283.1053286     Document Type: Article
Times cited : (112)

References (68)
  • 1
    • 18744407397 scopus 로고    scopus 로고
    • "Trusted Computing" and competition policy - Issues for computing professionals
    • ANDERSON, R. 2003. "Trusted Computing" and competition policy - Issues for computing professionals. Upgrade IV, 3 (June), 35-41.
    • (2003) Upgrade IV , vol.3 , Issue.JUNE , pp. 35-41
    • Anderson, R.1
  • 2
    • 85008038596 scopus 로고    scopus 로고
    • Improving the TCPA specification
    • ARBAUGH, W. A. 2002. Improving the TCPA specification. IEEE Comput. 35, 8 (Aug.), 77-79.
    • (2002) IEEE Comput. , vol.35 , Issue.8 AUG , pp. 77-79
    • Arbaugh, W.A.1
  • 4
    • 0003217728 scopus 로고
    • The methodology of N-version programming
    • M. Lyu, Ed. Wiley, New York
    • AVIZIENIS, A. 1995. The methodology of N-version programming. In Software Fault Tolerance, M. Lyu, Ed. Wiley, New York, 23-46.
    • (1995) Software Fault Tolerance , pp. 23-46
    • Avizienis, A.1
  • 5
    • 0017792448 scopus 로고
    • On the implementation of N-version programming for software fault tolerance during execution
    • AVIZIENIS, A. AND CHEN, L. 1977. On the implementation of N-Version programming for software fault tolerance during execution. In Proceedings of IEEE COMPSAC 77. 149-155.
    • (1977) Proceedings of IEEE COMPSAC , vol.77 , pp. 149-155
    • Avizienis, A.1    Chen, L.2
  • 9
    • 16644369397 scopus 로고
    • Microprocessor for executing enciphered programs, U.S. Patent no. 4 168 396
    • BEST, R. M. 1979. Microprocessor for executing enciphered programs, U.S. Patent no. 4 168 396.
    • (1979)
    • Best, R.M.1
  • 10
    • 0018995481 scopus 로고
    • Preventing software piracy with crypto-microprocessors
    • San Francisco, CA
    • BEST, R. M. 1980. Preventing software piracy with crypto-microprocessors. In Proceedings of the IEEE Spring COMPCON '80, San Francisco, CA. 466-469.
    • (1980) Proceedings of the IEEE Spring COMPCON '80 , pp. 466-469
    • Best, R.M.1
  • 11
    • 3042667685 scopus 로고    scopus 로고
    • Address obfuscation: An approach to combat buffer overflows, format-string attacks and more
    • Washington, DC
    • BHATKAE, S., DUVARNEY, D., AND SEKAR, R. 2003. Address obfuscation: An approach to combat buffer overflows, format-string attacks and more. In Proceedings of the 12th USENIX Security Symposium, Washington, DC. 105-120.
    • (2003) Proceedings of the 12th USENIX Security Symposium , pp. 105-120
    • Bhatkae, S.1    Duvarney, D.2    Sekar, R.3
  • 14
    • 84860105712 scopus 로고    scopus 로고
    • BUTLER, T. R. 2004. Bochs. http://bochs.sourceforge.net/.
    • (2004) Bochs
    • Butler, T.R.1
  • 17
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • COHEN, F. 1993. Operating system protection through program evolution. Computers and Security 12, 6 (Oct.), 565-584.
    • (1993) Computers and Security , vol.12 , Issue.6 OCT , pp. 565-584
    • Cohen, F.1
  • 18
    • 84860092706 scopus 로고    scopus 로고
    • CORE SECURITY. 2004. CORE security technologies, http://www1.corest.com/ home/home.php.
    • (2004) CORE Security Technologies
  • 26
    • 14944385012 scopus 로고    scopus 로고
    • Web publishing, IBM Research Division, Tokyo Research Laboratory
    • ETOH, H. AND YODA, K. 2000. Protecting from stack-smashing attacks. Web publishing, IBM Research Division, Tokyo Research Laboratory, http://www.trl.ibm.com/projects/security/ssp/main.html. June 19.
    • (2000) Protecting from Stack-smashing Attacks
    • Etoh, H.1    Yoda, K.2
  • 27
    • 14844332687 scopus 로고    scopus 로고
    • Propolice: Improved stack smashing attack detection
    • ETOH, H. AND YODA, K. 2001. Propolice: Improved stack smashing attack detection. IPSJ SIG-Notes Computer Security (CSEC) 14 (Oct. 26).
    • (2001) IPSJ SIG-notes Computer Security (CSEC) , vol.14 , Issue.OCT. 26
    • Etoh, H.1    Yoda, K.2
  • 31
    • 16644376176 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • GERA AND RIQ. 2002. Smashing the stack for fun and profit. Phrack B9, 11 (July 28).
    • (2002) Phrack , vol.B9 , Issue.11 JULY 28
    • Gera1    Riq2
  • 32
    • 16644365624 scopus 로고    scopus 로고
    • SQL injection attacks - Are you safe?
    • HARPER, M. 2002. SQL injection attacks - Are you safe? In Sitepoint, http://www.sitepoint.com/article/794.
    • (2002) Sitepoint
    • Harper, M.1
  • 39
    • 0003902445 scopus 로고    scopus 로고
    • The technology behind the crusoe processors
    • January
    • KLAIBER, A. 2000. The technology behind the crusoe processors. White Paper http://www.transmeta.com/pdf/white_papers/paper_aklaiber_19jan00.pdf. January.
    • (2000) White Paper
    • Klaiber, A.1
  • 45
    • 72849146986 scopus 로고    scopus 로고
    • Install-time vaccination of Windows executables to defend against stack smashing attacks
    • Kluwer, Toulouse, France
    • NEBENZAHL, D. AND WOOL, A. 2004. Install-time vaccination of Windows executables to defend against stack smashing attacks. In Proceedings of the 19th IFIP International Information Security Conference. Kluwer, Toulouse, France, 225-240.
    • (2004) Proceedings of the 19th IFIP International Information Security Conference , pp. 225-240
    • Nebenzahl, D.1    Wool, A.2
  • 47
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits
    • NERGAL. 2001, The advanced return-into-lib(c) exploits. Phrack 58, 4 (Dec.).
    • (2001) Phrack , vol.58 , Issue.4 DEC
    • Nergal1
  • 48
    • 16244366310 scopus 로고    scopus 로고
    • Valgrind: A program supervision framework
    • O. Sokolsky and M. Viswanathan, Eds. Elsevier, Amsterdam
    • NETHERCOTE, N. AND SEWARD, J. 2003. Valgrind: A program supervision framework. In Electronic Notes in Theoretical Computer Science, O. Sokolsky and M. Viswanathan, Eds. Vol. 89. Elsevier, Amsterdam.
    • (2003) Electronic Notes in Theoretical Computer Science , vol.89
    • Nethercote, N.1    Seward, J.2
  • 50
    • 84860106824 scopus 로고    scopus 로고
    • Documentation for the PaX project
    • PAX TEAM. 2003. Documentation for the PaX project. See Homepage of The PaX Team. http://pax.grsecurity.net/docs/index.html.
    • (2003) Homepage of the PaX Team
  • 53
    • 0016522101 scopus 로고
    • System structure for software fault tolerance
    • RANDELL, B. 1975. System structure for software fault tolerance. IEEE Trans. Software Eng. 1, 2, 220-232.
    • (1975) IEEE Trans. Software Eng. , vol.1 , Issue.2 , pp. 220-232
    • Randell, B.1
  • 59
    • 16644376379 scopus 로고    scopus 로고
    • Tech. Rep. SPEC web 99_Design.062999.html, SPEC Inc. June 29
    • SPEC INC. 1999. Specweb99. Tech. Rep. SPEC web 99_Design.062999.html, SPEC Inc. June 29.
    • (1999) Specweb99
  • 61
    • 18744401718 scopus 로고
    • Tool Interface Standards Committee
    • TOOL INTERFACE STANDARDS COMMITTEE. 1995. Executabk and Linking Format (ELF). Tool Interface Standards Committee.
    • (1995) Executabk and Linking Format (ELF)
  • 62
    • 0012528068 scopus 로고    scopus 로고
    • Libsafe 2.0: Detection of format string vulnerability exploits
    • Avaya Labs, Avaya Inc. February 6
    • TSAI, T. AND SINOH, N. 2001. Libsafe 2.0: Detection of format string vulnerability exploits. White Paper Version 3-21-01, Avaya Labs, Avaya Inc. February 6.
    • (2001) White Paper Version 3-21-01
    • Tsai, T.1    Sinoh, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.