메뉴 건너뛰기




Volumn 3, Issue 1, 2006, Pages 78-90

Install-time vaccination of windows executables to defend against stack smashing attacks

Author keywords

Buffer overflow; Computer security; Instrumentation

Indexed keywords

BENCHMARKING; SECURITY OF DATA; SOFTWARE PROTOTYPING;

EID: 32844464153     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2006.14     Document Type: Article
Times cited : (14)

References (50)
  • 8
    • 0035400735 scopus 로고    scopus 로고
    • Recovery of jump table case statements from binary code
    • C. Cifuentes and M. Van Emmerik, "Recovery of Jump Table Case Statements from Binary Code," Science of Computer Programming, vol. 40, nos. 2-3, pp. 171-188, 2001.
    • (2001) Science of Computer Programming , vol.40 , Issue.2-3 , pp. 171-188
    • Cifuentes, C.1    Van Emmerik, M.2
  • 14
    • 0030417556 scopus 로고    scopus 로고
    • Partial automation of an integrated reverse engineering environment of binary code
    • C. Cifuentes, "Partial Automation of an Integrated Reverse Engineering Environment of Binary Code," Proc. Working Conf. Reverse Eng., pp. 50-56, 1996.
    • (1996) Proc. Working Conf. Reverse Eng. , pp. 50-56
    • Cifuentes, C.1
  • 19
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysi
    • D. Evans and D. Larochelle, "Improving Security Using Extensible Lightweight Static Analysi," IEEE Software, vol. 19, no. 1, pp. 42-51, 2002.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 20
    • 0024663403 scopus 로고
    • With microscope and tweezers: An analysis of the internet virus of November 1988
    • M.W. Eichin and J.A.A. Rochlis, "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988," Proc. IEEE Symp. Security and Privacy, 1989.
    • (1989) Proc. IEEE Symp. Security and Privacy
    • Eichin, M.W.1    Rochlis, J.A.A.2
  • 22
    • 84875947153 scopus 로고    scopus 로고
    • Detours: Binary interception of win32 functions
    • G. Hunt and D. Brubacher, "Detours: Binary Interception of Win32 Functions," Proc. Third USENIX NT Symp., pp. 135-144, 1999.
    • (1999) Proc. Third USENIX NT Symp. , pp. 135-144
    • Hunt, G.1    Brubacher, D.2
  • 28
    • 84858544590 scopus 로고    scopus 로고
    • Execute disable bit functionality blocks malware code execution
    • Intel
    • S. Kuo, "Execute Disable Bit Functionality Blocks Malware Code Execution," White paper, Intel, 2005, http://www.intel.com/cd/ids/ developer/asmo-na/eng/dc/pentium4/optimization/149308.htm.
    • (2005) White Paper
    • Kuo, S.1
  • 29
    • 32844468524 scopus 로고
    • Rewriting executable files to measure program behavior
    • Univ. of Wisconsin, Madison, 25 Mar.
    • J.R. Larus and T. Ball, "Rewriting Executable Files to Measure Program Behavior," Technical Report CS-TR-92-1083, Univ. of Wisconsin, Madison, 25 Mar. 1992.
    • (1992) Technical Report , vol.CS-TR-92-1083
    • Larus, J.R.1    Ball, T.2
  • 34
    • 84858544194 scopus 로고    scopus 로고
    • Microsoft visual C++ compiler options: /gs (control stack checking calls)
    • "Microsoft Visual C++ Compiler Options: /gs (Control Stack Checking Calls),"Online documentation, 2001, http://msdn.microsoft.com/library/ default.asp?url=/library/en-us/vccore/html/_core_.2f.gs.asp.
    • (2001) Online Documentation
  • 36
    • 32844457475 scopus 로고    scopus 로고
    • Install-time vaccination of windows executables to defend against stack smashing attacks
    • School of Electrical Eng., Tel Aviv Univ.
    • D. Nebenzahl and A. Wool, "Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks," Technical Report EES2003-9, School of Electrical Eng., Tel Aviv Univ., 2003.
    • (2003) Technical Report , vol.EES2003-9
    • Nebenzahl, D.1    Wool, A.2
  • 37
    • 72849146986 scopus 로고    scopus 로고
    • Install-time vaccination of windows executables to defend against stack smashing attacks
    • Aug.
    • D. Nebenzahl and A. Wool, "Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks," Proc. 19th IFIP Int'l Information Security Conf., pp. 225-240, Aug. 2004.
    • (2004) Proc. 19th IFIP Int'l Information Security Conf. , pp. 225-240
    • Nebenzahl, D.1    Wool, A.2
  • 43
    • 84881146783 scopus 로고    scopus 로고
    • Solar Designer, "Nonexecutable User Stack," http://www.false.com/security/linux-stack/, 2006.
    • Nonexecutable User Stack
  • 44
    • 0003545819 scopus 로고
    • The internet worm program: An analysis
    • Purdue Univ., West Lafayette, IN 47907-2004
    • E.H. Spafford, "The Internet Worm Program: An Analysis," Technical Report CSD-TR-823, Purdue Univ., West Lafayette, IN 47907-2004, 1988.
    • (1988) Technical Report , vol.CSD-TR-823
    • Spafford, E.H.1
  • 45
    • 4444220816 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation
    • SPEC CPU2000 V1.2. Standard Performance Evaluation Corporation, 2000, http://www.specbench.org/osg/cpu2000/.
    • (2000) SPEC CPU2000 V1.2
  • 46
    • 0032116284 scopus 로고    scopus 로고
    • MISFIT: A tool for constructing safe extensible systems
    • C. Small and M. Seltzer, "MISFIT: A Tool for Constructing Safe Extensible Systems," IEEE Concurrency, pp. pp. 33-41, 1998.
    • (1998) IEEE Concurrency , pp. 33-41
    • Small, C.1    Seltzer, M.2
  • 47
    • 84858542864 scopus 로고    scopus 로고
    • Stackshield, 2000, http://www.angelfire.com/sk/stackshield.
    • (2000) Stackshield


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.