메뉴 건너뛰기




Volumn 5, Issue 2, 2006, Pages 77-91

Execution transactions for defending against software failures: Use and evaluation

Author keywords

Buffer overflows; Exception; Transactional execution

Indexed keywords


EID: 33646001408     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-006-0083-6     Document Type: Article
Times cited : (5)

References (98)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One: Smashing the stack for fun and profit. Phrack 7 (1996)
    • (1996) Phrack , vol.7
    • Aleph, O.1
  • 3
    • 1642387377 scopus 로고    scopus 로고
    • Consh: A confined execution environment for Internet computations
    • Alexandrov, A., Kmiec, P., Schauser, K.: Consh: A confined execution environment for Internet computations (1998)
    • (1998)
    • Alexandrov, A.1    Kmiec, P.2    Schauser, K.3
  • 4
    • 12844286929 scopus 로고    scopus 로고
    • The Shellcode generation
    • Arce, I.: The Shellcode generation. IEEE Secur. Priv. 2, 72-76 (2004)
    • (2004) IEEE Secur. Priv. , vol.2 , pp. 72-76
    • Arce, I.1
  • 10
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing StackGuard and StackShield
    • Bulba, K.: Bypassing StackGuard and StackShield. Phrack 5 (2000)
    • (2000) Phrack , vol.5
    • Bulba, K.1
  • 12
    • 0035703918 scopus 로고    scopus 로고
    • Recursive restartability: Turning the reboot sledgehammer into a scalpel
    • Schloss Elmau, Germany, IEEE Computer Society
    • Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer into a scalpel. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII), pp. 110-115 Schloss Elmau, Germany, IEEE Computer Society, (2001)
    • (2001) Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII) , pp. 110-115
    • Candea, G.1    Fox, A.2
  • 13
    • 33646015199 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL
    • CERT Advisory CA-2001-19: 'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL. http://www.cert.org/advisories/CA-2001-19.html (2001)
    • (2001)
  • 14
    • 33646014870 scopus 로고    scopus 로고
    • Cert Advisory CA-2003-04: MS-SQL Server Worm
    • Cert Advisory CA-2003-04: MS-SQL Server Worm. http://www.cert.org/ advisories/CA-2003-04.html (2003)
    • (2003)
  • 17
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • Chess, B., McGraw, G.: Static analysis for security. IEEE Secur. Priv. 2, 76-79 (2004)
    • (2004) IEEE Secur. Priv. , vol.2 , pp. 76-79
    • Chess, B.1    McGraw, G.2
  • 19
    • 0023294949 scopus 로고
    • Computer viruses: Theory and practice
    • Cohen, F.: CTmputer viruses: theory and practice. Comput. Secur. 6, 22-35 (1987)
    • (1987) Comput. Secur. , vol.6 , pp. 22-35
    • Cohen, F.1
  • 27
    • 21644474151 scopus 로고    scopus 로고
    • RacerX: Effective, static detection of race conditions and deadlocks
    • Engler, D., Ashcraft, K.: RacerX: Effective, static detection of race conditions and deadlocks. In: Proceedings of ACM SOSP (2003)
    • (2003) Proceedings of ACM SOSP
    • Engler, D.1    Ashcraft, K.2
  • 28
    • 18744376132 scopus 로고    scopus 로고
    • GCC extension for protecting applications from stack-smashing attacks
    • Etoh, J.: GCC extension for protecting applications from stack-smashing attacks. http://www.trl.ibm.com/projects/security/ssp/ (2000)
    • (2000)
    • Etoh, J.1
  • 31
    • 7244258833 scopus 로고    scopus 로고
    • New chips stop buffer overflow attacks
    • Garber, L.: New chips stop buffer overflow attacks. IEEE Comput. 37, 28 (2004)
    • (2004) IEEE Comput. , vol.37 , pp. 28
    • Garber, L.1
  • 40
    • 0036783479 scopus 로고    scopus 로고
    • Source transformation in software engineering using the TXL transformation system
    • Cordy, J.R., Dean, T.R., Schneider, K.: Source transformation in software engineering using the TXL transformation system. J. Inf. Software Technol. 44, 827-837 (2002)
    • (2002) J. Inf. Software Technol , vol.44 , pp. 827-837
    • Cordy, J.R.1    Dean, T.R.2    Schneider, K.3
  • 48
    • 3042781457 scopus 로고    scopus 로고
    • Crossover: Online pests plaguing the offline world
    • Levy, E.: Crossover: Online pests plaguing the offline world. IEEE Secur. Priv. 1, 71-73 (2003)
    • (2003) IEEE Secur. Priv. , vol.1 , pp. 71-73
    • Levy, E.1
  • 51
    • 0042536223 scopus 로고    scopus 로고
    • Welcome To My Tarpit: The Tactical and Strategic Use of LaBrea
    • Liston, T.: Welcome To My Tarpit: The Tactical and Strategic Use of LaBrea. http://www.threenorth.com/LaBrea/LaBrea.txt (2001)
    • (2001)
    • Liston, T.1
  • 53
    • 31844441738 scopus 로고    scopus 로고
    • On the effectiveness of automatic patching
    • WORM '05
    • Vojnovic, M., Ganesh, A.: On the effectiveness of automatic patching. In: WORM '05 (2005)
    • (2005)
    • Vojnovic, M.1    Ganesh, A.2
  • 58
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Newsome, J., Song, D.: Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In: The 12th Annual Network and Distributed System Security Symposium (2005)
    • (2005) The 12th Annual Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 62
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overflows
    • Pincus, J., BakerR B.: Beyond stack smashing: recent advances in exploiting buffer overflows. IEEE Secur. Priv. 2, 20-27 (2004)
    • (2004) IEEE Secur. Priv. , vol.2 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 75
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the Witty worm
    • Shannon, C., Moore, D.: The spread of the Witty worm. IEEE Secur. Priv. 2, 46-50 (2004)
    • (2004) IEEE Secur. Priv. , vol.2 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 77
    • 30344459996 scopus 로고    scopus 로고
    • Countering network worms through automatic patch generation
    • (to appear)
    • Sidiroglou, S., Keromytis, A.D.: Countering network worms through automatic patch generation. IEEE Secur. Priv. (2005) (to appear).
    • (2005) IEEE Secur. Priv.
    • Sidiroglou, S.1    Keromytis, A.D.2
  • 79
    • 0041534274 scopus 로고    scopus 로고
    • A Snapshot of Global Internet Worm Activity
    • Technical report, Arbor Networks
    • Song, D., Malan, R., Stone, R.: A Snapshot of Global Internet Worm Activity. Technical report, Arbor Networks (2001)
    • (2001)
    • Song, D.1    Malan, R.2    Stone, R.3
  • 81
    • 35348976981 scopus 로고    scopus 로고
    • Defeating compiler-level buffer overflow protection
    • login
    • Steven, A.: Defeating compiler-level buffer overflow protection. USENIX;login: 30, 59-71 (2005)
    • (2005) USENIX , vol.30 , pp. 59-71
    • Steven, A.1
  • 82
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. SIGOPS Oper. Syst. Rev. 38, 85-96 (2004)
    • (2004) SIGOPS Oper. Syst. Rev. , vol.38 , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 85
    • 33645958072 scopus 로고    scopus 로고
    • The Spread of the Sapphire/Slammer Worm
    • The Spread of the Sapphire/Slammer Worm. http://www.silicondefense.com/ research/worms/slammer.php (2003)
    • (2003)
  • 88
    • 33646008982 scopus 로고    scopus 로고
    • Vendicator: Stack shield
    • Vendicator: Stack shield. http://www.angelfire.com/sk/stackshield/ (2000)
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.