메뉴 건너뛰기




Volumn 3785 LNCS, Issue , 2005, Pages 111-124

A theory of secure control flow

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL FLOW INTEGRITY (CFI); CONTROL PROGRAMS; HYPOTHESES; STATIC POLICY;

EID: 33646765787     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11576280_9     Document Type: Conference Paper
Times cited : (37)

References (21)
  • 1
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • K.G. Larsen, S. Skyum, and G. Winskel, editors Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Springer-Verlag
    • M. Abadi. Protection in programming-language translations. In K.G. Larsen, S. Skyum, and G. Winskel, editors, Proceedings of the 25th International Colloquium on Automata, Languages and Programming, volume 1443 of Lecture Notes in Computer Science, pages 868-883. Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1443 , pp. 868-883
    • Abadi, M.1
  • 3
    • 33646767376 scopus 로고    scopus 로고
    • Control-flow integrity: Principles, implementations, and applications
    • A preliminary version appears as Microsoft Research Technical Report MSR-TR-05-18, February 2005
    • M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In Proceedings of the ACM Conference on Computer and Communications Security, 2005. A preliminary version appears as Microsoft Research Technical Report MSR-TR-05-18, February 2005.
    • (2005) Proceedings of the ACM Conference on Computer and Communications Security
    • Abadi, M.1    Budiu, M.2    Erlingsson, Ú.3    Ligatti, J.4
  • 7
    • 0005486528 scopus 로고    scopus 로고
    • A syntactic approach to foundational proof-carrying code
    • Dept. of Computer Science, Yale University
    • N. Hamid, Z. Shao, V. Trifonov, S. Monnier, and Z, Ni. A Syntactic Approach to Foundational Proof-Carrying Code. Technical Report YALEU/DCS/TR-1224, Dept. of Computer Science, Yale University, 2002.
    • (2002) Technical Report , vol.YALEU-DCS-TR-1224
    • Hamid, N.1    Shao, Z.2    Trifonov, V.3    Monnier, S.4    Ni, Z.5
  • 8
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • February
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, February 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 12
    • 84858867819 scopus 로고    scopus 로고
    • PaX Project. The PaX project, 2004. http://pax.grsecurity.net/.
    • (2004)
  • 13
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20-27, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 16
    • 0004349103 scopus 로고    scopus 로고
    • Vulcan: Binary transformation in a distributed environment
    • Microsoft Research
    • A. Srivastava, A. Edwards, and H. Vo. Vulcan: Binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, Microsoft Research, 2001.
    • (2001) Technical Report , vol.MSR-TR-2001-50
    • Srivastava, A.1    Edwards, A.2    Vo, H.3
  • 17
    • 0004090434 scopus 로고
    • ATOM: A system for building customized program analysis tools
    • Digital Equipment Corporation
    • A. Srivastava and A. Eustace. ATOM: A system for building customized program analysis tools. Technical Report WRL Research Report 94/2, Digital Equipment Corporation, 1994.
    • (1994) Technical Report WRL Research Report , vol.94 , Issue.2
    • Srivastava, A.1    Eustace, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.