메뉴 건너뛰기




Volumn , Issue , 2005, Pages 354-363

Preventing format-string attacks via automatic and efficient dynamic checking

Author keywords

Dynamic Checking; Format String Attacks; Static Analysis; White Lists

Indexed keywords

DYNAMIC CHECKING; FORMAT-STRING ATTACKS; STATIC ANALYSIS; WHITE-LISTS;

EID: 33745773931     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102166     Document Type: Conference Paper
Times cited : (26)

References (39)
  • 2
    • 0033688092 scopus 로고    scopus 로고
    • A static analyzer for finding dynamic programming errors
    • June
    • William Bush, Jonathan Pincus, and David Sielaff. A static analyzer for finding dynamic programming errors. Software Practice and Experience, 30(7):775-802, June 2000.
    • (2000) Software Practice and Experience , vol.30 , Issue.7 , pp. 775-802
    • Bush, W.1    Pincus, J.2    Sielaff, D.3
  • 8
    • 84860970624 scopus 로고    scopus 로고
    • Cyclone, version 0.8. Available at http://www.research.att.com/projects/cyclone.
    • Cyclone, Version 0.8
  • 12
    • 19944403685 scopus 로고    scopus 로고
    • Detecting errors with configurable whole-program dataflow analysis
    • UT-Austin
    • S. Z. Guyer, E. D. Berger, and G. Lin. Detecting errors with configurable whole-program dataflow analysis. Technical Report UTCS TR-02-04, UT-Austin, 2002.
    • (2002) Technical Report , vol.UTCS TR-02-04
    • Guyer, S.Z.1    Berger, E.D.2    Lin, G.3
  • 13
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • San Francisco, CA, January
    • Reed Hastings and Bob Joyce. Purify: Fast detection of memory leaks and access errors. In Winter USENIX Conference, pages 125-138, San Francisco, CA, January 1992.
    • (1992) Winter USENIX Conference , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 15
    • 0004311122 scopus 로고
    • Lint, a C program checker
    • Bell Laboratories, December
    • Stephen Johnson. Lint, a C program checker. Computer Science Technical Report 65, Bell Laboratories, December 1977.
    • (1977) Computer Science Technical Report , vol.65
    • Johnson, S.1
  • 16
    • 12544250338 scopus 로고    scopus 로고
    • Backwards-compatible bounds checking for arrays and pointers in C programs
    • AADEBUG'97. Third International Workshop on Automatic Debugging
    • Richard Jones and Paul Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In AADEBUG'97. Third International Workshop on Automatic Debugging, volume 2(9) of Linköping Electronic Articles in Computer and Information Science, 1997.
    • (1997) Linköping Electronic Articles in Computer and Information Science , vol.2 , Issue.9
    • Jones, R.1    Kelly, P.2
  • 22
    • 84858914534 scopus 로고    scopus 로고
    • Format string attacks
    • Sept.
    • T. Newsham. Format string attacks. White Paper, Sept. 2000. At www.securityfocus.com/guest/3342.
    • (2000) White Paper
    • Newsham, T.1
  • 23
    • 8344281803 scopus 로고    scopus 로고
    • Bruce Perens. Electric fence. At www.gnu.org/directory/All_Packages_in_Directory/Electric-Fence.html.
    • Electric Fence
    • Perens, B.1
  • 24
    • 84858926195 scopus 로고    scopus 로고
    • December
    • NGSSoftware Insight Security Research. Pfinger 0.7.8 format string vulnerability, December 2002. http://www.securityfocus.com/archive/1/303555.
    • (2002) Pfinger 0.7.8 Format String Vulnerability
  • 25
    • 84858926351 scopus 로고    scopus 로고
    • December
    • NGSSoftware Insight Security Research, zkfingerd 0.9.1 format string vulnerability, December 2002. http://www.securityfocus.com/archive/1/303557.
    • (2002) Zkfingerd 0.9.1 Format String Vulnerability
  • 27
    • 33745775932 scopus 로고    scopus 로고
    • November
    • Tim Robbins. libformat, November 2001. At www.wiretapped.net/~fyre/software/libformat.html.
    • (2001) Libformat
    • Robbins, T.1
  • 29
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 30
  • 32
    • 0032116284 scopus 로고    scopus 로고
    • MiSFIT: Constructing safe extensible systems
    • July-September
    • Christopher Small and Margo Seltzer. MiSFIT: constructing safe extensible systems. IEEE Concurrency, 6(3):33-41, July-September 1998.
    • (1998) IEEE Concurrency , vol.6 , Issue.3 , pp. 33-41
    • Small, C.1    Seltzer, M.2
  • 36
    • 33745789680 scopus 로고    scopus 로고
    • Libsafe: Protecting critical elements of stacks
    • Avaya Labs, Aug.
    • T. Tsai and N. Singh. Libsafe: Protecting critical elements of stacks. Technical Report ALR-2001-019, Avaya Labs, Aug. 2001.
    • (2001) Technical Report , vol.ALR-2001-019
    • Tsai, T.1    Singh, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.