메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 384-391

Improving address space randomization with a dynamic offset randomization technique

Author keywords

Address space randomization; Code islands; Denialof service attacks; Derandomization attacks; Intrusion mitigation

Indexed keywords

CODES (SYMBOLS); COMPUTER CRIME; CONFORMAL MAPPING; DATA STORAGE EQUIPMENT; FUNCTION EVALUATION; INFORMATION ANALYSIS;

EID: 33751041736     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1141277.1141364     Document Type: Conference Paper
Times cited : (12)

References (24)
  • 4
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Washington D.C., August
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIX Security Symposium, Washington D.C., August 2003.
    • (2003) Proceedings of the 12th USENIX Security Symposium
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 9
    • 84860025056 scopus 로고    scopus 로고
    • eEye Digital Security. July
    • eEye Digital Security. ANALYSIS. ida "Code Red" Worm, July 2001. http://www.eeye.com/html/research/advisories/AL20010717.html.
    • (2001) ANALYSIS:.ida "Code Red" Worm
  • 16
    • 84860028076 scopus 로고    scopus 로고
    • segvguard
    • openwall. segvguard. ftp://ftp.pl.openwall.com/misc/segvguard/.
  • 19
    • 84860023880 scopus 로고    scopus 로고
    • Solar designer
    • Solar Designer. Non-Executable User Stack. http://www.openwall.com/ lintrx/.
    • Non-executable User Stack


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.