메뉴 건너뛰기




Volumn 38, Issue 5, 2004, Pages 85-96

Secure program execution via dynamic information flow tracking

Author keywords

Buffer overflow; Format string; Hardware tagging

Indexed keywords

BUFFER OVERFLOW; FORMAT STRING; HARDWARE TAGGING;

EID: 33845428560     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1037949.1024404     Document Type: Conference Paper
Times cited : (57)

References (26)
  • 2
    • 0003465202 scopus 로고    scopus 로고
    • Technical report, University of Wisconsin-Madison Computer Science Department
    • D. Burger and T. M. Austin. The SimpleScalar Tool Set, Version 2.0. Technical report, University of Wisconsin-Madison Computer Science Department, 1997.
    • (1997) The SimpleScalar Tool Set, Version 2.0
    • Burger, D.1    Austin, T.M.2
  • 3
    • 85084161775 scopus 로고    scopus 로고
    • FormatGuard: Automatic protection from printf format string vulnerabilities, 2001
    • Washington, D.C., August
    • C. Cowan, M. Barringer, S. Beattie, and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities, 2001. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) 10th USENIX Security Symposium
    • Cowan, C.1    Barringer, M.2    Beattie, S.3    Kroah-Hartman, G.4
  • 8
    • 0034226001 scopus 로고    scopus 로고
    • SPEC CPU2000: Measuring CPU performance in the new millennium
    • July
    • J. L. Henning. SPEC CPU2000: Measuring CPU performance in the new millennium. IEEE Computer, July 2000.
    • (2000) IEEE Computer
    • Henning, J.L.1
  • 15
    • 12344288334 scopus 로고    scopus 로고
    • Guardent, Inc., September
    • T. Newsham. Format string attacks. Guardent, Inc., September 2000. http://vww.securityfocus.com/guest/3342.
    • (2000) Format String Attacks
    • Newsham, T.1
  • 16
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Nov.
    • A. One. Smashing the stack for fun and profit. Phrack, 7(49), Nov. 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1
  • 17
    • 84860089604 scopus 로고    scopus 로고
    • PaX Team
    • PaX Team. Non executable data pages. http://pageexec.virtualave.net/ verbpageexec.txt.
    • Non Executable Data Pages
  • 20
    • 12344323612 scopus 로고    scopus 로고
    • Scut., September
    • Scut. Exploiting format string vulnerabilities. TESO Security Group, September 2001. http://www.team-teso.net/articles/verbformatstring.
    • (2001) Exploiting Format String Vulnerabilities
  • 22
    • 0003450887 scopus 로고    scopus 로고
    • CACTI 3.0: An integrated cache timing, power, and area model
    • Technical report, Feb.
    • P. Shivakumar and N. J. Jouppi. CACTI 3.0: An integrated cache timing, power, and area model. Technical report, WRL Research Report, Feb. 2001.
    • (2001) WRL Research Report
    • Shivakumar, P.1    Jouppi, N.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.