메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 332-339

LibsafeXP: A practical and transparent tool for run-time buffer overflow preventions

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER STORAGE; COMPUTER SOFTWARE; DIGITAL LIBRARIES; INFORMATION RETRIEVAL; KNOWLEDGE ACQUISITION; STORAGE ALLOCATION (COMPUTER);

EID: 33845919861     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (9)

References (20)
  • 1
    • 33845943977 scopus 로고    scopus 로고
    • NIST, National, May
    • NIST, National Vunerability Database. http://nvd.nist.gov, May 2006.
    • (2006) Vunerability Database
  • 2
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack smashing attacks (Libsafe -Libverify)
    • San Diego, California, USA, Jun
    • A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing attacks (Libsafe -Libverify). In Proc. of 2000 USENIX Annual Technical Conference, San Diego, California, USA, Jun. 2000.
    • (2000) Proc. of 2000 USENIX Annual Technical Conference
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 3
    • 33845924363 scopus 로고    scopus 로고
    • TIS Tool Interface Standards, Executable and Linkable Format Specification, UNIX System Laboratories
    • TIS (Tool Interface Standards). Executable and Linkable Format Specification, UNIX System Laboratories.
  • 8
    • 29144477245 scopus 로고    scopus 로고
    • SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address
    • Technical Report, Purdue University, Dec
    • H. Ozdoganoglu, T. Vijaykumar, C. E. Brodley, A. Jalote. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. Technical Report, Purdue University, Dec. 2002.
    • (2002)
    • Ozdoganoglu, H.1    Vijaykumar, T.2    Brodley, C.E.3    Jalote, A.4
  • 9
    • 21644489172 scopus 로고    scopus 로고
    • Enlisting Hardware Architecture to Thwart Malicious Code Injection
    • Boppard, Germany, Mar
    • R. Lee, D. Karig, J. McGregor and Z. Shi. Enlisting Hardware Architecture to Thwart Malicious Code Injection. Security in Pervasive Computing, Boppard, Germany, Mar. 2003.
    • (2003) Security in Pervasive Computing
    • Lee, R.1    Karig, D.2    McGregor, J.3    Shi, Z.4
  • 11
    • 85084164558 scopus 로고    scopus 로고
    • Statically detecting likely buffer overflow vulnerabilities
    • Washington DC, USA, Aug
    • D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In Proc. of the 2001 USENIX Security Symposium, Washington DC, USA, Aug. 2001.
    • (2001) Proc. of the 2001 USENIX Security Symposium
    • Larochelle, D.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.