메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 35-44

Enhancing security using legality assertions

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; C (PROGRAMMING LANGUAGE); CODES (STANDARDS); DIGITAL LIBRARIES; MATHEMATICAL TRANSFORMATIONS; SECURITY OF DATA;

EID: 33846246751     PISSN: 10951350     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCRE.2005.36     Document Type: Conference Paper
Times cited : (9)

References (30)
  • 1
    • 33846237226 scopus 로고    scopus 로고
    • Schneider, F. B., S. M. Bellovin, M. Branstad, J. R. Catoe, S. D. Crocker, C. Kaufman, S. T. Kent, J. C. Knight, S. McGeady, R. R. Nelson, A. M. Schiffman, G. A. Spix, and D. Tygar, Trust in Cyberspace. National Academy Press, 1999, Committee on Information Systems Trustworthiness, National Research Council.
    • Schneider, F. B., S. M. Bellovin, M. Branstad, J. R. Catoe, S. D. Crocker, C. Kaufman, S. T. Kent, J. C. Knight, S. McGeady, R. R. Nelson, A. M. Schiffman, G. A. Spix, and D. Tygar, Trust in Cyberspace. National Academy Press, 1999, Committee on Information Systems Trustworthiness, National Research Council.
  • 2
    • 33846236798 scopus 로고    scopus 로고
    • Buffer Overflows and Remote Root Exploits, Personal Communications, October
    • S. Bellovin, "Buffer Overflows and Remote Root Exploits", Personal Communications, October, 1999.
    • (1999)
    • Bellovin, S.1
  • 6
    • 85084164558 scopus 로고    scopus 로고
    • Statically Detecting Likely Buffer Overflow Vulnerabilities
    • Washington D. C
    • D. Larochelle, and D. Evans, "Statically Detecting Likely Buffer Overflow Vulnerabilities", In USENIX Security Symposium, Washington D. C., 2001.
    • (2001) USENIX Security Symposium
    • Larochelle, D.1    Evans, D.2
  • 9
    • 0026845567 scopus 로고
    • Adding Run-time Checking to the Portable C Compiler
    • J. L. Steffen, "Adding Run-time Checking to the Portable C Compiler", Software - Practice and Experence, 22(4), 1992, pp.305-316.
    • (1992) Software - Practice and Experence , vol.22 , Issue.4 , pp. 305-316
    • Steffen, J.L.1
  • 10
    • 0012582509 scopus 로고    scopus 로고
    • Backwards-compatible Bounds Checking for Arrays and Pointers in C Programs
    • R. W. M. Jones, and P. H. J.Kelly. "Backwards-compatible Bounds Checking for Arrays and Pointers in C Programs", Automated and Algorithmic Debugging, 1997, pp.13-26.
    • (1997) Automated and Algorithmic Debugging , pp. 13-26
    • Jones, R.W.M.1    Kelly, P.H.J.2
  • 15
    • 33846260092 scopus 로고    scopus 로고
    • C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, Invited talk at System Administration and Network Security (SANS) 2000.
    • C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade", Invited talk at System Administration and Network Security (SANS) 2000.
  • 16
    • 1542592249 scopus 로고    scopus 로고
    • Smashing Stack for Fun and Profit
    • A. One, "Smashing Stack for Fun and Profit". www.insecure.org/stf/smashstack.txt.
    • One, A.1
  • 17
    • 4344593013 scopus 로고    scopus 로고
    • Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns
    • J. Pincus, and B. Baker, "Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns", IEEE Security & Privacy, Vol. 2, No. 4, 2004, pp.20-27.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 19
    • 0036783479 scopus 로고    scopus 로고
    • Source Transformation in Software Engineering Using the TXL Transformation System, Special Issue on Source code Analysis and Manipulation
    • J.R.Cordy, T. Dean, A. Malton, and K. Schneider, "Source Transformation in Software Engineering Using the TXL Transformation System", Special Issue on Source code Analysis and Manipulation. Journal of Information and Software Technology, 44(13), pp.827-837.
    • Journal of Information and Software Technology , vol.44 , Issue.13 , pp. 827-837
    • Cordy, J.R.1    Dean, T.2    Malton, A.3    Schneider, K.4
  • 20
    • 33846197838 scopus 로고    scopus 로고
    • U.K. Government, Communications-Electronics Security Group, Network Defence Team, 2004
    • U.K. Government, Communications-Electronics Security Group, Network Defence Team, 2004
  • 23
    • 33846191032 scopus 로고    scopus 로고
    • Syntax-based Vulnerability Testing of Frame-based Network Protocols
    • Fredericton, Canada, October
    • O. Tal, S. Knight, and T. R. Dean, "Syntax-based Vulnerability Testing of Frame-based Network Protocols", Proc. 2nd Annual Conference on Privacy, Security and Trust, Fredericton, Canada, October 2004, pp.155-160.
    • (2004) Proc. 2nd Annual Conference on Privacy, Security and Trust , pp. 155-160
    • Tal, O.1    Knight, S.2    Dean, T.R.3
  • 28
    • 33846247812 scopus 로고    scopus 로고
    • http://lists.virus.org/dailydave-0311/msg00020.html.
  • 29
    • 24644436530 scopus 로고    scopus 로고
    • Checking Memory Safety with Blast
    • Proc Fundamental Approaches to Software Engineering, Edinburgh, Scotland, April
    • D. Beyer, T. H. Henzinger, R. Jhala, and R. Majumdar, "Checking Memory Safety with Blast", Proc Fundamental Approaches to Software Engineering, LNCS 3442, Edinburgh, Scotland, April, 2005, pp. 2-18.
    • (2005) LNCS , vol.3442 , pp. 2-18
    • Beyer, D.1    Henzinger, T.H.2    Jhala, R.3    Majumdar, R.4
  • 30
    • 18744377808 scopus 로고    scopus 로고
    • CCured: Type-safe Retrofitting of Legacy Code
    • Lang, Portland, January
    • G. C. Necula, S. McPeak, and W. Weimer, "CCured: Type-safe Retrofitting of Legacy Code", Proc Principles of Program. Lang., Portland, January, 2002, pp. 49-61.
    • (2002) Proc Principles of Program , pp. 49-61
    • Necula, G.C.1    McPeak, S.2    Weimer, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.