메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 230-241

Independence from obfuscation: A semantic framework for diversity

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER SOFTWARE; DATA STORAGE EQUIPMENT; MATHEMATICAL TRANSFORMATIONS; SECURITY OF DATA;

EID: 33947654448     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2006.15     Document Type: Conference Paper
Times cited : (19)

References (21)
  • 2
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Proc. 21th Annual International Cryptology Conference CRYPTO'01, of, Springer-Verlag
    • B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proc. 21th Annual International Cryptology Conference (CRYPTO'01), volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 5
    • 33947680249 scopus 로고    scopus 로고
    • DieHard: Probabilistic memory safety for unsafe languages
    • 05-65, University of Massachusetts Amherst
    • E. D. Berger and B. G. Zorn. DieHard: Probabilistic memory safety for unsafe languages. Department of Computer Science Technical Report 05-65, University of Massachusetts Amherst, 2005.
    • (2005) Department of Computer Science Technical Report
    • Berger, E.D.1    Zorn, B.G.2
  • 6
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. 12th USENIX Security Symposium, pages 105-120, 2003.
    • (2003) Proc. 12th USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 7
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • 02-197, School of Computer Science, Carnegie Mellon University
    • M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS 02-197, School of Computer Science, Carnegie Mellon University, 2002.
    • (2002) Technical Report CMU-CS
    • Chew, M.1    Song, D.2
  • 16
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20-27, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 20-27
    • Pincus, J.1    Baker, B.2
  • 17
    • 33947699918 scopus 로고    scopus 로고
    • Independence from obfuscation: A semantic framework for diversity
    • Technical Report 2006-2016, Computer Science Department, Cornell University
    • R. Pucella and F. B. Schneider. Independence from obfuscation: A semantic framework for diversity. Technical Report 2006-2016, Computer Science Department, Cornell University, 2006.
    • (2006)
    • Pucella, R.1    Schneider, F.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.