메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages

Design and performance evaluation of a Proxy-based Java Rewriting security System

Author keywords

[No Author keywords available]

Indexed keywords

BINARY REWRITING TECHNIQUES; JAVA REWRITING SYSTEM; REAL WEB TRACE; SECURITY POLICIES;

EID: 33947660918     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2006.27     Document Type: Conference Paper
Times cited : (2)

References (21)
  • 1
    • 0041350423 scopus 로고    scopus 로고
    • Design and Implementation of a Distributed Virtual Machine for Networked Computers
    • Kiawah Island, South Carolina, December
    • Emin Gün Sirer, etc, Design and Implementation of a Distributed Virtual Machine for Networked Computers. In Proceedings of the Seventeenth Symposium on Operating Systems Principles, pages 202-216, Kiawah Island, South Carolina, December 1999.
    • (1999) Proceedings of the Seventeenth Symposium on Operating Systems Principles , pp. 202-216
    • Gün Sirer, E.1    etc2
  • 2
    • 2642520196 scopus 로고    scopus 로고
    • A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks
    • San Antonio, TX, June
    • M. Prasad and T. Chiueh, A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks, Proceedings of Usenix Annual Technical Conference, San Antonio, TX, June 2003
    • (2003) Proceedings of Usenix Annual Technical Conference
    • Prasad, M.1    Chiueh, T.2
  • 4
    • 0000596666 scopus 로고
    • Purify: A tool for detecting memory leaks and access errors in C and C++ programs
    • Berkeley, CA, January
    • R. Hastings and B. Joyce, Purify: A tool for detecting memory leaks and access errors in C and C++ programs, Proceedings of the Winter 1992USENIX Conference, Berkeley, CA, January 1992, pp 125-138.
    • (1992) Proceedings of the Winter 1992USENIX Conference , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 5
    • 0012889295 scopus 로고    scopus 로고
    • A Language-Based Approach to Security
    • F. B. Schneider, etc, A Language-Based Approach to Security, Informatics, 2001, pp. 86-101.
    • (2001) Informatics , pp. 86-101
    • Schneider, F.B.1    etc2
  • 7
    • 33947617555 scopus 로고    scopus 로고
    • Inside Java 2 platform Security architecture, API design, and Implementation
    • Li Gong, Inside Java 2 platform Security architecture, API design, and Implementation, Addison-Wesley Longman Publishing Co., Inc., 1999.
    • (1999) Addison-Wesley Longman Publishing Co., Inc
    • Gong, L.1
  • 10
    • 2942536699 scopus 로고    scopus 로고
    • Y. Song and B. D. Fleisch, Rico: A Security Proxy for Mobile Code, Journal of Computers and Security Elsevier Advanced Technology, Elsevier Press, 23, Issue 4, 2004, pp. 338-351
    • Y. Song and B. D. Fleisch, Rico: A Security Proxy for Mobile Code, Journal of Computers and Security Elsevier Advanced Technology, Elsevier Press, Volume 23, Issue 4, 2004, pp. 338-351
  • 13
    • 33947622377 scopus 로고    scopus 로고
    • IRCache Project
    • IRCache Project: http://www.ircache.net/
  • 15
    • 0004316595 scopus 로고    scopus 로고
    • Measuring Proxy Performance with the Wisconsin Proxy Benchmark
    • Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin-Madison, April
    • J. Almeida and P. Cao. Measuring Proxy Performance with the Wisconsin Proxy Benchmark, Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin-Madison, April 1998.
    • (1998)
    • Almeida, J.1    Cao, P.2
  • 16
    • 33947672141 scopus 로고    scopus 로고
    • Web Polygraph: http://www.web-Polygraph.org
    • Polygraph
    • Web1
  • 18
    • 33947685143 scopus 로고    scopus 로고
    • CERT security report #237777, http://www.kb.cert.org/vuls/id/237777.
    • CERT security report #237777, http://www.kb.cert.org/vuls/id/237777.
  • 19
    • 33947697455 scopus 로고    scopus 로고
    • CERT security report #544392, http://www.kb.cert.org/vuls/id/544392.
    • CERT security report #544392, http://www.kb.cert.org/vuls/id/544392.
  • 20
    • 33947679024 scopus 로고    scopus 로고
    • AppletTrap: www.trendmicro.com.au/product/isap/
    • AppletTrap
  • 21
    • 33947624473 scopus 로고    scopus 로고
    • Finjan Software Documentation
    • Finjan Software Documentation: http://www.finjan.com


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.