메뉴 건너뛰기




Volumn 15, Issue 5, 2007, Pages 546-559

Architectural support for run-time validation of program data properties

Author keywords

Embedded processors; Processor architectures; Security and protection; Special purpose and application based systems

Indexed keywords

BENCHMARKING; COMPUTER AIDED DESIGN; COMPUTER ARCHITECTURE; EMBEDDED SYSTEMS; SECURITY OF DATA; STORAGE ALLOCATION (COMPUTER);

EID: 34249779582     PISSN: 10638210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVLSI.2007.896913     Document Type: Article
Times cited : (15)

References (35)
  • 1
    • 33749181800 scopus 로고    scopus 로고
    • CERT Coordination Center, Online, Available
    • CERT Coordination Center, Washington, DC, "Vulnerability notes database," (2006). [Online], Available: http://nvd.nist.gov/statistics.cfm
    • (2006) Vulnerability notes database
    • Washington, D.C.1
  • 2
    • 84860084941 scopus 로고    scopus 로고
    • Online, Available
    • NIST, Washington, DC, "ICAT statistics," [Online]. Available: http://icat.nist.gov/icat.cfm?function=statistics
    • ICAT statistics
    • NIST, W.D.C.1
  • 6
    • 27644598154 scopus 로고    scopus 로고
    • Secure embedded processing through hardware-assisted run-time monitoring
    • D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha, "Secure embedded processing through hardware-assisted run-time monitoring," in Proc. Design, Autom. Test Eur., 2005, pp. 178-183.
    • (2005) Proc. Design, Autom. Test Eur , pp. 178-183
    • Arora, D.1    Ravi, S.2    Raghunathan, A.3    Jha, N.K.4
  • 10
    • 85084160243 scopus 로고    scopus 로고
    • Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
    • C. Cowan et al., "Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. USENIX Security Symp., 1998, pp. 63-77.
    • (1998) Proc. USENIX Security Symp , pp. 63-77
    • Cowan, C.1
  • 11
    • 84881146783 scopus 로고    scopus 로고
    • Non-executable user stack
    • Online, Available
    • "Non-executable user stack," [Online]. Available: http://www.openwall.com/linux
  • 12
    • 0035195201 scopus 로고    scopus 로고
    • Detecting heap buffer overflow through fault containment wrappers
    • C. Fetzer and Z. Xiao, "Detecting heap buffer overflow through fault containment wrappers," in Proc. Symp. Reliable. Distributed Syst., 2001, pp. 80-89.
    • (2001) Proc. Symp. Reliable. Distributed Syst , pp. 80-89
    • Fetzer, C.1    Xiao, Z.2
  • 13
    • 85084159869 scopus 로고    scopus 로고
    • TIED, libsafeplus: Tools for runtime buffer overflow protection
    • K. Avijit, P. Gupta, and D. Gupta, "TIED, libsafeplus: Tools for runtime buffer overflow protection," in Proc. USENIX Security Symp., 2004, pp. 45-56.
    • (2004) Proc. USENIX Security Symp , pp. 45-56
    • Avijit, K.1    Gupta, P.2    Gupta, D.3
  • 15
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • R. Hastings and B. Joyce, "Purify: Fast detection of memory leaks and access errors," in Proc. Winter USENIX Conf., 1992, pp. 125-136.
    • (1992) Proc. Winter USENIX Conf , pp. 125-136
    • Hastings, R.1    Joyce, B.2
  • 16
    • 34249796579 scopus 로고    scopus 로고
    • Valgrind Project, Online, Available
    • Valgrind Project, "Valgrind," (2007). [Online]. Available: http://valgrind.kde.org/index.html
    • (2007) Valgrind
  • 27
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning programs for privilege separation
    • D. Brumley and D. Song, "Privtrans: Automatically partitioning programs for privilege separation," in Proc. USENIX Security Symp., 2004, pp. 57-72.
    • (2004) Proc. USENIX Security Symp , pp. 57-72
    • Brumley, D.1    Song, D.2
  • 29
    • 0031339427 scopus 로고    scopus 로고
    • MediaBench: A tool for evaluating and synthesizing multimedia and communicatons systems
    • C. Lee, M. Potkonjak, and W. H. Mangione-Smith. "MediaBench: A tool for evaluating and synthesizing multimedia and communicatons systems," in Proc. Int. Symp. Microarch., 1997, pp. 330-335.
    • (1997) Proc. Int. Symp. Microarch , pp. 330-335
    • Lee, C.1    Potkonjak, M.2    Mangione-Smith, W.H.3
  • 31
    • 34249818085 scopus 로고    scopus 로고
    • D. Burger and T. M. Austin, 'The SimpleScalar tool set, Comput. Sci. Dept., Univ. Wisconsin-Madison, Tech. Rep. 2-0, 1997.
    • D. Burger and T. M. Austin, 'The SimpleScalar tool set," Comput. Sci. Dept., Univ. Wisconsin-Madison, Tech. Rep. 2-0, 1997.
  • 32
    • 84861271517 scopus 로고    scopus 로고
    • Online, Available
    • Phrack, "Once upon a free()." [Online], Available: http://www.phrack.org/archives/57/p57-0x09
    • Once upon a free()
    • Phrack1
  • 33
    • 85084163372 scopus 로고    scopus 로고
    • Stackghost: Hardware facilitated stack protection
    • M. Frantzen and M. Shuey, "Stackghost: Hardware facilitated stack protection," in Proc. 10th USENIX Security Symp., 2001, pp. 55-66.
    • (2001) Proc. 10th USENIX Security Symp , pp. 55-66
    • Frantzen, M.1    Shuey, M.2
  • 35
    • 0030149507 scopus 로고    scopus 로고
    • CACTI: An enhanced cache access and cycle time model
    • May
    • S. J. E. Wilton and N. P. Jouppi, "CACTI: An enhanced cache access and cycle time model," IEEE J. Solid State Circuits, vol. 31, no. 5, pp. 677-688, May 1996.
    • (1996) IEEE J. Solid State Circuits , vol.31 , Issue.5 , pp. 677-688
    • Wilton, S.J.E.1    Jouppi, N.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.