메뉴 건너뛰기




Volumn , Issue , 2006, Pages 18-24

Improving software security via runtime instruction-level taint checking

Author keywords

Buffer overflow; Format string; Hardware tagging

Indexed keywords

BUFFER STORAGE; COMPUTER PROGRAM LISTINGS; DATA TRANSFER; SECURITY OF DATA; SOFTWARE ARCHITECTURE;

EID: 34547203977     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1181309.1181313     Document Type: Conference Paper
Times cited : (28)

References (18)
  • 7
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • Jonathan Pincus and Brandon Baker. "Beyond stack smashing: Recent advances in exploiting buffer overruns". IEEE Security and Privacy, 2004.
    • (2004) IEEE Security and Privacy
    • Pincus, J.1    Baker, B.2
  • 9
    • 34547147664 scopus 로고    scopus 로고
    • D. Burger and T. M. Austin. The Simplescalar Tool Set Version 2.0. Technical Report, Computer Science Department, University of Wisconsin-Madison, 1997
    • D. Burger and T. M. Austin. "The Simplescalar Tool Set Version 2.0". Technical Report, Computer Science Department, University of Wisconsin-Madison, 1997.
  • 11
    • 33750325871 scopus 로고    scopus 로고
    • Argos: An Emulator for Fingerprinting Zero-Day Attacks
    • Leuven, Belgium, April
    • Georgios Portokalidis, Asia, Slowinska and Herbert Bos. "Argos: an Emulator for Fingerprinting Zero-Day Attacks". In proceedings of ACM SIGOPS EUROSYS 2006, Leuven, Belgium, April 2006.
    • (2006) proceedings of ACM SIGOPS EUROSYS
    • Portokalidis, G.1    Asia, S.2    Bos, H.3
  • 15
    • 34547228965 scopus 로고    scopus 로고
    • SSH CRC-32 Compensation Attack Detector Vulnerability. http://www.securityfocus.com/bid/2347
    • SSH CRC-32 Compensation Attack Detector Vulnerability. http://www.securityfocus.com/bid/2347


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.