메뉴 건너뛰기




Volumn , Issue , 2006, Pages 749-754

TainTrace: Efficient flow tracing with dynamic binary rewriting

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; COMPUTER CRIME; CONFORMAL MAPPING; DATA FLOW ANALYSIS; OPTIMIZATION; SUPERVISORY AND EXECUTIVE PROGRAMS;

EID: 34547335786     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2006.158     Document Type: Conference Paper
Times cited : (122)

References (16)
  • 3
    • 34547367994 scopus 로고    scopus 로고
    • Valgrind. http://valgrind.org/.
    • Valgrind
  • 7
    • 21644482450 scopus 로고    scopus 로고
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In MICRO37, 2004.
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In MICRO37, 2004.
  • 10
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Network and Distributed System Security Symposium, 2005.
    • (2005) 12th Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.2
  • 11
    • 34547297069 scopus 로고    scopus 로고
    • Y. Ramin. http://www.redshift.com/yramin/atp/atphttpd/.
    • Ramin, Y.1
  • 15
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • G. E. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS-XI, 2004.
    • (2004) ASPLOS-XI
    • Suh, G.E.1    Lee, J.2    Zhang, D.3    Devadas, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.