메뉴 건너뛰기




Volumn , Issue , 2006, Pages 207-218

Comprehensively and efficiently protecting the heap

Author keywords

Computer security; Heap attacks; Heap security; Heap server

Indexed keywords

HEAP MANAGEMENT LIBRARIES; HEAP SERVERS; HEAP STRUCTURE INFORMATION; VIRTUAL MEMORY;

EID: 34547520411     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1168857.1168884     Document Type: Conference Paper
Times cited : (31)

References (31)
  • 1
    • 34547529234 scopus 로고    scopus 로고
    • Alexander Anisimov, Positive Technologies. Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass. http://www.maxpatrol.com/defeating- xpsp2-heap-protection.htm, 2005.
    • Alexander Anisimov, Positive Technologies. Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass. http://www.maxpatrol.com/defeating- xpsp2-heap-protection.htm, 2005.
  • 2
    • 33846557496 scopus 로고    scopus 로고
    • Once upon afree()
    • Anonymous
    • Anonymous. Once upon afree(). Phrack Magazine, 57(9), 2001.
    • (2001) Phrack Magazine , vol.57 , Issue.9
  • 5
    • 84862209017 scopus 로고    scopus 로고
    • Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
    • S. Bhatkar, D. C.DuVarney, and R.Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits, in Proc. of the 12th USENIX Security Symp., pages 105-120, 2003.
    • (2003) Proc. of the 12th USENIX Security Symp , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 12
    • 12844267418 scopus 로고    scopus 로고
    • G. Suh, J. Lee, and S. Devadas. Secure program, execution via dynamic information flow tracking. In Proc. of the 11th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems. Boston, MA, 2004.
    • G. Suh, J. Lee, and S. Devadas. Secure program, execution via dynamic information flow tracking. In Proc. of the 11th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems. Boston, MA, 2004.
  • 13
    • 14844328033 scopus 로고    scopus 로고
    • H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address space randomization. In Proc. of the ACM Conf. on Computer and Communications Security, 2004.
    • H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address space randomization. In Proc. of the ACM Conf. on Computer and Communications Security, 2004.
  • 14
    • 21644482450 scopus 로고    scopus 로고
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. To appear in Proc. of the 37th Intl. Symp. on Microarchitecture. Portland, OR, 2004.
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. To appear in Proc. of the 37th Intl. Symp. on Microarchitecture. Portland, OR, 2004.
  • 15
    • 33846509327 scopus 로고    scopus 로고
    • Garbage Collection: Algorithms for Automatic Dynamic Memory Management
    • Jones, Richard, and Rafael Lins. Garbage Collection: Algorithms for Automatic Dynamic Memory Management. John Wiley & Sons, New York, 1996.
    • (1996) John Wiley & Sons, New York
    • Jones, R.1    Lins, R.2
  • 17
    • 34547530864 scopus 로고    scopus 로고
    • Linux Programmer's Manual. Man Pages MSGOP(2). 2002.
    • Linux Programmer's Manual. Man Pages MSGOP(2). 2002.
  • 22
    • 34547545654 scopus 로고    scopus 로고
    • R. Wojtczuk. Defeating Solar Designer Non-executable Stack Patch, http://seclists.org/lists/bugtraq, experimental study of security vulnerabilities caused by ermrs. In Pmc. of the IEEE Intl. Conf, 1998.
    • R. Wojtczuk. Defeating Solar Designer Non-executable Stack Patch, http://seclists.org/lists/bugtraq, experimental study of security vulnerabilities caused by ermrs. In Pmc. of the IEEE Intl. Conf, 1998.
  • 23
    • 84988573030 scopus 로고    scopus 로고
    • Data Execution Prevention
    • Memory Protection Technologies
    • S. Andersen and V. Abella. Data Execution Prevention. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/ sp2mempr.mspx, 2004.
    • (2004) Changes to Functionality in Microsoft Windows XP Service Pack , vol.2 , Issue.PART 3
    • Andersen, S.1    Abella, V.2
  • 26
    • 34547540699 scopus 로고    scopus 로고
    • Security Focus. Microsoft Windows winhlp32.exe Heap Overflow Vulnerability. http://www.securityfocus.com/archive/1/385332/2004-12-20/2004- 12-26/2, 2004.
    • Security Focus. Microsoft Windows winhlp32.exe Heap Overflow Vulnerability. http://www.securityfocus.com/archive/1/385332/2004-12-20/2004- 12-26/2, 2004.
  • 27
    • 29144465623 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation
    • Standard Performance Evaluation Corporation. SPEC CPU2000 Benchmarks, http://www.spec.org/osg/cpu2000/, 2000.
    • (2000) SPEC CPU2000 Benchmarks
  • 28
    • 84858088535 scopus 로고    scopus 로고
    • US-CERT. CVS Heap Overflow Vulnerability, www.uscert.gov/cas/ techalerts/index.html, pages TA04-147A, 2004.
    • (2004) CVS Heap Overflow Vulnerability
  • 29
    • 33846525003 scopus 로고    scopus 로고
    • HTTP Parsing Vulnerabilities in Checkpoint Firewall-1
    • US-CERT. HTTP Parsing Vulnerabilities in Checkpoint Firewall-1. www.uscert.gov/cas/techalerts/index.html, pages TA04-036A, 2004.
    • (2004)
  • 30
    • 34547495054 scopus 로고    scopus 로고
    • US-CERT. Microsoft Internet Explorer vulnerable to buffer overflow via FRAME and IFRAME elements, http://www.kb.cert.org/vuls/id/842160, page VU 842160, 2004.
    • US-CERT. Microsoft Internet Explorer vulnerable to buffer overflow via FRAME and IFRAME elements, http://www.kb.cert.org/vuls/id/842160, page VU 842160, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.