메뉴 건너뛰기




Volumn , Issue , 2007, Pages 482-493

Raksha: A flexible information flow architecture for software security

Author keywords

Dynamic; Semantic vulnerabilities; Software security

Indexed keywords

DYNAMIC INFORMATION FLOW TRACKING (DIFT); SEMANTIC VULNERABILITIES; SOFTWARE SECURITY;

EID: 35348907867     PISSN: 10636897     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1250662.1250722     Document Type: Conference Paper
Times cited : (244)

References (28)
  • 1
    • 0041488497 scopus 로고    scopus 로고
    • CERT Coordination Center
    • CERT Coordination Center. Overview of attack trends. http://www.cert.org/ archive/pdf/attack_trends.pdf, 2002.
    • (2002) Overview of attack trends
  • 7
    • 35348826542 scopus 로고    scopus 로고
    • Cross-Compiled Linux From Scratch. http://cross-lfs.org.
    • Cross-Compiled Linux From Scratch. http://cross-lfs.org.
  • 9
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. ACM Communications, 20(7), 1977.
    • (1977) ACM Communications , vol.20 , Issue.7
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 84858360357 scopus 로고    scopus 로고
    • Imperva Inc, is it Out There: Zeroing in on the vulnerabilities of application security
    • Imperva Inc., How Safe is it Out There: Zeroing in on the vulnerabilities of application security, http://www.impervaom/company/news/2004-feb-02.html, 2004.
    • (2004) How Safe
  • 13
    • 35348845024 scopus 로고    scopus 로고
    • SecuriFly: Runtime Protection and Recovery from. Web Application Vulnerabilities
    • Technical report, Stanford University, Sept
    • B. Livshits, M. Martin, and M. S. Lam. SecuriFly: Runtime Protection and Recovery from. Web Application Vulnerabilities. Technical report, Stanford University, Sept. 2006.
    • (2006)
    • Livshits, B.1    Martin, M.2    Lam, M.S.3
  • 14
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • San Diego, CA, Feb
    • J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In the Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.
    • (2005) the Proceedings of the Network and Distributed System Security Symposium
    • Newsome, J.1    Song, D.X.2
  • 19
    • 33645766952 scopus 로고    scopus 로고
    • President's Information Technology Advisory Committee PITAC, Feb
    • President's Information Technology Advisory Committee (PITAC). CyberSecurity: A Crisis of Prioritization. http://www.nitrd.gov/pitac/reports/ 20050301\_cybersecurity/cybersecurity.pdf, Feb. 2005.
    • (2005) CyberSecurity: A Crisis of Prioritization
  • 26
    • 35348843266 scopus 로고    scopus 로고
    • Symantec Internet Security Threat Report, X: Trends for January 06 - June 06, Sept. 2006.
    • Symantec Internet Security Threat Report, Volume X: Trends for January 06 - June 06, Sept. 2006.
  • 28
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach, to defeat a wide range of attacks
    • Vancouver, Canada, Aug
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach, to defeat a wide range of attacks. In the Proceedings of the 15th USENIX Security Conference, Vancouver, Canada, Aug. 2006.
    • (2006) the Proceedings of the 15th USENIX Security Conference
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.