메뉴 건너뛰기




Volumn , Issue , 2007, Pages 434-441

Diversified process replicæ; for defeating memory error exploits

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; ERROR ANALYSIS; SIGNAL ANALYSIS; SOFTWARE PROTOTYPING; USER INTERFACES;

EID: 36348949033     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2007.358924     Document Type: Conference Paper
Times cited : (48)

References (23)
  • 1
    • 84906818067 scopus 로고    scopus 로고
    • Where's the FEEB? The Effectiveness of Instruction Set Randomization
    • August
    • Ana Nora Sovarel and David Evans and Nathanael Paul. Where's the FEEB? The Effectiveness of Instruction Set Randomization. In 14th USENIX Security Symposium, August 2005.
    • (2005) 14th USENIX Security Symposium
    • Nora Sovarel, A.1    Evans, D.2    Paul, N.3
  • 4
    • 36349014388 scopus 로고    scopus 로고
    • Research Laboratories, http://www.hpl.hp.com/research/linux/httperf/, Hewlett-Packard
    • D. Mosberger (main author), S. Eranian, and D. Carter, httperf - HTTP performance measurement tool. http://www.hpl.hp.com/research/linux/httperf/ - Hewlett-Packard Research Laboratories.
    • HTTP performance measurement tool
    • Mosberger, D.1    Eranian, S.2    Carter, D.3
  • 5
    • 84868370608 scopus 로고
    • Fault Interpretation: Fine-Grain Monitoring of Page Accesses
    • Daniel R. Edelson. Fault Interpretation: Fine-Grain Monitoring of Page Accesses. In USENIX Winter, pages 395-404, 1993.
    • (1993) USENIX Winter , pp. 395-404
    • Edelson, D.R.1
  • 6
    • 36349032937 scopus 로고    scopus 로고
    • Diversified Process Replicæ for Defeating Memory Error Exploits
    • 14-06, Università degli Studi di Milano
    • Danilo Bruschi, Lorenzo Cavallaro, and Andrea Lanzi. Diversified Process Replicæ for Defeating Memory Error Exploits. Technical Report RT 14-06, Università degli Studi di Milano, 2006.
    • (2006) Technical Report RT
    • Bruschi, D.1    Cavallaro, L.2    Lanzi, A.3
  • 8
    • 36348978186 scopus 로고    scopus 로고
    • Elias Aleph One Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, 0x07, Issue #49, Phile 14 of 16, December 1998.
    • Elias "Aleph One" Levy. Smashing the Stack for Fun and Profit. Phrack Magazine, Volume 0x07, Issue #49, Phile 14 of 16, December 1998.
  • 13
    • 36348959201 scopus 로고    scopus 로고
    • J. Poskanzer. thttpd, tiny/turbo/throttling, version 2.23betal-3sargel, server. http://www.acme.com/software/thttpd
    • J. Poskanzer. thttpd - tiny/turbo/throttling HTTP server. http://www.acme.com/software/thttpd/ - version 2.23betal-3sargel.
  • 14
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating Buffer Overflows by Operating System Randomization
    • Technical Report CMU-CS-02-197, Carnegie Mellon University, December
    • M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Technical Report CMU-CS-02-197, Carnegie Mellon University, December 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 15
    • 36348945887 scopus 로고    scopus 로고
    • Rafal Nergal Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
    • Rafal "Nergal" Wojtczuk. The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 0x0b, Issue 0x3a, Phile #0x04 of 0x0e, December 2001.
  • 17
    • 84862209017 scopus 로고    scopus 로고
    • Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
    • Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. In 12th USENIX Security Symposium, 2003.
    • (2003) 12th USENIX Security Symposium
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 18
    • 84954188728 scopus 로고    scopus 로고
    • Efficient Techniques for Comprehensive Protection from Memory Error Exploits
    • Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. In 14th USENIX Security Symposium, 2005.
    • (2005) 14th USENIX Security Symposium
    • Sandeep Bhatkar, R.S.1    DuVarney, D.C.2
  • 19
    • 36348988012 scopus 로고    scopus 로고
    • scut, team teso. Exploiting Format String Vulnerabilities, September 2001. version 1.2
    • scut / team teso. Exploiting Format String Vulnerabilities, September 2001. version 1.2.
  • 22
    • 0030086704 scopus 로고    scopus 로고
    • Thomas C. Bressoud Fred B. Schneider. Hypervisor-based fault tolerance. In ACM Transactions on Computer Systems, pages 14(1):80-107, February 1996.
    • Thomas C. Bressoud Fred B. Schneider. Hypervisor-based fault tolerance. In ACM Transactions on Computer Systems, pages 14(1):80-107, February 1996.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.