메뉴 건너뛰기




Volumn 18, Issue 12, 2007, Pages 1687-1699

Utilizing binary rewriting for improving end-host security

Author keywords

Binary rewriting; Performance evaluation; Security and protection; Traffic analysis; Web servers

Indexed keywords

BINARY CODES; COMPUTER SYSTEM FIREWALLS; JAVA PROGRAMMING LANGUAGE; TELECOMMUNICATION TRAFFIC; WEB SERVICES;

EID: 36348972313     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2007.1083     Document Type: Article
Times cited : (2)

References (35)
  • 1
    • 0041350423 scopus 로고    scopus 로고
    • Design and Implementation of a Distributed Virtual Machine for Networked Computers
    • Dec
    • E.G. Sirer et al., "Design and Implementation of a Distributed Virtual Machine for Networked Computers," Proc. 17th Symp. Operating Systems Principles, pp. 202-216, Dec. 1999.
    • (1999) Proc. 17th Symp. Operating Systems Principles , pp. 202-216
    • Sirer, E.G.1
  • 2
    • 2642520196 scopus 로고    scopus 로고
    • A Binary Rewriting Defense against Stack-Based Buffer Overflow Attacks
    • June
    • M. Prasad and T. Chiueh, "A Binary Rewriting Defense against Stack-Based Buffer Overflow Attacks," Proc. Usenix Ann. Technical Conf., June 2003.
    • (2003) Proc. Usenix Ann. Technical Conf
    • Prasad, M.1    Chiueh, T.2
  • 4
    • 0000596666 scopus 로고
    • Purify: A Tool for Detecting Memory Leaks and Access Errors in C and C++ Programs
    • Jan
    • R. Hastings and B. Joyce, "Purify: A Tool for Detecting Memory Leaks and Access Errors in C and C++ Programs," Proc. Winter Usenix Conf. pp. 125-138, Jan. 1992.
    • (1992) Proc. Winter Usenix Conf , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 5
    • 0012889295 scopus 로고    scopus 로고
    • A Language-Based Approach to Security
    • F.B. Schneider et al., "A Language-Based Approach to Security," Informatics, pp. 86-101, 2001.
    • (2001) Informatics , pp. 86-101
    • Schneider, F.B.1
  • 10
    • 2942536699 scopus 로고    scopus 로고
    • Rico: A Security Proxy for Mobile Code
    • Y. Song and B.D. Fleisch, "Rico: A Security Proxy for Mobile Code," Computers & Security, vol. 23, no. 4, pp. 338-351, 2004.
    • (2004) Computers & Security , vol.23 , Issue.4 , pp. 338-351
    • Song, Y.1    Fleisch, B.D.2
  • 16
    • 85084160243 scopus 로고    scopus 로고
    • Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
    • Jan
    • C. Cowan et al., "Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh Usenix Security Symp., pp. 63-78, Jan. 1998.
    • (1998) Proc. Seventh Usenix Security Symp , pp. 63-78
    • Cowan, C.1
  • 18
    • 0033905645 scopus 로고    scopus 로고
    • C. Cifuentes and M. Emmerik, UQBT: Adaptable Binary Translation at Low Cost, Computer, 33, no. 3, p,p. 60-66, Mar. 2000.
    • C. Cifuentes and M. Emmerik, "UQBT: Adaptable Binary Translation at Low Cost," Computer, vol. 33, no. 3, p,p. 60-66, Mar. 2000.
  • 19
    • 19944382870 scopus 로고    scopus 로고
    • Instrumentation and Optimization of Wm32/Intel Executables Using Etch
    • Aug
    • T. Romer et al., "Instrumentation and Optimization of Wm32/Intel Executables Using Etch," Proc. First Usenix Windows NT Workshop, Aug. 1997.
    • (1997) Proc. First Usenix Windows NT Workshop
    • Romer, T.1
  • 24
    • 0004316595 scopus 로고    scopus 로고
    • Measuring Proxy Performance with the Wisconsin Proxy Benchmark
    • Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin, Madison, Apr
    • J. Almeida and P. Cao, "Measuring Proxy Performance with the Wisconsin Proxy Benchmark," Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin, Madison, Apr. 1998.
    • (1998)
    • Almeida, J.1    Cao, P.2
  • 25
    • 36348947150 scopus 로고    scopus 로고
    • CERT Security Report #237777, http://www.kb.cert.org/vuls/id/237777, 2002.
    • CERT Security Report #237777, http://www.kb.cert.org/vuls/id/237777, 2002.
  • 26
    • 36348977200 scopus 로고    scopus 로고
    • CERT Security Report #447569, http://www.kb.cert.org/vuls/id/447569, 2005.
    • CERT Security Report #447569, http://www.kb.cert.org/vuls/id/447569, 2005.
  • 29
    • 36349016318 scopus 로고    scopus 로고
    • Web Polygraph, http://www.web-polygraph.org, 2006.
    • (2006) Web Polygraph
  • 30
    • 36348962702 scopus 로고    scopus 로고
    • Apache Document, http://www.apache.org/, 2006.
    • (2006) Apache Document
  • 32
    • 36348982427 scopus 로고    scopus 로고
    • IRCache Project
    • IRCache Project, http://www.ircache.net/, 2006.
    • (2006)
  • 34
    • 36349015110 scopus 로고    scopus 로고
    • Finjan Software Documentation
    • Finjan Software Documentation, http://www.finjan.com, 2006.
    • (2006)
  • 35
    • 36349009526 scopus 로고    scopus 로고
    • Access Control Documentation
    • Access Control Documentation, http://groups.northwestern.edu/exec/ htmldocs/NT_Security.html, 2006.
    • (2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.