-
1
-
-
34547409501
-
Proteus: Virtualization for diversified tamper-resistance
-
Anckaert, B., Jakubowski, M., Venkatesan, R.: Proteus: virtualization for diversified tamper-resistance. In: The 6th ACM workshop on Digital Rights Management, pp. 47-58 (2006)
-
(2006)
The 6th ACM workshop on Digital Rights Management
, pp. 47-58
-
-
Anckaert, B.1
Jakubowski, M.2
Venkatesan, R.3
-
2
-
-
0017792448
-
-
Avizienis, A, Chen, L, On the implementation of N-version programming for software fault tolerance during execution. In: The 1st IEEE Computer Software and Applications Conference, pp. 149-155 1977
-
Avizienis, A., Chen, L.: On the implementation of N-version programming for software fault tolerance during execution. In: The 1st IEEE Computer Software and Applications Conference, pp. 149-155 (1977)
-
-
-
-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
16644362894
-
Randomized instruction set emulation
-
Barrantes, E., Ackley, D., Forrest, S., Stefanovi, D.: Randomized instruction set emulation. ACM Trans. on Information and System Security 8(1), 3-40 (2005)
-
(2005)
ACM Trans. on Information and System Security
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.1
Ackley, D.2
Forrest, S.3
Stefanovi, D.4
-
5
-
-
33745956039
-
Framework for instruction-level tracing and analysis of program executions
-
Bhansali, S., Chen, W., de Jong, S., Edwards, A., Murray, R., Drinic, M., Mihocka, D., Chau, J.: Framework for instruction-level tracing and analysis of program executions. In: Virtual Execution Environments Conference (2006)
-
(2006)
Virtual Execution Environments Conference
-
-
Bhansali, S.1
Chen, W.2
de Jong, S.3
Edwards, A.4
Murray, R.5
Drinic, M.6
Mihocka, D.7
Chau, J.8
-
6
-
-
84959058990
-
-
Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 160-175. Springer, Heidelberg (2002)
-
Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160-175. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
35248822611
-
-
Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.: Oblivious hashing: a stealthy software integrity verification primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 400-414. Springer, Heidelberg (2003)
-
Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.: Oblivious hashing: a stealthy software integrity verification primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 400-414. Springer, Heidelberg (2003)
-
-
-
-
8
-
-
0027684663
-
Operating system evolution through program evolution
-
Cohen, F.: Operating system evolution through program evolution. Computers and Security 12(6), 565-584 (1993)
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
9
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: The 25th Conference on Principles of Programming Languages, pp. 184-196 (1998)
-
(1998)
The 25th Conference on Principles of Programming Languages
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: A secretless framework for security through diversity. In: The 15th USENIX Security Symposium, pp. 105-120 (2006)
-
(2006)
The 15th USENIX Security Symposium
, pp. 105-120
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
11
-
-
31844441420
-
Link-time binary rewriting techniques for program compaction
-
De Sutter, B., De Bus, B., De Bosschere, K.: Link-time binary rewriting techniques for program compaction. ACM Trans. on Programming Languages and Systems 27(5), 882-945 (2005)
-
(2005)
ACM Trans. on Programming Languages and Systems
, vol.27
, Issue.5
, pp. 882-945
-
-
De Sutter, B.1
De Bus, B.2
De Bosschere, K.3
-
13
-
-
0030697765
-
Building diverse computer systems
-
Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In: The Workshop on Hot Topics in Operating Systems, pp. 67-72 (1997)
-
(1997)
The Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
15
-
-
33846272389
-
Strengthening software self-checksumming via self-modifying code
-
Giffin, J., Christodorescu, M., Kruger, L.: Strengthening software self-checksumming via self-modifying code. In: The 21st Annual Computer Security Applications Conference, pp. 23-32 (2005)
-
(2005)
The 21st Annual Computer Security Applications Conference
, pp. 23-32
-
-
Giffin, J.1
Christodorescu, M.2
Kruger, L.3
-
16
-
-
35048879839
-
-
Heffner, K., Collberg, C.: The obfuscation executive. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, pp. 428-440. Springer, Heidelberg (2004)
-
Heffner, K., Collberg, C.: The obfuscation executive. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 428-440. Springer, Heidelberg (2004)
-
-
-
-
17
-
-
84959055142
-
-
Home, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic self-checking techniques for improved tamper resistance. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 141-159. Springer, Heidelberg (2002)
-
Home, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic self-checking techniques for improved tamper resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 141-159. Springer, Heidelberg (2002)
-
-
-
-
18
-
-
14844337104
-
On achieving software diversity for improved network security using distributed coloring algorithms
-
O'Donnell, A., Sethu, H.: On achieving software diversity for improved network security using distributed coloring algorithms. In: The 11th ACM conference on Computer and Communications Security, pp. 121-131 (2004)
-
(2004)
The 11th ACM conference on Computer and Communications Security
, pp. 121-131
-
-
O'Donnell, A.1
Sethu, H.2
-
19
-
-
4143130038
-
Repairing return address stack for buffer overflow protection
-
Park, Y., Lee, G.: Repairing return address stack for buffer overflow protection. In: The 1st conference on Computing frontiers, pp. 335-342 (2004)
-
(2004)
The 1st conference on Computing frontiers
, pp. 335-342
-
-
Park, Y.1
Lee, G.2
-
21
-
-
0016829070
-
System structure for software fault tolerance
-
Randell, B.: System structure for software fault tolerance. SIGPLAN Notices 10(6), 437-449 (1975)
-
(1975)
SIGPLAN Notices
, vol.10
, Issue.6
, pp. 437-449
-
-
Randell, B.1
-
22
-
-
0001641893
-
Recplay: A fully integrated practical record/replay system
-
Ronsse, M., De Bosschere, K.: Recplay: a fully integrated practical record/replay system. ACM Transactions Computer Systems 17(2), 133-152 (1999)
-
(1999)
ACM Transactions Computer Systems
, vol.17
, Issue.2
, pp. 133-152
-
-
Ronsse, M.1
De Bosschere, K.2
-
23
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: The 11th ACM conference on Computer and communications security, pp. 298-307 (2004)
-
(2004)
The 11th ACM conference on Computer and communications security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
24
-
-
84906818067
-
Where is the FEEB? The effectiveness of instruction set randomization
-
Sovarel, A., Evans, D., Paul, N.: Where is the FEEB? The effectiveness of instruction set randomization. In: The 14th USENIX Security Symposium, pp. 145-160 (2005)
-
(2005)
The 14th USENIX Security Symposium
, pp. 145-160
-
-
Sovarel, A.1
Evans, D.2
Paul, N.3
-
25
-
-
24344490175
-
A generic attack on checksumming-based software tamper resistance
-
Wurster, G., van Oorschot, P., Somayaji, A.: A generic attack on checksumming-based software tamper resistance. In: The 26th IEEE Symposium on Security and Privacy, pp. 127-138 (2005)
-
(2005)
The 26th IEEE Symposium on Security and Privacy
, pp. 127-138
-
-
Wurster, G.1
van Oorschot, P.2
Somayaji, A.3
-
27
-
-
34547467422
-
Diversity via code transformations: A solution for NGNA renewable security
-
Zhou, Y., Main, A.: Diversity via code transformations: A solution for NGNA renewable security. In: NCTA - The National Show (2006)
-
(2006)
NCTA - The National Show
-
-
Zhou, Y.1
Main, A.2
|