메뉴 건너뛰기




Volumn 4752 LNCS, Issue , 2007, Pages 153-168

Run-time randomization to mitigate tampering

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; PROBLEM SOLVING; SECURITY OF DATA;

EID: 38149032860     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75651-4_11     Document Type: Conference Paper
Times cited : (10)

References (27)
  • 2
    • 0017792448 scopus 로고    scopus 로고
    • Avizienis, A, Chen, L, On the implementation of N-version programming for software fault tolerance during execution. In: The 1st IEEE Computer Software and Applications Conference, pp. 149-155 1977
    • Avizienis, A., Chen, L.: On the implementation of N-version programming for software fault tolerance during execution. In: The 1st IEEE Computer Software and Applications Conference, pp. 149-155 (1977)
  • 3
    • 79251578513 scopus 로고    scopus 로고
    • On the (im)possibility of obfuscating programs
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 1-18
    • Barak, B.1    Goldreich, O.2    Impagliazzo, R.3    Rudich, S.4    Sahai, A.5    Vadhan, S.6    Yang, K.7
  • 6
    • 84959058990 scopus 로고    scopus 로고
    • Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 160-175. Springer, Heidelberg (2002)
    • Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160-175. Springer, Heidelberg (2002)
  • 7
    • 35248822611 scopus 로고    scopus 로고
    • Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.: Oblivious hashing: a stealthy software integrity verification primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 400-414. Springer, Heidelberg (2003)
    • Chen, Y., Venkatesan, R., Cary, M., Pang, R., Sinha, S., Jakubowski, M.: Oblivious hashing: a stealthy software integrity verification primitive. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 400-414. Springer, Heidelberg (2003)
  • 8
    • 0027684663 scopus 로고
    • Operating system evolution through program evolution
    • Cohen, F.: Operating system evolution through program evolution. Computers and Security 12(6), 565-584 (1993)
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 16
    • 35048879839 scopus 로고    scopus 로고
    • Heffner, K., Collberg, C.: The obfuscation executive. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, 3225, pp. 428-440. Springer, Heidelberg (2004)
    • Heffner, K., Collberg, C.: The obfuscation executive. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 428-440. Springer, Heidelberg (2004)
  • 17
    • 84959055142 scopus 로고    scopus 로고
    • Home, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic self-checking techniques for improved tamper resistance. In: Sander, T. (ed.) DRM 2001. LNCS, 2320, pp. 141-159. Springer, Heidelberg (2002)
    • Home, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic self-checking techniques for improved tamper resistance. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 141-159. Springer, Heidelberg (2002)
  • 18
    • 14844337104 scopus 로고    scopus 로고
    • On achieving software diversity for improved network security using distributed coloring algorithms
    • O'Donnell, A., Sethu, H.: On achieving software diversity for improved network security using distributed coloring algorithms. In: The 11th ACM conference on Computer and Communications Security, pp. 121-131 (2004)
    • (2004) The 11th ACM conference on Computer and Communications Security , pp. 121-131
    • O'Donnell, A.1    Sethu, H.2
  • 19
    • 4143130038 scopus 로고    scopus 로고
    • Repairing return address stack for buffer overflow protection
    • Park, Y., Lee, G.: Repairing return address stack for buffer overflow protection. In: The 1st conference on Computing frontiers, pp. 335-342 (2004)
    • (2004) The 1st conference on Computing frontiers , pp. 335-342
    • Park, Y.1    Lee, G.2
  • 21
    • 0016829070 scopus 로고
    • System structure for software fault tolerance
    • Randell, B.: System structure for software fault tolerance. SIGPLAN Notices 10(6), 437-449 (1975)
    • (1975) SIGPLAN Notices , vol.10 , Issue.6 , pp. 437-449
    • Randell, B.1
  • 22
    • 0001641893 scopus 로고    scopus 로고
    • Recplay: A fully integrated practical record/replay system
    • Ronsse, M., De Bosschere, K.: Recplay: a fully integrated practical record/replay system. ACM Transactions Computer Systems 17(2), 133-152 (1999)
    • (1999) ACM Transactions Computer Systems , vol.17 , Issue.2 , pp. 133-152
    • Ronsse, M.1    De Bosschere, K.2
  • 24
    • 84906818067 scopus 로고    scopus 로고
    • Where is the FEEB? The effectiveness of instruction set randomization
    • Sovarel, A., Evans, D., Paul, N.: Where is the FEEB? The effectiveness of instruction set randomization. In: The 14th USENIX Security Symposium, pp. 145-160 (2005)
    • (2005) The 14th USENIX Security Symposium , pp. 145-160
    • Sovarel, A.1    Evans, D.2    Paul, N.3
  • 27
    • 34547467422 scopus 로고    scopus 로고
    • Diversity via code transformations: A solution for NGNA renewable security
    • Zhou, Y., Main, A.: Diversity via code transformations: A solution for NGNA renewable security. In: NCTA - The National Show (2006)
    • (2006) NCTA - The National Show
    • Zhou, Y.1    Main, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.