메뉴 건너뛰기




Volumn , Issue , 2006, Pages 429-438

Extended protection against stack smashing attacks without performance loss

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; PROGRAM COMPILERS;

EID: 39049133983     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2006.27     Document Type: Conference Paper
Times cited : (37)

References (35)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack, 49, 1996.
    • (1996) Phrack , vol.49
    • One, A.1
  • 7
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Washington, DC, Aug
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. of the 12th USENIX Security Symp., Washington, DC, Aug. 2003.
    • (2003) Proc. of the 12th USENIX Security Symp
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 8
    • 39049141171 scopus 로고    scopus 로고
    • Bulba and Kil3r. Bypassing Stackguard and stackshield. Phrack, 56, 2000.
    • Bulba and Kil3r. Bypassing Stackguard and stackshield. Phrack, 56, 2000.
  • 13
    • 14944385012 scopus 로고    scopus 로고
    • Protecting from stack-smashing attacks
    • Technical report, IBM Research Divison, Tokyo Research Laboratory, June
    • H. Etoh and K. Yoda. Protecting from stack-smashing attacks. Technical report, IBM Research Divison, Tokyo Research Laboratory, June 2000.
    • (2000)
    • Etoh, H.1    Yoda, K.2
  • 14
    • 0034226001 scopus 로고    scopus 로고
    • Spec cpu2000: Measuring cpu performance in the new millennium
    • July
    • J. L. Henning. Spec cpu2000: Measuring cpu performance in the new millennium. Computer, 33(7), July 2000.
    • (2000) Computer , vol.33 , Issue.7
    • Henning, J.L.1
  • 15
    • 39049141642 scopus 로고    scopus 로고
    • R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proc. of the 3rd Int. Workshop on Automatic Debugging, Linköping, Sweden, 1997.
    • R. W. M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proc. of the 3rd Int. Workshop on Automatic Debugging, Linköping, Sweden, 1997.
  • 19
    • 3042541202 scopus 로고    scopus 로고
    • The frame pointer overwrite
    • klog. The frame pointer overwrite. Phrack, 55, 1999.
    • (1999) Phrack , vol.55
    • klog1
  • 20
    • 35048849061 scopus 로고    scopus 로고
    • Enlisting hardware architecture to thwart malicious code injection
    • Proc. of the First Int. Conf. on Security in Pervasive Computing, of
    • R. B. Lee, D. K. Karig, J. P. McGregor, and Z. Shi. Enlisting hardware architecture to thwart malicious code injection. In Proc. of the First Int. Conf. on Security in Pervasive Computing, volume 2802 of LNCS, 2003.
    • (2003) LNCS , vol.2802
    • Lee, R.B.1    Karig, D.K.2    McGregor, J.P.3    Shi, Z.4
  • 27
    • 84906818067 scopus 로고    scopus 로고
    • Where's the FEEB? the effectiveness of instruction set randomization
    • Baltimore, MD, Aug
    • N. Sovarel, D. Evans, and N. Paul. Where's the FEEB? the effectiveness of instruction set randomization. In Proc. of the 14th USENIX Security Symp., Baltimore, MD, Aug. 2005.
    • (2005) Proc. of the 14th USENIX Security Symp
    • Sovarel, N.1    Evans, D.2    Paul, N.3
  • 30
    • 21844444349 scopus 로고    scopus 로고
    • Defeating Solar Designer's Non-executable Stack Patch
    • R. Wojtczuk. Defeating Solar Designer's Non-executable Stack Patch. Bugtraq mailinglist, 1998.
    • (1998) Bugtraq mailinglist
    • Wojtczuk, R.1
  • 33
    • 38849147719 scopus 로고    scopus 로고
    • Code injection in C and C++ : A survey of vulnerabilities and countermeasures
    • Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July
    • Y. Younan, W. Joosen, and F Piessens. Code injection in C and C++ : A survey of vulnerabilities and countermeasures. Technical Report CW386, Departement Computerwetenschappen, Katholieke Universiteit Leuven, July 2004.
    • (2004)
    • Younan, Y.1    Joosen, W.2    Piessens, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.