메뉴 건너뛰기




Volumn 5137 LNCS, Issue , 2008, Pages 1-22

Data space randomization

Author keywords

Address space randomization; Buffer overflow; Memory error

Indexed keywords

CODES (STANDARDS); CODES (SYMBOLS); COMPUTER CRIME; INJECTION (OIL WELLS); REMELTING; SECURITY OF DATA;

EID: 49949115783     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-70542-0_1     Document Type: Conference Paper
Times cited : (110)

References (41)
  • 2
    • 50249149602 scopus 로고    scopus 로고
    • Akritidis, P., Cadar, C., Raiciu, C., Costa, M., Castro, M.: Preventing memory error exploits with wit. In: IEEE Symposium on Security and Privacy (May 2008)
    • Akritidis, P., Cadar, C., Raiciu, C., Costa, M., Castro, M.: Preventing memory error exploits with wit. In: IEEE Symposium on Security and Privacy (May 2008)
  • 3
    • 33845946966 scopus 로고
    • analysis and specialization for the C programming language. PhD Thesis, DIKU, University of Copenhagen May
    • Andersen, L.O.: Program analysis and specialization for the C programming language. PhD Thesis, DIKU, University of Copenhagen (May 1994), ftp.diku.dk/pub/diku/semantics/papers/D-203.dvi.Z
    • (1994) Program
    • Andersen, L.O.1
  • 5
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack smashing attacks
    • Berkeley, CA, pp, June
    • Baratloo, A., Singh, N., Tsai, T.: Transparent run-time defense against stack smashing attacks. In: USENIX Annual Technical Conference, Berkeley, CA, pp. 251-262 (June 2000)
    • (2000) USENIX Annual Technical Conference , pp. 251-262
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 9
    • 84862209017 scopus 로고    scopus 로고
    • Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: USENIX Security Symposium (August 2003)
    • Bhatkar, S., DuVarney, D.C., Sekar, R.: Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In: USENIX Security Symposium (August 2003)
  • 10
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection, from memory error exploits
    • Baltimore, MD August
    • Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection, from memory error exploits. In: USENIX Security Symposium, Baltimore, MD (August 2005)
    • (2005) USENIX Security Symposium
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.C.3
  • 11
    • 49949117696 scopus 로고    scopus 로고
    • Bruschi, D., Cavallaro, L., Lanzi, A.: Diversified process replicae for defeating memory error exploits. In: International Workshop on Information Assurance (WIA) (April 2007)
    • Bruschi, D., Cavallaro, L., Lanzi, A.: Diversified process replicae for defeating memory error exploits. In: International Workshop on Information Assurance (WIA) (April 2007)
  • 14
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • Technical Report CMU-CS-02-197, Carnegie Mellon. University December
    • Chew, M., Song, D.: Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS-02-197, Carnegie Mellon. University (December 2002)
    • (2002)
    • Chew, M.1    Song, D.2
  • 17
    • 85009448253 scopus 로고    scopus 로고
    • PointGuard: Protecting pointers from buffer overflow vulnerabilities
    • Washington, DC August
    • Cowan, C., Beattie, S., Johansen, J., Wagle, P.: PointGuard: Protecting pointers from buffer overflow vulnerabilities. In: USENIX Security Symposium, Washington, DC (August 2003)
    • (2003) USENIX Security Symposium
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 19
    • 84886393009 scopus 로고    scopus 로고
    • Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: A secretless framework for security through diversity. In: USENIX Security Symposium (August 2006)
    • Cox, B., Evans, D., Filipi, A., Rowanhill, J., Hu, W., Davidson, J., Knight, J., Nguyen-Tuong, A., Hiser, J.: N-variant systems: A secretless framework for security through diversity. In: USENIX Security Symposium (August 2006)
  • 32
    • 49949092725 scopus 로고    scopus 로고
    • PaX
    • PaX (2001), http://pax.grsecurity.net
    • (2001)
  • 34
  • 36
    • 84957608458 scopus 로고    scopus 로고
    • Steensgaard, B.: Points-to analysis by type inference of programs with structures and unions. In: Gyimóthy, T. (ed.) CC 1996. LNCS, 1060, pp. 136-150. Springer, Heidelberg (1996)
    • Steensgaard, B.: Points-to analysis by type inference of programs with structures and unions. In: Gyimóthy, T. (ed.) CC 1996. LNCS, vol. 1060, pp. 136-150. Springer, Heidelberg (1996)
  • 38
    • 0034836394 scopus 로고    scopus 로고
    • Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy (May 2001)
    • Wagner, D., Dean, D.: Intrusion detection via static analysis. In: IEEE Symposium on Security and Privacy (May 2001)
  • 41
    • 20344383014 scopus 로고    scopus 로고
    • Xu, W, DuVarney, D.C, Sekar, R, An efficient and backwards-compatible transformation to ensure memory safety of C programs. In: ACM SIGSOFT International Symposium on the Foundations of Software Engineering, November
    • Xu, W., DuVarney, D.C., Sekar, R.: An efficient and backwards-compatible transformation to ensure memory safety of C programs. In: ACM SIGSOFT International Symposium on the Foundations of Software Engineering, Newport Beach, CA (November 2004)
    • (2004)
    • Newport Beach, C.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.