메뉴 건너뛰기




Volumn , Issue , 2008, Pages 187-196

Security through redundant data diversity

Author keywords

[No Author keywords available]

Indexed keywords

CASE STUDIES; DATA CORRUPTION; DATA VALUES; DEPENDABLE SYSTEMS; HIGH-ASSURANCE; INTERNATIONAL CONFERENCES; MULTIPLE VARIANTS; REDUNDANT DATA;

EID: 53349142151     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2008.4630087     Document Type: Conference Paper
Times cited : (65)

References (43)
  • 1
    • 0023997325 scopus 로고
    • Data Diversity: An Approach to Software Fault Tolerance
    • P. E. Amman and J. C. Knight. Data Diversity: an Approach to Software Fault Tolerance. IEEE Trans. On Computers, 37 (4), pp. 418-25, 1988.
    • (1988) IEEE Trans. On Computers , vol.37 , Issue.4 , pp. 418-425
    • Amman, P.E.1    Knight, J.C.2
  • 4
    • 0017792448 scopus 로고    scopus 로고
    • A. Avizienis and L. Chen. On the Implementation of N-version Programming for Software Fault-Tolerance During Program Execution. International Computer Software and Applications Conference. 1977
    • A. Avizienis and L. Chen. On the Implementation of N-version Programming for Software Fault-Tolerance During Program Execution. International Computer Software and Applications Conference. 1977.
  • 8
    • 84954188728 scopus 로고    scopus 로고
    • Efficient Techniques for Comprehensive Protection from Memory Error Exploits
    • S. Bhatkar, D. DuVarney, and R. Sekar. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. Usenix Security. 2005.
    • (2005) Usenix Security
    • Bhatkar, S.1    DuVarney, D.2    Sekar, R.3
  • 11
    • 0003052123 scopus 로고    scopus 로고
    • L. Chen and Algirdas Avizienis. N-Version Programming: A Fault Tolerance Approach to Reliability of Software Operation. Fault Tolerant Computing Symposium. 1978.
    • L. Chen and Algirdas Avizienis. N-Version Programming: A Fault Tolerance Approach to Reliability of Software Operation. Fault Tolerant Computing Symposium. 1978.
  • 13
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating Buffer Overflows by Operating System Randomization
    • Tech Report CMU-CS-02-197. December
    • M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Tech Report CMU-CS-02-197. December 2002.
    • (2002)
    • Chew, M.1    Song, D.2
  • 15
    • 85009448253 scopus 로고    scopus 로고
    • Pointguard: Protecting pointers from buffer overflow vulnerabilities
    • C. Cowan, S. Beattie, J. Johansen, P. Wagle. Pointguard: protecting pointers from buffer overflow vulnerabilities. USENIX Security. 2003.
    • (2003) USENIX Security
    • Cowan, C.1    Beattie, S.2    Johansen, J.3    Wagle, P.4
  • 17
    • 0141717668 scopus 로고    scopus 로고
    • Tabulating the Heavens: Computing the Nautical Alamanac in 18th-Century England
    • M. Croarken. Tabulating the Heavens: Computing the Nautical Alamanac in 18th-Century England. IEEE Annals of the History of Computing. 2003.
    • (2003) IEEE Annals of the History of Computing
    • Croarken, M.1
  • 18
    • 53349156326 scopus 로고    scopus 로고
    • H. Etoh. GCC extension for protecting applications from stack-smashing attacks. IBM. 2004. http://www.trl.ibm.com/projects/security/ssp
    • H. Etoh. GCC extension for protecting applications from stack-smashing attacks. IBM. 2004. http://www.trl.ibm.com/projects/security/ssp
  • 20
    • 53349117729 scopus 로고    scopus 로고
    • Understanding and Countering Insider Threats in Software Development
    • ICS-TR-07-09
    • M. Franz. Understanding and Countering Insider Threats in Software Development. UC Irvine Technical Report ICS-TR-07-09. 2007.
    • (2007) UC Irvine Technical Report
    • Franz, M.1
  • 22
    • 53349096727 scopus 로고    scopus 로고
    • Beyond Output Voting: Detecting Compromised Replicas using Behavioral Distance
    • D. Gao, M. K. Reiter, D. Song. Beyond Output Voting: Detecting Compromised Replicas using Behavioral Distance. Tech Report, CMU-CYLAB-06-019. 2006.
    • (2006) Tech Report, CMU-CYLAB-06-019
    • Gao, D.1    Reiter, M.K.2    Song, D.3
  • 29
    • 0022581573 scopus 로고
    • An Experimental Evaluation of the Assumption of Independence in Multi-version Programming
    • Jan
    • J. C. Knight and N. Leveson. An Experimental Evaluation of the Assumption of Independence in Multi-version Programming. IEEE Transactions on Software Engineering, Vol 12, No 1. Jan 1986.
    • (1986) IEEE Transactions on Software Engineering , vol.12 , Issue.1
    • Knight, J.C.1    Leveson, N.2
  • 31
    • 85084164558 scopus 로고    scopus 로고
    • Statically Detecting Likely Buffer Overflow Vulnerabilities
    • D. Larochelle and D. Evans. Statically Detecting Likely Buffer Overflow Vulnerabilities. USENIX Security. 2001.
    • (2001) USENIX Security
    • Larochelle, D.1    Evans, D.2
  • 33
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
    • J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Network and Distributed System Security. 2005.
    • (2005) Network and Distributed System Security
    • Newsome, J.1    Song, D.2
  • 36
    • 33745773931 scopus 로고    scopus 로고
    • Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking
    • M. Ringenburg and D. Grossman. Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking. ACM Comp. Comm. Security. 2005.
    • (2005) ACM Comp. Comm. Security
    • Ringenburg, M.1    Grossman, D.2
  • 38
    • 84906818067 scopus 로고    scopus 로고
    • Where's the FEEB?: The Effectiveness of Instruction Set Randomization
    • A. N. Sovarel, D. Evans, N. Paul. Where's the FEEB?: The Effectiveness of Instruction Set Randomization. USENIX Security 2005.
    • (2005) USENIX Security
    • Sovarel, A.N.1    Evans, D.2    Paul, N.3
  • 40
    • 21644470294 scopus 로고    scopus 로고
    • Hardware and Binary Modification Support for Code Pointer Protection from Buffer Overflow
    • Dec
    • N. Tuck, B. Calder, and G. Varghese. Hardware and Binary Modification Support for Code Pointer Protection from Buffer Overflow. Intl. Symposium on Microarchitecture. Dec 2004.
    • (2004) Intl. Symposium on Microarchitecture
    • Tuck, N.1    Calder, B.2    Varghese, G.3
  • 41
    • 53349176530 scopus 로고    scopus 로고
    • VeriTest Corporation
    • VeriTest Corporation. WebBench 5.0. http://www.veritest.com/ benchmarks/webbench
    • WebBench 5.0
  • 43
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. USENIX Security. 2006.
    • (2006) USENIX Security
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.