메뉴 건너뛰기




Volumn , Issue , 2008, Pages 273-286

Switchblade: Enforcing dynamic personalized system call models

Author keywords

Security; System call interposition; System call models; Taint analysis

Indexed keywords

FALSE POSITIVES; INCOMPLETE MODELS; NEW SYSTEMS; ON DEMANDS; PROGRAM EXECUTIONS; RUN-TIME; SECURITY; SYSTEM CALL INTERPOSITION; SYSTEM CALL MODELS; TAINT ANALYSIS;

EID: 59249101595     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352592.1352621     Document Type: Conference Paper
Times cited : (11)

References (54)
  • 1
    • 59249092422 scopus 로고    scopus 로고
    • ghttpd Log() Function Buffer Overflow Vuinerability. http://www. securityfocus.com/bid/5960.
    • ghttpd Log() Function Buffer Overflow Vuinerability. http://www. securityfocus.com/bid/5960.
  • 2
    • 33746211342 scopus 로고    scopus 로고
    • Binary rewriting and call interception for efficient runtime protection against buffer overflows
    • Kumar Avijit, Prateek Gupta, and Deepak Gupta. Binary rewriting and call interception for efficient runtime protection against buffer overflows. SOFTWARE-PRACTICE AND EXPERIENCE, (36):971-998, 2006.
    • (2006) SOFTWARE-PRACTICE AND EXPERIENCE , vol.36 , pp. 971-998
    • Avijit, K.1    Gupta, P.2    Gupta, D.3
  • 4
    • 59249084730 scopus 로고    scopus 로고
    • Paranoid penguin: An introduction to Novell AppArmor
    • Mick Bauer. Paranoid penguin: an introduction to Novell AppArmor. Linux J., 2006(148):13, 2006.
    • (2006) Linux J , vol.2006 , Issue.148 , pp. 13
    • Bauer, M.1
  • 7
    • 59249098846 scopus 로고    scopus 로고
    • Sting: An end-to-end self-healing system for definding against internet worms
    • Springer
    • David Brumley, James Newsome, and Dawn Song. Sting: An end-to-end self-healing system for definding against internet worms. In Malware Detection. Springer, 2007.
    • (2007) Malware Detection
    • Brumley, D.1    Newsome, J.2    Song, D.3
  • 17
    • 59249096383 scopus 로고    scopus 로고
    • Ulfar Erlingsson, George C. Necula, Martin Abadi, Michael Vrable, and Mihai Budiu. XFI: Software guards for system address spaces. In Microsoft Research Silicon Valley, editor, OSDI, 2006.
    • Ulfar Erlingsson, George C. Necula, Martin Abadi, Michael Vrable, and Mihai Budiu. XFI: Software guards for system address spaces. In Microsoft Research Silicon Valley, editor, OSDI, 2006.
  • 18
    • 14844332687 scopus 로고    scopus 로고
    • P (CSEC). Propolice-improved stack smashing attack detection
    • H. Etoh and K. Yoda P (CSEC). Propolice-improved stack smashing attack detection. IPSJ SIGNotes Computer Security, 14(25), 2001.
    • (2001) IPSJ SIGNotes Computer Security , vol.14 , Issue.25
    • Etoh, H.1    Yoda, K.2
  • 29
    • 59249094821 scopus 로고    scopus 로고
    • Roland McGrath. Utrace, 2007. http://people.redhat.com/roland/utrace/.
    • (2007)
  • 32
    • 35448955692 scopus 로고    scopus 로고
    • Valgrind: A framework for heavyweight dynamic binary instrumentation
    • Jun
    • Nicholas Nethereote and Julian Seward. Valgrind: A framework for heavyweight dynamic binary instrumentation. In In Proceedings of the PLDI 2007, Jun 2007.
    • (2007) In Proceedings of the PLDI 2007
    • Nethereote, N.1    Seward, J.2
  • 33
    • 84882740544 scopus 로고    scopus 로고
    • Vulnerability-specific execution filtering for exploit prevention on commodity software
    • The Internet Society
    • James Newsome, David Brumley, and Dawn Xiaodong Song. Vulnerability-specific execution filtering for exploit prevention on commodity software. In NDSS. The Internet Society, 2006.
    • (2006) NDSS
    • Newsome, J.1    Brumley, D.2    Xiaodong Song, D.3
  • 37
    • 33750325871 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zero-day attacks
    • Leuven, Belgium, April
    • Georgios Portokalidis, Asia Slowinska, and Herbert Bos. Argos: an emulator for fingerprinting zero-day attacks. In Proc. ACM SIGOPS EUROSYS, Leuven, Belgium, April 2006.
    • (2006) Proc. ACM SIGOPS EUROSYS
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3
  • 38
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • August
    • Niels Provos. Improving host security with system call policies. In 12th USENIX Security Symposium, pages 257-272, August 2003.
    • (2003) 12th USENIX Security Symposium , pp. 257-272
    • Provos, N.1
  • 40
    • 40349087553 scopus 로고    scopus 로고
    • Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks
    • Washington, DC, USA, IEEE Computer Society
    • Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. Lift: A low-overhead practical information flow tracking system for detecting security attacks. In MICRO 39: Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, pages 135-148, Washington, DC, USA, 2006. IEEE Computer Society.
    • (2006) MICRO 39: Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3
  • 53
    • 34247546866 scopus 로고    scopus 로고
    • A comparison of publicly available tools for dynamic buffer overflow prevention
    • San Diego, California, February
    • John Wilander and Mariam Kamkar. A comparison of publicly available tools for dynamic buffer overflow prevention. In Proceedings of the 10th Network and Distributed System Security Symposium, pages 149-162, San Diego, California, February 2003.
    • (2003) Proceedings of the 10th Network and Distributed System Security Symposium , pp. 149-162
    • Wilander, J.1    Kamkar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.