메뉴 건너뛰기




Volumn , Issue , 2008, Pages 322-331

Preventing information leaks through shadow executions

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY SYSTEMS; SOFTWARE PROTOTYPING;

EID: 60649120947     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2008.50     Document Type: Conference Paper
Times cited : (53)

References (28)
  • 6
    • 84875947153 scopus 로고    scopus 로고
    • Detours: Binary interception of win32 functions
    • Berkeley, CA, USA
    • G. Hunt and D. Brubacher. Detours: binary interception of win32 functions. In USENIX Windows NT Symposium, Berkeley, CA, USA, 1999.
    • (1999) USENIX Windows NT Symposium
    • Hunt, G.1    Brubacher, D.2
  • 7
    • 84922146311 scopus 로고    scopus 로고
    • available at, http://www.virtualbox.org
    • InnoTek. VirtualBox Documentation available at http://www.virtualbox. org/. http://www.virtualbox.org.
    • VirtualBox Documentation
    • InnoTek1
  • 8
    • 0033751850 scopus 로고    scopus 로고
    • A semantic approach to secure information flow
    • R. Joshi and K. R. M. Leino. A semantic approach to secure information flow. Science of Computer Programming, 37(1-3):113-138, 2000.
    • (2000) Science of Computer Programming , vol.37 , Issue.1-3 , pp. 113-138
    • Joshi, R.1    Leino, K.R.M.2
  • 9
    • 39049154912 scopus 로고    scopus 로고
    • Data sandboxing: A technique for enforcing confidentiality policies
    • Miami Beach, Dec
    • T. Khatiwala, R. Swaminathan, and V. N. Venkatakrishnan. Data sandboxing: A technique for enforcing confidentiality policies. In ACSAC, Miami Beach, Dec. 2006.
    • (2006) ACSAC
    • Khatiwala, T.1    Swaminathan, R.2    Venkatakrishnan, V.N.3
  • 11
    • 60649106490 scopus 로고    scopus 로고
    • MSDN, available at, http://msdn.microsoft.com
    • MSDN. Hooks Documentation available at http://msdn2.microsoft.com/en- us/library/ms632589.aspx. http://msdn.microsoft.com.
    • Hooks Documentation
  • 13
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed Systems Security, 2005.
    • (2005) Network and Distributed Systems Security
    • Newsome, J.1    Song, D.2
  • 19
    • 60649101528 scopus 로고    scopus 로고
    • TightVNC. Available at
    • TightVNC. Available at http://www.tightvnc.org.
  • 21
    • 60649085524 scopus 로고    scopus 로고
    • Provably correct runtime enforcement of non-interference properties
    • Raleigh, NC, November
    • V.N. Venkatakrishnan, W. Xu, D. C. DuVarney, and R. Sekar. Provably correct runtime enforcement of non-interference properties. In ICICS Raleigh, NC, November 2006.
    • (2006) ICICS
    • Venkatakrishnan, V.N.1    Xu, W.2    DuVarney, D.C.3    Sekar, R.4
  • 25
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security Symposium, 2006.
    • (2006) USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 27
    • 84991934426 scopus 로고    scopus 로고
    • Tightlip: Keeping applications from spilling the beans
    • USENIX
    • A. R. Yumerefendi, B. Mickle, and L. P. Cox. Tightlip: Keeping applications from spilling the beans. In NSDI. USENIX, 2007.
    • (2007) NSDI
    • Yumerefendi, A.R.1    Mickle, B.2    Cox, L.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.