메뉴 건너뛰기




Volumn , Issue 2008 PROCEEDINGS, 2008, Pages 117-128

Testudo: Heavyweight Security Analysis via Statistical Sampling

Author keywords

[No Author keywords available]

Indexed keywords

BUS DESIGN; COVERAGE ANALYSIS; DATAFLOW; DISTRIBUTED DEBUGGING; DYNAMIC TYPE; HARDWARE MODIFICATIONS; HARDWARE PLATFORM; HARDWARE-ASSISTED; LOW HARDWARE COSTS; MEMORY OVERHEADS; MEMORY SYSTEMS; NOVEL HARDWARE; PERFORMANCE IMPACT; PIPELINE REGISTERS; RANDOM SET; RUNTIME OVERHEADS; SECURITY ANALYSIS; SECURITY VULNERABILITIES; SMALL SAMPLES; SOFTWARE BUG; SOFTWARE IMPLEMENTATION; STATISTICAL SAMPLING; STORAGE SPACES;

EID: 66749133987     PISSN: 10724451     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MICRO.2008.4771784     Document Type: Conference Paper
Times cited : (10)

References (35)
  • 1
    • 66749184188 scopus 로고    scopus 로고
    • Bochs: The cross platform IA-32 emulator. http://bochs. sourceforge.net.
    • Bochs: The cross platform IA-32 emulator. http://bochs. sourceforge.net.
  • 7
    • 84868989972 scopus 로고    scopus 로고
    • Feb. 2007
    • H. de Vries. Chip-Architect.com, Feb. 2007. http://www. chip-architect.com/news/2007-02-19-Various-Images.html.
    • Chip-Architect.com
    • de Vries, H.1
  • 17
    • 35448931569 scopus 로고    scopus 로고
    • Quantitative information-flow tracking for c and related languages. Technical report, MIT-CSAIL
    • Nov
    • S. McCamant and M. D. Ernst. Quantitative information-flow tracking for c and related languages. Technical report, MIT-CSAIL, Nov. 2006.
    • (2006)
    • McCamant, S.1    Ernst, M.D.2
  • 20
    • 66749120197 scopus 로고    scopus 로고
    • Netcraft Ltd. April 2008 web server survey. http://news.netcraft.com/ archives/2008/04/14/april-2008-web-server-survey.html.
    • Netcraft Ltd. April 2008 web server survey. http://news.netcraft.com/ archives/2008/04/14/april-2008-web-server-survey.html.
  • 23
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. of Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Proc. of Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 25
    • 40349087553 scopus 로고    scopus 로고
    • F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In Proc. of International Symposium on Microarchitecture (MICRO), 2006.
    • F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In Proc. of International Symposium on Microarchitecture (MICRO), 2006.
  • 31
    • 66749089290 scopus 로고    scopus 로고
    • S. Thoziyoor, N. Muralimanohar, and N. Jouppi. CACTI 5.0. http://www.hpl.hp.com/techreports/2007/HPL-2007-167. pdf, Oct. 2007.
    • S. Thoziyoor, N. Muralimanohar, and N. Jouppi. CACTI 5.0. http://www.hpl.hp.com/techreports/2007/HPL-2007-167. pdf, Oct. 2007.
  • 35
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practial approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practial approach to defeat a wide range of attacks. In Proceedings of USENIX Security Conference, 2006.
    • (2006) Proceedings of USENIX Security Conference
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.