메뉴 건너뛰기




Volumn , Issue , 2008, Pages 15-25

Code injection attacks on harvard-architecture devices

Author keywords

Buffer overflow; Code injection attacks; Computer worms; Embedded devices; Gadgets; Harvard architecture; Return oriented programming; Wireless sensor networks

Indexed keywords

BUFFER OVERFLOW; CODE INJECTION ATTACKS; EMBEDDED DEVICES; GADGETS; HARVARD ARCHITECTURE; RETURN ORIENTED PROGRAMMING;

EID: 70349278622     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455775     Document Type: Conference Paper
Times cited : (229)

References (29)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine 49(14), 1996. http://www.phrack.org/issues. html?issue=49.
    • (1996) Phrack Magazine , vol.49 , Issue.14
    • One, A.1
  • 4
    • 41549139189 scopus 로고    scopus 로고
    • Distributed authentication of program integrity verification in wireless sensor networks
    • K. Chang and K. Shin. Distributed authentication of program integrity verification in wireless sensor networks. ACM TISSEC, 11(3), 2008.
    • (2008) ACM TISSEC , vol.11 , Issue.3
    • Chang, K.1    Shin, K.2
  • 7
    • 70349267311 scopus 로고    scopus 로고
    • Crossbow technology inc
    • Crossbow technology inc. Micaz.
    • Micaz
  • 8
    • 70349288894 scopus 로고    scopus 로고
    • Advances in OpenBSD
    • T. DeRaadt. Advances in OpenBSD. In CanSecWest, 2003.
    • (2003) CanSecWest
    • DeRaadt, T.1
  • 9
    • 34247376029 scopus 로고    scopus 로고
    • Securing the deluge network programming system
    • P. Dutta, J. Hui, D. Chu, and D. Culler. Securing the deluge network programming system. IPSN, 2006.
    • (2006) IPSN
    • Dutta, P.1    Hui, J.2    Chu, D.3    Culler, D.4
  • 10
    • 70349288893 scopus 로고    scopus 로고
    • Exploiting wireless sensor networks over 802.15.4
    • T. Goodspeed. Exploiting wireless sensor networks over 802.15.4. In ToorCon 9, San Diego, 2007.
    • (2007) ToorCon 9, San Diego
    • Goodspeed, T.1
  • 12
    • 56749092203 scopus 로고    scopus 로고
    • Towards self-propagate mal-packets in sensor networks
    • ACM
    • Q. Gu and R. Noorani. Towards self-propagate mal-packets in sensor networks. In WiSec. ACM, 2008.
    • (2008) WiSec
    • Gu, Q.1    Noorani, R.2
  • 14
    • 22744432612 scopus 로고    scopus 로고
    • The dynamic behavior of a data dissemination protocol for network programming at scale
    • ACM
    • J. W. Hui and D. Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In SenSys, ACM, 2004.
    • (2004) SenSys
    • Hui, J.W.1    Culler, D.2
  • 15
    • 70349301159 scopus 로고    scopus 로고
    • IEEE. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003.
    • IEEE. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003.
  • 16
    • 39049113465 scopus 로고    scopus 로고
    • Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
    • C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In ACSAC, 2006.
    • (2006) ACSAC
    • Kil, C.1    Jun, J.2    Bookholt, C.3    Xu, J.4    Ning, P.5
  • 17
    • 35948980830 scopus 로고    scopus 로고
    • Exploring symmetric cryptography for secure network reprogramming
    • D. H. Kim, R. Gandhi, and P. Narasimhan. Exploring symmetric cryptography for secure network reprogramming. ICDCSW, 2007.
    • (2007) ICDCSW
    • Kim, D.H.1    Gandhi, R.2    Narasimhan, P.3
  • 18
    • 70349279707 scopus 로고    scopus 로고
    • Authenticated in-network programming for wireless sensor networks
    • I. Krontiris and T. Dimitriou. Authenticated in-network programming for wireless sensor networks. In ADHOC-NOW, 2006.
    • (2006) ADHOC-NOW
    • Krontiris, I.1    Dimitriou, T.2
  • 19
    • 33947642085 scopus 로고    scopus 로고
    • Sluice: Secure dissemination of code updates in sensor networks
    • P. Lanigan, R. Gandhi, and P. Narasimhan. Sluice: Secure dissemination of code updates in sensor networks. ICDCS, 2006.
    • (2006) ICDCS
    • Lanigan, P.1    Gandhi, R.2    Narasimhan, P.3
  • 20
    • 33746690237 scopus 로고    scopus 로고
    • Transmission of ipv6 packets over ieee 802.15.4 networks (rfc 4944)
    • Technical report, IETF, September
    • G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler. Transmission of ipv6 packets over ieee 802.15.4 networks (rfc 4944). Technical report, IETF, September 2007.
    • (2007)
    • Montenegro, G.1    Kushalnagar, N.2    Hui, J.3    Culler, D.4
  • 21
    • 70349276491 scopus 로고    scopus 로고
    • Riley, Jiang, and Xu. An architectural approach to preventing code injection attacks, dsn, 2007.
    • Riley, Jiang, and Xu. An architectural approach to preventing code injection attacks, dsn, 2007.
  • 23
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • ACM
    • H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In CCS. ACM, 2007.
    • (2007) CCS
    • Shacham, H.1
  • 25
    • 70349276490 scopus 로고    scopus 로고
    • Solar Designer, return-to-libc attack. Bugtraq mailing list, August 1997.
    • Solar Designer, return-to-libc attack. Bugtraq mailing list, August 1997.
  • 27
    • 70349278172 scopus 로고    scopus 로고
    • The PaX Team. Pax
    • The PaX Team. Pax, 2003. http://pax.grsecurity.net.
    • (2003)
  • 28
    • 33744909363 scopus 로고    scopus 로고
    • Avrora: Scalable sensor network simulation with precise timing
    • B. L. Titzer, D. K. Lee, and J. Palsberg. Avrora: scalable sensor network simulation with precise timing. In IPSN, 2005.
    • (2005) IPSN
    • Titzer, B.L.1    Lee, D.K.2    Palsberg, J.3
  • 29
    • 70349270390 scopus 로고    scopus 로고
    • Ubisec&sens european project
    • Ubisec&sens european project. http://www.ist-ubisecsens.org/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.