메뉴 건너뛰기




Volumn , Issue , 2009, Pages 652-657

Architectural support for low overhead detection of memory violations

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING;

EID: 70350057475     PISSN: 15301591     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/date.2009.5090747     Document Type: Conference Paper
Times cited : (18)

References (37)
  • 2
    • 70350068208 scopus 로고    scopus 로고
    • Aleph One, Smashing The Stack For Fun and Profit, Phrack Seven, Issue Forty-Nine, July 2003.
    • Aleph One, "Smashing The Stack For Fun and Profit," Phrack Volume Seven, Issue Forty-Nine, July 2003.
  • 5
    • 0034448902 scopus 로고    scopus 로고
    • ABCD: Eliminating Array Bounds Checks on Demand
    • R. Bodik, R. Gupta, and V. Sarkar, "ABCD: Eliminating Array Bounds Checks on Demand," Proc. of PLDI, 2000.
    • (2000) Proc. of PLDI
    • Bodik, R.1    Gupta, R.2    Sarkar, V.3
  • 6
    • 70350052931 scopus 로고    scopus 로고
    • D. Burger and T. M. Austin, The SimpleScalar Tool Set, Version 2.0, Computer Arch. News. 1997
    • D. Burger and T. M. Austin, "The SimpleScalar Tool Set, Version 2.0," Computer Arch. News. 1997.
  • 7
    • 0003741020 scopus 로고    scopus 로고
    • Olden: Parallelizing Programs with Dynamic Data Structures on Distributed-Memory Machines,
    • PhD Thesis, Princeton University Department of Computer Science, June
    • M. Carlisle, "Olden: Parallelizing Programs with Dynamic Data Structures on Distributed-Memory Machines," PhD Thesis, Princeton University Department of Computer Science, June 1996.
    • (1996)
    • Carlisle, M.1
  • 8
    • 70350074437 scopus 로고    scopus 로고
    • Checker. http://www.gnu.org/software/checker/checker.html
    • Checker
  • 10
    • 85084160792 scopus 로고    scopus 로고
    • Understanding data lifetime via whole system simulation
    • J. Chow, et al., "Understanding data lifetime via whole system simulation," In Proc. of the USENIX Security Symp, 2004.
    • (2004) Proc. of the USENIX Security Symp
    • Chow, J.1
  • 11
    • 85084160243 scopus 로고    scopus 로고
    • StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
    • C. Cowan, et al., "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. USENIX Security Conf., 1998.
    • (1998) Proc. USENIX Security Conf
    • Cowan, C.1
  • 12
    • 33646073635 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • J. R. Crandall and F. T. Chong, "Minos: Control data attack prevention orthogonal to memory model," In Proc. Micro, 2004.
    • (2004) Proc. Micro
    • Crandall, J.R.1    Chong, F.T.2
  • 13
    • 35348907867 scopus 로고    scopus 로고
    • Raksha: A flexible informatin flow architecture for software security
    • M. Dalton, et al., "Raksha: A flexible informatin flow architecture for software security," Proc. ISCA, 2007.
    • (2007) Proc. ISCA
    • Dalton, M.1
  • 14
    • 42149150286 scopus 로고    scopus 로고
    • D. Dhurjati, et al., Memory safety without garbage collection for embedded applications, ACM Trans. on Embedded Computing Sys, Feb. 2005.
    • D. Dhurjati, et al., "Memory safety without garbage collection for embedded applications," ACM Trans. on Embedded Computing Sys, Feb. 2005.
  • 15
    • 34247170052 scopus 로고    scopus 로고
    • Backwards-Compatible Array Bounds Checking for C with Very Low Overhead
    • ICSE
    • D. Dhurjati and V. Adve, "Backwards-Compatible Array Bounds Checking for C with Very Low Overhead," Proc. Int'l Conf. on Software Engineering (ICSE), 2006.
    • (2006) Proc. Int'l Conf. on Software Engineering
    • Dhurjati, D.1    Adve, V.2
  • 16
    • 0037702242 scopus 로고    scopus 로고
    • CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C
    • N. Dor, M. Rodeh, and M. Sagiv, "CSSV: Towards a Realistic Tool for Statically Detecting All Buffer Overflows in C," Proc. PLDI, 2003.
    • (2003) Proc. PLDI
    • Dor, N.1    Rodeh, M.2    Sagiv, M.3
  • 17
    • 3142582577 scopus 로고    scopus 로고
    • Buffer overrun detection using linear programming and static analysis
    • Sec
    • V. Ganapathy, et al., "Buffer overrun detection using linear programming and static analysis," Proc. ACM Conf. on Comp. and Comm. Sec., 2003.
    • (2003) Proc. ACM Conf. on Comp. and Comm
    • Ganapathy, V.1
  • 20
    • 70350041682 scopus 로고    scopus 로고
    • iSec Security Research
    • iSec Security Research: Vulnerabilities 2004. http://www.isec.pl/ vulnerabilities04.html
    • (2004) Vulnerabilities
  • 22
  • 23
    • 70350061876 scopus 로고    scopus 로고
    • Efficient Dynamic Detection of Input Related Software Errors,
    • PhD Dissertation, University of Michigan
    • E. Larson, "Efficient Dynamic Detection of Input Related Software Errors," PhD Dissertation, University of Michigan, 2004.
    • (2004)
    • Larson, E.1
  • 25
    • 70350059972 scopus 로고    scopus 로고
    • MS TechNet Security, http://www.microsoft.com/technet/Security/default. mspx
    • MS TechNet Security
  • 26
    • 70350059273 scopus 로고    scopus 로고
    • MITRE Corporation. CAN-2004-0416. Common Vulnerabilities and Exposures (CVE) (cve.mitre.org), 2004.
    • MITRE Corporation. CAN-2004-0416. Common Vulnerabilities and Exposures (CVE) (cve.mitre.org), 2004.
  • 27
    • 70350061873 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Department of Commerce, Software errors cost U.S. economy $59.5 billion annually, NIST News Release 2002-10, June 2002.
    • National Institute of Standards and Technology (NIST), Department of Commerce, "Software errors cost U.S. economy $59.5 billion annually," NIST News Release 2002-10, June 2002.
  • 29
    • 8344281803 scopus 로고    scopus 로고
    • B. Perens. Electric Fence. http://sunsite.unc.edu/pub/Linux/devel/lang/c/ ElectricFence.2.0.5.tar.gz
    • Electric Fence
    • Perens, B.1
  • 31
    • 36448995534 scopus 로고    scopus 로고
    • RIFLE: An architectural framework for usercentric information-flow security
    • N. Vachharajani, et al., "RIFLE: An architectural framework for usercentric information-flow security," In Proc. Micro, 2004.
    • (2004) Proc. Micro
    • Vachharajani, N.1
  • 32
    • 70350077617 scopus 로고    scopus 로고
    • Valgrind. http://valgrind.kde.org.
    • Valgrind
  • 34
    • 70350064241 scopus 로고    scopus 로고
    • W. Xu, et al, An efficient and backwards-compatible transformation to ensure memory safety of c programs, Proc. Symp. on Foundations of Software Engineering
    • W. Xu, et al., "An efficient and backwards-compatible transformation to ensure memory safety of c programs," Proc. Symp. on Foundations of Software Engineering, 2004.
    • (2004)
  • 35
    • 77954512971 scopus 로고    scopus 로고
    • Protecting C programs from attacks via invalid pointer dereferences
    • S. Yong and S. Horwitz, "Protecting C programs from attacks via invalid pointer dereferences," In Foundations of Software Engineering, 2003.
    • (2003) Foundations of Software Engineering
    • Yong, S.1    Horwitz, S.2
  • 36
    • 70350050967 scopus 로고    scopus 로고
    • http://www.mcafee.com/us/local-content/white-papers/wp- ricochetbriefbuffer.pdf
  • 37
    • 84864852042 scopus 로고    scopus 로고
    • Hardbound: Architectural Support for Spatial Safety of the C Programming Language
    • J. Devietti, et al. "Hardbound: Architectural Support for Spatial Safety of the C Programming Language," Proc. ASPLOS 2008.
    • (2008) Proc. ASPLOS
    • Devietti, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.