메뉴 건너뛰기




Volumn , Issue , 2007, Pages 117-130

Bouncer: Securing software by blocking bad input

Author keywords

Precondition slicing; Symbolic execution

Indexed keywords

EXECUTION PATHS; FALSE POSITIVE; LIBRARY FUNCTIONS; LOW OVERHEAD; NEW FORMS; PROGRAM SLICING; REAL-WORLD; SOFTWARE INSTRUMENTATION; SOFTWARE VULNERABILITIES; STATIC AND DYNAMIC ANALYSIS; SYMBOLIC EXECUTION; SYSTEM CALLS;

EID: 70450092967     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (59)

References (51)
  • 4
    • 33646767376 scopus 로고    scopus 로고
    • Control-flow Integrity: Principles, implementations, and applications
    • Nov
    • M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow Integrity: Principles, implementations, and applications. In ACM CCS, Nov. 2005.
    • (2005) ACM CCS
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 5
    • 41149179063 scopus 로고
    • Principles, techniques, and tools
    • and, Compilers
    • A. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, techniques, and tools. Prentice Hall, 1986.
    • (1986) Prentice Hall
  • 6
    • 84885205652 scopus 로고    scopus 로고
    • Weakest-precondition of unstructured programs
    • Sept
    • M. Barnett and K. R. M. Leino. Weakest-precondition of unstructured programs. In PASTE, Sept. 2005.
    • (2005) PASTE
    • Barnett, M.1    Leino, K.R.M.2
  • 7
    • 33746101822 scopus 로고    scopus 로고
    • DieHard: Probabilistic memory safety for unsafe languages
    • June
    • E. D. Berger and B. G. Zorn. DieHard: Probabilistic memory safety for unsafe languages. In PLDI, June 2006.
    • (2006) PLDI
    • Berger, E.D.1    Zorn, B.G.2
  • 8
    • 33745956039 scopus 로고    scopus 로고
    • S. Bhansali, W.-K. Chen, S. de Jong, A. Edwards, R. Murray, M. Drinic, D. Mihocka, and J. Chau. Framework for instruction-level tracing and analysis of program executuions. In VEE, June 2006.
    • S. Bhansali, W.-K. Chen, S. de Jong, A. Edwards, R. Murray, M. Drinic, D. Mihocka, and J. Chau. Framework for instruction-level tracing and analysis of program executuions. In VEE, June 2006.
  • 12
    • 84991997276 scopus 로고    scopus 로고
    • Securing software by enforcing data-flow integrity
    • Nov
    • M. Castro, M. Costa, and T. Harris. Securing software by enforcing data-flow integrity. In OSDI, Nov. 2006.
    • (2006) OSDI
    • Castro, M.1    Costa, M.2    Harris, T.3
  • 13
    • 27544498541 scopus 로고    scopus 로고
    • S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In DSN, July 2005.
    • S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In DSN, July 2005.
  • 18
    • 33745788387 scopus 로고    scopus 로고
    • On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
    • Nov
    • J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In ACM CCS, Nov. 2005.
    • (2005) ACM CCS
    • Crandall, J.R.1    Su, Z.2    Wu, S.F.3    Chong, F.T.4
  • 19
    • 34548717095 scopus 로고    scopus 로고
    • ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing
    • May
    • W. Cui, M. Peinado, H. J. Wang, and M. Locasto. ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing. In IEEE Symposium on Security and Privacy, May 2007.
    • (2007) IEEE Symposium on Security and Privacy
    • Cui, W.1    Peinado, M.2    Wang, H.J.3    Locasto, M.4
  • 20
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminacy and formal derivation of programs
    • Aug
    • E. W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM, Aug. 1975.
    • (1975) Communications of the ACM
    • Dijkstra, E.W.1
  • 21
    • 0042078549 scopus 로고    scopus 로고
    • A survey of rollback-recovery protocols in message-passing systems
    • Sept
    • E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 34(3):375-408, Sept. 2002.
    • (2002) ACM Computing Surveys , vol.34 , Issue.3 , pp. 375-408
    • Elnozahy, E.N.1    Alvisi, L.2    Wang, Y.-M.3    Johnson, D.B.4
  • 22
    • 34548273557 scopus 로고    scopus 로고
    • Compositional Dynamic Test Generation
    • Jan
    • P. Godefroid. Compositional Dynamic Test Generation. In POPL, Jan. 2007.
    • (2007) POPL
    • Godefroid, P.1
  • 23
    • 31844450371 scopus 로고    scopus 로고
    • DART: Directed Automated Random Testing
    • P. Godefroid, N. Klarlund, and K. Sen. DART: Directed Automated Random Testing. In PLDI, 2005.
    • (2005) PLDI
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 25
    • 70449772364 scopus 로고    scopus 로고
    • J. O. Kephart and W. C. Arnold. Automatic extraction of computer virus signatures. In Virus Bulletin, Sept. 1994.
    • J. O. Kephart and W. C. Arnold. Automatic extraction of computer virus signatures. In Virus Bulletin, Sept. 1994.
  • 26
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Aug
    • H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security Symposium, Aug. 2004.
    • (2004) USENIX Security Symposium
    • Kim, H.1    Karp, B.2
  • 27
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • July
    • J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, July 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 30
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - creating intrusion detection signatures using honeypots
    • Nov
    • C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets, Nov. 2003.
    • (2003) HotNets
    • Kreibich, C.1    Crowcroft, J.2
  • 31
    • 33846294027 scopus 로고    scopus 로고
    • Automatic generation of buffer overflow signatures: An approach based on program behavior models
    • Dec
    • Z. Liang and R. Sekar. Automatic generation of buffer overflow signatures: An approach based on program behavior models. In ACSAC, Dec. 2005.
    • (2005) ACSAC
    • Liang, Z.1    Sekar, R.2
  • 32
    • 33745800070 scopus 로고    scopus 로고
    • Fast and automated generation of attack signatures: A basis for building self-protecting servers
    • Nov
    • Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In ACM CCS, Nov. 2005.
    • (2005) ACM CCS
    • Liang, Z.1    Sekar, R.2
  • 35
    • 34548010208 scopus 로고    scopus 로고
    • Vulnerability-specific execution filtering for exploit prevention on commodity software
    • Feb
    • J. Newsome, D. Brumley, and D. Song. Vulnerability-specific execution filtering for exploit prevention on commodity software. In NDSS, Feb. 2006.
    • (2006) NDSS
    • Newsome, J.1    Brumley, D.2    Song, D.3
  • 37
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software
    • Feb
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 38
    • 84885578759 scopus 로고    scopus 로고
    • Rx: Treating bugs as allergies - a safe method to survive software failures
    • Nov
    • F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies - a safe method to survive software failures. In SOSP, Nov. 2005.
    • (2005) SOSP
    • Qin, F.1    Tucek, J.2    Sundaresan, J.3    Zhou, Y.4
  • 39
    • 84906487819 scopus 로고    scopus 로고
    • Enhancing server availability and security through failure-oblivious computing
    • Dec
    • M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, Dec. 2004.
    • (2004) OSDI
    • Rinard, M.1    Cadar, C.2    Dumitran, D.3    Roy, D.M.4    Leu, T.5    Beebee, W.6
  • 40
    • 77954504457 scopus 로고    scopus 로고
    • A practical dynamic buffer overflow detector
    • Feb
    • O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, Feb. 2004.
    • (2004) NDSS
    • Ruwase, O.1    Lam, M.2
  • 41
    • 32344447459 scopus 로고    scopus 로고
    • CUTE: A Concolic Unit Testing Engine for C
    • K. Sen, D. Marinov, and G. Agha. CUTE: A Concolic Unit Testing Engine for C. In ESEC/FSE, 2005.
    • (2005) ESEC/FSE
    • Sen, K.1    Marinov, D.2    Agha, G.3
  • 43
    • 70449830501 scopus 로고    scopus 로고
    • SPEC. Specweb99 benchmark. http://www.spec.org/osg/web99.
    • SPEC. Specweb99 benchmark. http://www.spec.org/osg/web99.
  • 44
    • 1642268792 scopus 로고    scopus 로고
    • Accurate buffer overflow detection via abstract payload execution
    • Oct
    • T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In RAID, Oct. 2002.
    • (2002) RAID
    • Toth, T.1    Kruegel, C.2
  • 45
    • 70449851527 scopus 로고    scopus 로고
    • TPC. TPC-C online transaction processing benchmark. 1999. http://www.tpc.org/tpcc.
    • TPC. TPC-C online transaction processing benchmark. 1999. http://www.tpc.org/tpcc.
  • 48
    • 12844272133 scopus 로고    scopus 로고
    • Finding and preventing runtime error handling mistakes
    • Oct
    • W. Weimer and G. C. Necula. Finding and preventing runtime error handling mistakes. In OOPSLA, Oct. 2004.
    • (2004) OOPSLA
    • Weimer, W.1    Necula, G.C.2
  • 51
    • 8344277509 scopus 로고    scopus 로고
    • Cost effective dynamic program slicing
    • June
    • X. Zhang and R. Gupta. Cost effective dynamic program slicing. In PLDI, June 2004.
    • (2004) PLDI
    • Zhang, X.1    Gupta, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.