메뉴 건너뛰기




Volumn 147, Issue , 2004, Pages 225-240

Install-time vaccination of windows executables to defend against stack smashing attacks

Author keywords

Buffer overflow; Computer security; Malware; Microsoft windows operating system

Indexed keywords

BENCHMARKING; MALWARE; SECURITY OF DATA;

EID: 72849146986     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/1-4020-8143-x_15     Document Type: Conference Paper
Times cited : (7)

References (27)
  • 3
    • 84902494537 scopus 로고    scopus 로고
    • [Bug03] Microsoft Windows RegEdit.exe registry key value buffer overflow vulnerability. Bugtraq id 7411, 16 April
    • [Bug03] Microsoft Windows RegEdit.exe registry key value buffer overflow vulnerability. Bugtraq id 7411, 16 April 2003. http://www.securityfocus.com/bid/7411.
    • (2003)
  • 5
    • 0035400735 scopus 로고    scopus 로고
    • Recovery of jump table case statements from binary code
    • [CE01]
    • [CE01] Cristina Cifuentes and Mike Van Emmerik. Recovery of jump table case statements from binary code. Science of Computer Proqramminq, 40(2-3):171-188, 2001.
    • (2001) Science of Computer Proqramminq , vol.40 , Issue.2-3 , pp. 171-188
    • Cifuentes, C.1    Van Emmerik, M.2
  • 6
    • 84902494538 scopus 로고    scopus 로고
    • [CER02] CERT/cc statistics 1988-2001, 2002
    • [CER02] CERT/cc statistics 1988-2001, 2002. http://www.cert.org/stats/.
  • 7
    • 84902494539 scopus 로고    scopus 로고
    • [CER03a] CERT advisory CA-2003-16: Buffer overflow in Microsoft RPC, 17 July 2003
    • [CER03a] CERT advisory CA-2003-16: Buffer overflow in Microsoft RPC, 17 July 2003. http://www.cert.org/advisories/CA-2003-16.html.
  • 8
    • 84902494540 scopus 로고    scopus 로고
    • [CER03b] CERT advisory CA-2003-20: W32/Blaster worm, 11 August 2003
    • [CER03b] CERT advisory CA-2003-20: W32/Blaster worm, 11 August 2003. http://www.cert.org/advisories/CA-2003-20.html.
  • 10
    • 84890090975 scopus 로고    scopus 로고
    • Cleanness checking of string manipulations in C programs via integer analysis
    • [DRS01], Paris, France, Springer-Verlag
    • [DRS01] Nurit Dor, Michael Rodeh, and Mooly Sagiv. Cleanness checking of string manipulations in C programs via integer analysis. In Proc. 8th International Static Analysis Symposium (SAS), LNCS 2126, Paris, France, 2001. Springer-Verlag.
    • (2001) Proc. 8th International Static Analysis Symposium (SAS), LNCS 2126
    • Dor, N.1    Rodeh, M.2    Sagiv, M.3
  • 11
    • 0036147522 scopus 로고    scopus 로고
    • Improving security using extensible lightweight static analysis
    • [EL02]
    • [EL02] David Evans and David Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1):42-51, 2002.
    • (2002) IEEE Software , vol.19 , Issue.1 , pp. 42-51
    • Evans, D.1    Larochelle, D.2
  • 13
    • 84875947153 scopus 로고    scopus 로고
    • Detours: Binary interception of Win32 functions
    • [HB99]
    • [HB99] Galen Hunt and Doug Brubacher. Detours: Binary interception of Win32 functions. In Proc. 3rd USENIX NT Symposium, pages 135-144, 1999.
    • (1999) Proc. 3rd USENIX NT Symposium , pp. 135-144
    • Hunt, G.1    Brubacher, D.2
  • 15
    • 84902494542 scopus 로고    scopus 로고
    • [IDA03] The IDA Pro disassembler and debugger
    • [IDA03] The IDA Pro disassembler and debugger, v4.51, 2003. http://www.datarescue.com/idabase/.
    • (2003) , vol.4 , Issue.51
  • 16
    • 84902494543 scopus 로고    scopus 로고
    • [Imm03] Immunix secured solutions
    • [Imm03] Immunix secured solutions, 2003. http://www.immnnix.com.
    • (2003)
  • 19
    • 84902494544 scopus 로고    scopus 로고
    • [MicOl] Microsoft Visual CH-I- compiler options: /gs (control stack checking calls). Online documentation
    • [MicOl] Microsoft Visual CH-I- compiler options: /gs (control stack checking calls). Online documentation, 2001. http://msdn.microsoft.com/library/default.asp?url=/library/en-us/vccore/html/_core_.2f.gs.asp.
    • (2001)
  • 21
    • 79958108049 scopus 로고    scopus 로고
    • Four different tricks to bypass StackShield and Stack- Guard protection
    • [Ric02]
    • [Ric02] Gerardo Richarte. Four different tricks to bypass StackShield and Stack- Guard protection. Core Security Technologies, 2002. http://downloads.securityfocus.com/library/StackGuard.pdf.
    • (2002) Core Security Technologies
    • Richarte, G.1
  • 22
    • 84881146783 scopus 로고    scopus 로고
    • [Sol]Solar Designer
    • [Sol]Solar Designer. Nonexecutable user stack, http://www.false.com/security/linux-stack/.
    • Nonexecutable User Stack
  • 25
    • 84902494530 scopus 로고    scopus 로고
    • [StaOO] Stackshield
    • [StaOO] Stackshield, 2000. http://www.angelfire.com/sk/stackshield.
    • (2000)
  • 27


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.