메뉴 건너뛰기




Volumn , Issue , 2009, Pages 49-54

Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks

Author keywords

Attestation systems; Integrity monitoring; Return oriented programming

Indexed keywords

BUFFER OVERFLOWS; COMPUTING PLATFORM; DYNAMIC INTEGRITY; INTEGRITY MONITORING; OPERATING SYSTEMS; PROGRAM BINARY; RUNTIMES; STATIC LOADS; TRUSTED COMPUTING;

EID: 74049136385     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655108.1655117     Document Type: Conference Paper
Times cited : (128)

References (36)
  • 2
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), 1996.
    • (1996) Phrack Magazine , vol.49 , Issue.14
    • One, A.1
  • 13
    • 70449690094 scopus 로고    scopus 로고
    • Internet Crime Complaint Center
    • Internet Crime Complaint Center. 2008 Internet Crime Report. http://www.ic3.gov/media/annualreport/2008-IC3Report.pdf, 2008.
    • (2008) Internet Crime Report , pp. 2008
  • 21
    • 21644481379 scopus 로고    scopus 로고
    • Bear: An open-source virtual secure coprocessor based on TCPA
    • Technical Report TR2003-471, Department of Computer Science, Dartmouth College
    • R. Macdonald, S. Smith, J. Marchesini, and O. Wild. Bear: An open-source virtual secure coprocessor based on TCPA. Technical Report TR2003-471, Department of Computer Science, Dartmouth College, 2003.
    • (2003)
    • Macdonald, R.1    Smith, S.2    Marchesini, J.3    Wild, O.4
  • 22
    • 80053150585 scopus 로고    scopus 로고
    • July 2007
    • Microsoft Corporation. Bitlocker drive encryption, July 2007. http://www.microsoft.com/technet/ windowsvista/security/bitlockr.mspx.
    • Bitlocker drive encryption
  • 23
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed Security Symposium, 2005.
    • (2005) Proceedings of the Network and Distributed Security Symposium
    • Newsome, J.1    Song, D.2
  • 24
    • 74049151718 scopus 로고    scopus 로고
    • PaX Team
    • PaX Team. http://pax.grsecurity.net/.
  • 26
    • 24644439462 scopus 로고    scopus 로고
    • Property attestation - scalable and privacy-friendly security assessment of peer computers
    • 3548, IBM Research, May
    • J. Poritz, M. Schunter, E. Van Herreweghen, and M. Waidner. Property attestation - scalable and privacy-friendly security assessment of peer computers. Technical Report RZ 3548, IBM Research, May 2004.
    • (2004) Technical Report RZ
    • Poritz, J.1    Schunter, M.2    Van Herreweghen, E.3    Waidner, M.4
  • 28
    • 29244450159 scopus 로고    scopus 로고
    • Property-based attestation for computing platforms: Caring about properties, not mechanisms
    • ACM
    • A.-R. Sadeghi and C. Stüble. Property-based attestation for computing platforms: Caring about properties, not mechanisms. In The 2004 New Security Paradigms Workshop, pages 67-77. ACM, 2004.
    • (2004) The 2004 New Security Paradigms Workshop , pp. 67-77
    • Sadeghi, A.-R.1    Stüble, C.2
  • 30
    • 84870259303 scopus 로고    scopus 로고
    • SANS Institute, Nov. 2007
    • SANS Institute. SANS Top-20 2007 Security Risks. http://www.sans.org/ top20/2007/top20.pdf, Nov. 2007.
    • SANS Top-20 2007 Security Risks
  • 32
    • 74049108808 scopus 로고    scopus 로고
    • Solar Designer. return-to-libc attack. Bugtraq, 1997.
    • Solar Designer. "return-to-libc" attack. Bugtraq, 1997.
  • 35
    • 74049118183 scopus 로고    scopus 로고
    • TPM main specification
    • Trusted Computing Group, Version 1.2 rev, July 2007
    • Trusted Computing Group. TPM main specification. Specification Version 1.2 rev. 103, July 2007. https: //www.trustedcomputinggroup.org/specs/TPM/.
    • Specification , pp. 103
  • 36
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium, pages 121-136, 2006.
    • (2006) Proceedings of the 15th USENIX Security Symposium , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.