-
1
-
-
52649112833
-
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
-
H. Chen, X. Wu, L. Yuan, B. Zang, P. Yew, and F. Chong. From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware. In Proc. ISCA, pages 401-412, 2008.
-
(2008)
Proc. ISCA
, pp. 401-412
-
-
Chen, H.1
Wu, X.2
Yuan, L.3
Zang, B.4
Yew, P.5
Chong, F.6
-
2
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In Proc. USENIX Security Symposium, pages 321-336, 2004.
-
(2004)
Proc. USENIX Security Symposium
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
3
-
-
84947229190
-
An approach to the obfuscation of control-flow of sequential computer programs
-
S. Chow, Y. Gu, H. Johnson, and V. Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In Proc. Information Security Conference, pages 144-155, 2001.
-
(2001)
Proc. Information Security Conference
, pp. 144-155
-
-
Chow, S.1
Gu, Y.2
Johnson, H.3
Zakharov, V.4
-
6
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proc. POPL, pages 184-196, 1998.
-
(1998)
Proc. POPL
, pp. 184-196
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
7
-
-
21644482450
-
Minos: Control Data Attack Prevention Orthogonal to Memory Model
-
J. Crandall and F. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. In Proc. Micro, pages 221-232, 2004.
-
(2004)
Proc. Micro
, pp. 221-232
-
-
Crandall, J.1
Chong, F.2
-
8
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
W. Cui, J. Kannan, and H. Wang. Discoverer: Automatic protocol reverse engineering from network traces. In 16th Usenix Security Symposium, 2007.
-
(2007)
16th Usenix Security Symposium
-
-
Cui, W.1
Kannan, J.2
Wang, H.3
-
9
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: a flexible information flow architecture for software security. In Proc. ISCA, pages 482-493, 2007.
-
(2007)
Proc. ISCA
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
10
-
-
76749129255
-
-
datarescue. IDA Pro. http://www.datarescue.com/idabase/.
-
datarescue. IDA Pro. http://www.datarescue.com/idabase/.
-
-
-
-
12
-
-
33745828710
-
Control flow based obfuscation
-
J. Ge, S. Chaudhuri, and A. Tyagi. Control flow based obfuscation. In Proc. DRM, pages 83-92, 2005.
-
(2005)
Proc. DRM
, pp. 83-92
-
-
Ge, J.1
Chaudhuri, S.2
Tyagi, A.3
-
13
-
-
0034272461
-
Introducing the IA-64 architecture
-
J. Huck, D. Morris, J. Ross, A. Knies, H. Mulder, and R. Zahir. Introducing the IA-64 architecture. IEEE Micro, 20(5):12-23, 2000.
-
(2000)
IEEE Micro
, vol.20
, Issue.5
, pp. 12-23
-
-
Huck, J.1
Morris, D.2
Ross, J.3
Knies, A.4
Mulder, H.5
Zahir, R.6
-
16
-
-
52649153312
-
Coverage Maximization Using Dynamic Taint Tracing
-
Technical Report 112, MIT Lincoln Laboratory
-
T. Leek, G. Baker, R. Brown, M. Zhivich, and R. Lippmann. Coverage Maximization Using Dynamic Taint Tracing. Technical Report 112, MIT Lincoln Laboratory, 2007.
-
(2007)
-
-
Leek, T.1
Baker, G.2
Brown, R.3
Zhivich, M.4
Lippmann, R.5
-
17
-
-
76749158277
-
-
R. Lemos. Tracking code red. http://news.cnet.com/2009-1001-270471.html, visited May, 2009, 2001.
-
R. Lemos. Tracking code red. http://news.cnet.com/2009-1001-270471.html, visited May, 2009, 2001.
-
-
-
-
18
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In Proc. CCS, pages 290-299, 2003.
-
(2003)
Proc. CCS
, pp. 290-299
-
-
Linn, C.1
Debray, S.2
-
19
-
-
58049162000
-
Slicing obfuscations: Design, correctness, and evaluation
-
A. Majumdar, S. Drape, and C. Thomborson. Slicing obfuscations: design, correctness, and evaluation. In Proc. DRM, pages 70-81, 2007.
-
(2007)
Proc. DRM
, pp. 70-81
-
-
Majumdar, A.1
Drape, S.2
Thomborson, C.3
-
20
-
-
33645758539
-
Software watermarking via opaque predicates: Implementation, analysis, and attacks
-
G. Myles and C. Collberg. Software watermarking via opaque predicates: Implementation, analysis, and attacks. Electronic Commerce Research, 6(2):155-171, 2006.
-
(2006)
Electronic Commerce Research
, vol.6
, Issue.2
, pp. 155-171
-
-
Myles, G.1
Collberg, C.2
-
21
-
-
77957774202
-
Understanding and visualizing full systems with data flow tomography
-
S. Mysore, B. Mazloom, B. Agrawal, and T. Sherwood. Understanding and visualizing full systems with data flow tomography. In Proc. ASPLOS, pages 211-221, 2008.
-
(2008)
Proc. ASPLOS
, pp. 211-221
-
-
Mysore, S.1
Mazloom, B.2
Agrawal, B.3
Sherwood, T.4
-
22
-
-
0041475743
-
Software Obfuscation on a Theoretical Basis and Its Implementation
-
T. OGISO, Y. SAKABE, M. SOSHI, and A. MIYAJI. Software Obfuscation on a Theoretical Basis and Its Implementation. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, 86(1):176-186, 2003.
-
(2003)
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
, vol.86
, Issue.1
, pp. 176-186
-
-
OGISO, T.1
SAKABE, Y.2
SOSHI, M.3
MIYAJI, A.4
-
23
-
-
84949509764
-
Experience with software watermarking
-
J. Palsberg, S. Krishnaswamy, M. Kwon, D. Ma, Q. Shao, and Y. Zhang. Experience with software watermarking. In Proc. ACSAC, pages 308-316, 2000.
-
(2000)
Proc. ACSAC
, pp. 308-316
-
-
Palsberg, J.1
Krishnaswamy, S.2
Kwon, M.3
Ma, D.4
Shao, Q.5
Zhang, Y.6
-
25
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. ASPLOS, pages 85-96, 2004.
-
(2004)
Proc. ASPLOS
, pp. 85-96
-
-
Suh, G.1
Lee, J.2
Zhang, D.3
Devadas, S.4
-
27
-
-
52649133112
-
FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation
-
G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation. In Proc. HPCA, 2008.
-
(2008)
Proc. HPCA
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
Prvulovic, M.4
-
29
-
-
85050273691
-
Program slicing
-
M. Weiser. Program slicing. In Proc. ICSE, pages 439-449, 1981.
-
(1981)
Proc. ICSE
, pp. 439-449
-
-
Weiser, M.1
-
30
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In Proc. CCS, pages 138-147, 2002.
-
(2002)
Proc. CCS
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
|