메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 228-245

SegSlice: Towards a new class of secure programming primitives for trustworthy platforms

Author keywords

[No Author keywords available]

Indexed keywords

RUN-TIME MEASUREMENT; SECURE PROGRAMMING; STATIC PROGRAM;

EID: 77954692388     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_15     Document Type: Conference Paper
Times cited : (2)

References (34)
  • 2
    • 77954696631 scopus 로고    scopus 로고
    • New Directions for Hardware-assisted Trusted Computing Policies (Position Paper)
    • Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Vieweg+Teubner Verlag, GWV Fachverlage GmbH, Wiesbaden ISBN 978-3-8348-0794-6
    • Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: New Directions for Hardware-assisted Trusted Computing Policies (Position Paper). In: Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Future of Trust in Computing, p. 30. Vieweg+Teubner Verlag, GWV Fachverlage GmbH, Wiesbaden (2009), ISBN 978-3-8348-0794-6
    • (2009) Future of Trust in Computing , pp. 30
    • Bratus, S.1    Locasto, M.E.2    Ramaswamy, A.3    Smith, S.W.4
  • 7
    • 77954754057 scopus 로고    scopus 로고
    • Private Communication
    • Kauer, B.: Private Communication
    • Kauer, B.1
  • 9
    • 0042853268 scopus 로고    scopus 로고
    • Integrating segmentation and paging protection for safe, efficient and transparent software extensions
    • Chiueh, T.C., Venkitachalam, G., Pradhan, P.: Integrating segmentation and paging protection for safe, efficient and transparent software extensions. SIGOPS Oper. Syst. Rev. 33(5), 140-153 (1999)
    • (1999) SIGOPS Oper. Syst. Rev. , vol.33 , Issue.5 , pp. 140-153
    • Chiueh, T.C.1    Venkitachalam, G.2    Pradhan, P.3
  • 23
    • 70449688944 scopus 로고    scopus 로고
    • The murky issue of changing process identity: Revising "setuid demystified"
    • login: June
    • Tsafrir, D., Silva, D.D., Wagner, D.: The murky issue of changing process identity: revising "setuid demystified". In: USENIX; login: (June 2008)
    • (2008) USENIX
    • Tsafrir, D.1    Silva, D.D.2    Wagner, D.3
  • 24
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • Syverson, P., Jha, S. (eds.) ACM Press, New York
    • Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Syverson, P., Jha, S. (eds.) Proceedings of CCS 2008, October 2008, pp. 27-38. ACM Press, New York (2008)
    • (2008) Proceedings of CCS 2008, October 2008 , pp. 27-38
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 27
    • 77954742312 scopus 로고    scopus 로고
    • Exploiting Format String Vulnerabilities
    • gera, riq: July
    • gera, riq: Exploiting Format String Vulnerabilities. Phrack 59(7) (July 2002)
    • (2002) Phrack , vol.59 , Issue.7
  • 28
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free
    • anonymous author: August
    • anonymous author: Once upon a free. Phrack 57(9) (August 2001)
    • (2001) Phrack , vol.57 , Issue.9
  • 29
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • MaXX: August
    • MaXX: Vudo malloc tricks. Phrack 57(8) (August 2001)
    • (2001) Phrack , vol.57 , Issue.8
  • 30
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • July
    • Durden, T.: Bypassing PaX ASLR protection. Phrack 59(5) (July 2002)
    • (2002) Phrack , vol.59 , Issue.5
    • Durden, T.1
  • 31
    • 76949101487 scopus 로고    scopus 로고
    • Getting around non-executable stack (and fix)
    • August
    • Designer, S.: Getting around non-executable stack (and fix). Bugtraq mailing list (August 1997)
    • (1997) Bugtraq Mailing List
    • Designer, S.1
  • 32
    • 21844444349 scopus 로고    scopus 로고
    • Defeating solar designer non-executable stack patch
    • Wojtczuk, R.: Defeating solar designer non-executable stack patch. Bugtraq mailing list (1998)
    • (1998) Bugtraq Mailing List
    • Wojtczuk, R.1
  • 33
    • 3042642332 scopus 로고    scopus 로고
    • Advanced return-into-lib(c) exploits (PaX case study)
    • nergal: December
    • nergal: Advanced return-into-lib(c) exploits (PaX case study). Phrack 58(4) (December 2001)
    • (2001) Phrack , vol.58 , Issue.4
  • 34
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • De Capitani di Vimercati, S., Syverson, P. (eds.) ACM Press, New York
    • Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of CCS 2007, October 2007, pp. 552-561. ACM Press, New York (2007)
    • (2007) Proceedings of CCS 2007, October 2007 , pp. 552-561
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.