메뉴 건너뛰기




Volumn , Issue , 2010, Pages 337-351

On protection by layout randomization

Author keywords

[No Author keywords available]

Indexed keywords

FULL ABSTRACTION; HIGH-LEVEL PROGRAMMING LANGUAGE; MEMORY ADDRESS; SOFTWARE PROTECTION;

EID: 77957600240     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2010.30     Document Type: Conference Paper
Times cited : (16)

References (31)
  • 1
    • 84878558984 scopus 로고    scopus 로고
    • Protection in programming-language translations
    • Kim G. Larsen, Sven Skyum, and Glynn Winskel, editors, Springer, Volume 1443 of Lecture Notes in Computer Science
    • Martín Abadi. Protection in programming-language translations. In Kim G. Larsen, Sven Skyum, and Glynn Winskel, editors, Proceedings of the 25th International Colloquium on Automata, Languages and Programming, volume 1443 of Lecture Notes in Computer Science, pages 868-883. Springer, 1998.
    • (1998) Proceedings of the 25th International Colloquium on Automata, Languages and Programming , pp. 868-883
    • Abadi, M.1
  • 3
    • 85083027758 scopus 로고    scopus 로고
    • Reconciling two views of cryptography (The computational soundness of formal encryption)
    • Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.2 , pp. 103-127
    • Abadi, M.1    Rogaway, P.2
  • 4
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing PaX ASLR protection
    • Anonymous
    • Anonymous. Bypassing PaX ASLR protection. Phrack, 11(59), 2002.
    • (2002) Phrack , vol.11 , Issue.59
  • 8
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In 12th USENIX Security Symposium, 2003.
    • (2003) 12th USENIX Security Symposium
    • Bhatkar, S.1    Duvarney, D.C.2    Sekar, R.3
  • 9
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In 14th USENIX Security Symposium, 2005.
    • (2005) 14th USENIX Security Symposium
    • Bhatkar, S.1    Sekar, R.2    Duvarney, D.C.3
  • 12
    • 38049035512 scopus 로고    scopus 로고
    • Low-level software security: Attacks and defenses
    • Alessandro Aldini and Roberto Gorrieri, editors, Springer, Volume 4677 of Lecture Notes in Computer Science
    • Ú lfar Erlingsson. Low-level software security: Attacks and defenses. In Alessandro Aldini and Roberto Gorrieri, editors, Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, volume 4677 of Lecture Notes in Computer Science, pages 92-134. Springer, 2007.
    • (2007) Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures , pp. 92-134
    • Erlingsson, Ú.L.1
  • 21
    • 0026188821 scopus 로고
    • Notions of computation and monads
    • Eugenio Moggi. Notions of computation and monads. Information and Computation, 93(1):55-92, 1991.
    • (1991) Information and Computation , vol.93 , Issue.1 , pp. 55-92
    • Moggi, E.1
  • 22
    • 0015561577 scopus 로고
    • Protection in programming languages
    • James H. Morris, Jr. Protection in programming languages. Communications of the ACM, 16(1):15-21, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.1 , pp. 15-21
    • Morris Jr., J.H.1
  • 24
    • 59449083597 scopus 로고    scopus 로고
    • Exterminator: Automatically correcting memory errors with high probability
    • Gene Novark, Emery D. Berger, and Benjamin G. Zorn. Exterminator: Automatically correcting memory errors with high probability. Communications of the ACM, 51(12):87-95, 2008.
    • (2008) Communications of the ACM , vol.51 , Issue.12 , pp. 87-95
    • Novark, G.1    Berger, E.D.2    Zorn, B.G.3
  • 25
    • 77952162164 scopus 로고    scopus 로고
    • Samurai: Protecting critical data in unsafe languages
    • Karthik Pattabiraman, Vinod Grover, and Benjamin G. Zorn. Samurai: protecting critical data in unsafe languages. In EuroSys, pages 219-232, 2008.
    • (2008) EuroSys , pp. 219-232
    • Pattabiraman, K.1    Grover, V.2    Zorn, B.G.3
  • 26
    • 33745798878 scopus 로고    scopus 로고
    • PaX Project. The PaX project, 2004. http://pax.grsecurity.net/.
    • (2004) The PaX Project
  • 30
    • 84906818067 scopus 로고    scopus 로고
    • Where's the FEEB? The effectiveness of instruction set randomization
    • Anna Nora Sovarel, David Evans, and Nathanael Paul. Where's the FEEB? the effectiveness of instruction set randomization. In 14th USENIX Security Symposium, pages 145- 160, 2005.
    • (2005) 14th USENIX Security Symposium , pp. 145-160
    • Sovarel, A.N.1    Evans, D.2    Paul, N.3
  • 31
    • 85084164626 scopus 로고
    • Anonymous RPC: Low-latency protection in a 64-bit address space
    • Curtis Yarvin, Richard Bukowski, and Tom Anderson. Anonymous RPC: Low-latency protection in a 64-bit address space. In USENIX Summer Technical Conference, pages 175- 186, 1993.
    • (1993) USENIX Summer Technical Conference , pp. 175-186
    • Yarvin, C.1    Bukowski, R.2    Anderson, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.