메뉴 건너뛰기




Volumn 7, Issue 4, 2010, Pages 351-365

An architectural approach to preventing code injection attacks

Author keywords

Code injection; secure memory architecture

Indexed keywords

CODES (SYMBOLS); VIRTUAL ADDRESSES;

EID: 78149470447     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.1     Document Type: Article
Times cited : (20)

References (37)
  • 2
    • 36048979278 scopus 로고    scopus 로고
    • Dec
    • "Pax Pageexec Documentation", http://pax.grsecurity.net/docs/ pageexec.txt, Dec. 2006.
    • (2006) Pax Pageexec Documentation
  • 8
    • 34247546866 scopus 로고    scopus 로고
    • A comparison of publicly available tools for dynamic buffer overflow prevention
    • Feb
    • J. Wilander and M. Kamkar, "A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention", Proc. 10th Network and Distributed System Security Symp., pp. 149-162, citeseer.ist.psu.edu/ wilander03comparison.html, Feb. 2003.
    • (2003) Proc. 10th Network and Distributed System Security Symp. , pp. 149-162
    • Wilander, J.1    Kamkar, M.2
  • 9
    • 0005702886 scopus 로고
    • First, draft of a report on the EDVAC
    • reprinted in, second ed., Springer
    • J. von Neumann, "First, Draft of a Report on the EDVAC", 1945, reprinted in, The Origins of Digital Computers Selected Papers, second ed., pp. 355-364, Springer, 1975.
    • (1945) The Origins of Digital Computers Selected Papers , pp. 355-364
    • Von Neumann, J.1
  • 10
    • 24344453452 scopus 로고    scopus 로고
    • Hardware-assisted circumvention of self-hashing software tamper resistance
    • Apr
    • P. C. van Oorschot, A. Somayaji, and G. Wurster, "Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance", IEEE Trans. Dependable and Secure Computing, vol. 2, no. 2, pp. 82-92, Apr. 2005.
    • (2005) IEEE Trans. Dependable and Secure Computing , vol.2 , Issue.2 , pp. 82-92
    • Van Oorschot, P.C.1    Somayaji, A.2    Wurster, G.3
  • 11
    • 33846321458 scopus 로고
    • Proposed automatic calculating machine
    • reprinted in, second ed., Springer
    • H. H. Aiken, "Proposed Automatic Calculating Machine", 1937, reprinted in, The Origins of Digital Computers Selected Papers, second ed., pp. 191-198, Springer, 1975.
    • (1937) The Origins of Digital Computers Selected Papers , pp. 191-198
    • Aiken, H.H.1
  • 12
    • 78149467598 scopus 로고
    • The automatic sequence controlled calculator
    • reprinted in, second ed., Springer
    • H. H. Aiken and G. M. Hopper, "The Automatic Sequence Controlled Calculator", 1946, reprinted in, The Origins of Digital Computers Selected Papers, second ed., pp. 199-218, Springer, 1975.
    • (1946) The Origins of Digital Computers Selected Papers , pp. 199-218
    • Aiken, H.H.1    Hopper, G.M.2
  • 13
    • 78149467214 scopus 로고    scopus 로고
    • Dec
    • "kernelthread.com:SecuringMemory", http://www.kernelthread.com/ publications/security/smemory.html, Dec. 2006.
    • (2006) Kernelthread.com:SecuringMemory
  • 14
    • 77957355973 scopus 로고    scopus 로고
    • Bypassing windows hardware-enforced dep
    • Skape and Skywing, Sept
    • Skape and Skywing, "Bypassing Windows Hardware-Enforced dep", Uninformed, vol. 2, http://www.uninformed.org, Sept. 2005.
    • (2005) Uninformed , vol.2
  • 15
    • 78149471424 scopus 로고    scopus 로고
    • Hugetlb-large page support in the linux kernel
    • Oct
    • R. Krishnakumar, "Hugetlb-Large Page Support in the Linux Kernel", Linux Gazette, vol. 155, http://linuxgazette.net/155/krishnakumar. html, Oct. 2008.
    • (2008) Linux Gazette , vol.155
    • Krishnakumar, R.1
  • 16
    • 36049009995 scopus 로고    scopus 로고
    • Dec
    • "Pax aslr Documentation", http://pax.grsecurity.net/docs/aslr. txt, Dec. 2006.
    • (2006) Pax Aslr Documentation
  • 17
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • S. Bhatkar, D. C. DuVarney, and R. Sekar, "Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits", Proc. 12th USENIX Security Symp., 2003.
    • (2003) Proc. 12th USENIX Security Symp.
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 24
    • 78149465626 scopus 로고    scopus 로고
    • Mar
    • "Wind River: Vxworks", http://www.windriver.com/vxworks/, Mar. 2007.
    • (2007) Wind River: Vxworks
  • 30
    • 78149470918 scopus 로고    scopus 로고
    • "Sebek", http://www.honeynet.org/tools/sebek/, 2010.
    • (2010) Sebek
  • 32
    • 34748920692 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
    • G. Portokalidis, A. Slowinska, and H. Bos, "Argos: An Emulator for Fingerprinting Zero-Day Attacks for Advertised Honeypots with Automatic Signature Generation", Proc. ACM SIGOPS/European Conf. Computer Systems (EuroSys'06), pp. 15-27, 2006.
    • (2006) Proc. ACM SIGOPS/European Conf. Computer Systems (EuroSys'06) , pp. 15-27
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3
  • 34
    • 84856191283 scopus 로고    scopus 로고
    • Dec
    • "Linux/Unix nbench", http://www.tux.org/mayer/linux/bmark.html, Dec. 2006.
    • (2006) Linux/Unix Nbench
  • 35
    • 78149469180 scopus 로고    scopus 로고
    • Dec
    • "Unixbench", http://www.tux.org/pub/tux/benchmarks/System/ unixbench/, Dec. 2006.
    • (2006) Unixbench


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.