메뉴 건너뛰기




Volumn , Issue , 2010, Pages

On the effectiveness of multi-variant program execution for vulnerability detection and prevention

Author keywords

[No Author keywords available]

Indexed keywords

ENTRY POINT; INSTRUCTION-SET RANDOMIZATION; N VERSION PROGRAMMING; PROGRAM EXECUTION; RUNTIME OVERHEADS; SYSTEM CALLS; VULNERABILITY DETECTION;

EID: 78649429703     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1853919.1853929     Document Type: Conference Paper
Times cited : (27)

References (27)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. Smashing the stack for fun and profit. Phrack, 49, 1996.
    • (1996) Phrack , vol.49
    • One, A.1
  • 5
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • USENIX Association
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the USENIX Security Symposium, pages 105-120. USENIX Association, 2003.
    • (2003) Proceedings of the USENIX Security Symposium , pp. 105-120
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 7
    • 84954188728 scopus 로고    scopus 로고
    • Efficient techniques for comprehensive protection from memory error exploits
    • USENIX Association
    • S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In Proceedings of the USENIX Security Symposium, pages 271-286. USENIX Association, 2005.
    • (2005) Proceedings of the USENIX Security Symposium , pp. 271-286
    • Bhatkar, S.1    Sekar, R.2    DuVarney, D.C.3
  • 9
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing StackGuard and StackShield
    • Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 56, 2000.
    • (2000) Phrack , vol.56
    • Bulba1    Kilr2
  • 18
    • 59449108823 scopus 로고    scopus 로고
    • National Institute of Standards and Technologies. National Vulnerability Database, 2009. http://nvd.nist.gov.
    • (2009) National Vulnerability Database
  • 24
    • 78650018752 scopus 로고    scopus 로고
    • Bypassing browser memory protections
    • A. Sotirov and M. Dowd. Bypassing browser memory protections. In Black Hat, 2008.
    • (2008) Black Hat
    • Sotirov, A.1    Dowd, M.2
  • 25
    • 84906818067 scopus 로고    scopus 로고
    • Where's the FEEB? The e ectiveness of instruction set randomization
    • USENIX Association
    • A. Sovarel, D. Evans, and N. Paul. Where's the FEEB? The e ectiveness of instruction set randomization. In Proceedings of the USENIX Security Symposium, pages 145-160. USENIX Association, 2005.
    • (2005) Proceedings of the USENIX Security Symposium , pp. 145-160
    • Sovarel, A.1    Evans, D.2    Paul, N.3
  • 26
    • 78649418339 scopus 로고    scopus 로고
    • United States Computer Emergency Readiness Team.
    • United States Computer Emergency Readiness Team. US-CERT Vulnerability Notes, 2009. http://www.kb.cert.org/vuls/.
    • (2009) US-CERT Vulnerability Notes


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.