메뉴 건너뛰기




Volumn , Issue , 2006, Pages 75-88

XFI: Software guards for system address spaces

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; LEGACY SYSTEMS; SYSTEMS ANALYSIS;

EID: 78651539599     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (318)

References (44)
  • 3
    • 0033686981 scopus 로고    scopus 로고
    • A semantic model of types and machine instructions for proof-carrying code
    • A. W. Appel and A. P. Felty. A semantic model of types and machine instructions for proof-carrying code. In POPL, 2000.
    • (2000) POPL
    • Appel, A.W.1    Felty, A.P.2
  • 22
    • 0031339427 scopus 로고    scopus 로고
    • MediaBench: A tool for evaluating and synthesizing multimedia and communications systems
    • C. Lee, M. Potkonjak, and W. H. Mangione-Smith. MediaBench: a tool for evaluating and synthesizing multimedia and communications systems. In MICRO, 1997.
    • (1997) MICRO
    • Lee, C.1    Potkonjak, M.2    Mangione-Smith, W.H.3
  • 23
    • 84867853619 scopus 로고    scopus 로고
    • Unmodified device driver reuse and improved system dependability via virtual machines
    • J. LeVasseur, V. Uhlig, J. Stoess, and S. Götz. Unmodified device driver reuse and improved system dependability via virtual machines. In OSDI, 2004.
    • (2004) OSDI
    • LeVasseur, J.1    Uhlig, V.2    Stoess, J.3    Götz, S.4
  • 27
    • 85028466841 scopus 로고
    • The packet filter: An efficient mechanism for user-level network code
    • J. Mogul, R. Rashid, and M. Accetta. The packet filter: An efficient mechanism for user-level network code. ACM Operating Systems Review, SIGOPS, 21(5), 1987.
    • (1987) ACM Operating Systems Review, SIGOPS , vol.21 , Issue.5
    • Mogul, J.1    Rashid, R.2    Accetta, M.3
  • 29
    • 0030685617 scopus 로고    scopus 로고
    • Proof-carrying code
    • G. C. Necula. Proof-carrying code. In POPL, 1997.
    • (1997) POPL
    • Necula, G.C.1
  • 31
    • 33646408973 scopus 로고    scopus 로고
    • A crash course on the depths of Win32 structured exception handling
    • M. Pietrek. A crash course on the depths of Win32 structured exception handling. Microsoft Systems Journal, 1997. http://www.microsoft.com/msj/0197/.
    • (1997) Microsoft Systems Journal
    • Pietrek, M.1
  • 32
    • 4344593013 scopus 로고    scopus 로고
    • Beyond stack smashing: Recent advances in exploiting buffer overruns
    • J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4), 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4
    • Pincus, J.1    Baker, B.2
  • 35
    • 85076720086 scopus 로고
    • Some issues in the design of extensible operating systems
    • S. Savage and B. N. Bershad. Some issues in the design of extensible operating systems. In OSDI, 1994.
    • (1994) OSDI
    • Savage, S.1    Bershad, B.N.2
  • 37
    • 0004349103 scopus 로고    scopus 로고
    • Vulcan: Binary transformation in a distributed environment
    • Microsoft Research
    • A. Srivastava, A. Edwards, and H. Vo. Vulcan: Binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, Microsoft Research, 2001.
    • (2001) Technical Report MSR-TR-2001-50
    • Srivastava, A.1    Edwards, A.2    Vo, H.3
  • 39
    • 33646691869 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. In SOSP, 2003.
    • (2003) SOSP
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 42
    • 85092930606 scopus 로고    scopus 로고
    • Hardware works, software doesn’t: Enforcing modularity with Mondriaan memory protection
    • E. Witchel and K. Asanovic. Hardware works, software doesn’t: Enforcing modularity with Mondriaan memory protection. In HotOS, 2003.
    • (2003) HotOS
    • Witchel, E.1    Asanovic, K.2
  • 44
    • 84885637591 scopus 로고    scopus 로고
    • Mondrix: Memory isolation for Linux using Mondriaan memory protection
    • E. Witchel, J. Rhee, and K. Asanović. Mondrix: Memory isolation for Linux using Mondriaan memory protection. In SOSP, 2005.
    • (2005) SOSP
    • Witchel, E.1    Rhee, J.2    Asanović, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.