메뉴 건너뛰기




Volumn 8, Issue 4, 2011, Pages 588-601

Runtime defense against code injection attacks using replicated execution

Author keywords

Intrusion detection; multivariant execution; n variant execution; system call.

Indexed keywords

ALARM SYSTEMS; COMPUTER CRIME; ERRORS; MULTICORE PROGRAMMING; NETWORK SECURITY;

EID: 79957595816     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.18     Document Type: Article
Times cited : (44)

References (45)
  • 1
    • 0022252695 scopus 로고
    • The N-Version approach to fault-tolerant software
    • Dec.
    • A. Avizienis, "The N-Version Approach to Fault-Tolerant Software," IEEE Trans. Software Eng., vol. SE-11, no. 12, pp. 1491-1501, Dec. 1985.
    • (1985) IEEE Trans. Software Eng. , vol.SE-11 , Issue.12 , pp. 1491-1501
    • Avizienis, A.1
  • 2
    • 0017792448 scopus 로고
    • On the implementation of N-Version programming for software fault tolerance during execution
    • A. Avizienis and L. Chen, "On the Implementation of N-Version Programming for Software Fault Tolerance during Execution," Proc. Int'l Computer Software and Applications Conf., pp. 149-155, 1977.
    • (1977) Proc. Int'l Computer Software and Applications Conf. , pp. 149-155
    • Avizienis, A.1    Chen, L.2
  • 5
    • 0022318570 scopus 로고
    • Replication and fault-tolerance in the ISIS System
    • K. Birman, "Replication and Fault-Tolerance in the ISIS System," ACM SIGOPS Operating Systems Rev., vol. 19, no. 5, pp. 79-86, 1985.
    • (1985) ACM SIGOPS Operating Systems Rev. , vol.19 , Issue.5 , pp. 79-86
    • Birman, K.1
  • 6
    • 54649083881 scopus 로고    scopus 로고
    • The voltan application programming environment for fail-silent processes
    • D. Black, C. Low, and S.K. Shrivastava, "The Voltan Application Programming Environment for Fail-Silent Processes," Distributed Systems Eng., vol. 5, pp. 66-77, 1998.
    • (1998) Distributed Systems Eng. , vol.5 , pp. 66-77
    • Black, D.1    Low, C.2    Shrivastava, S.K.3
  • 10
    • 14944374640 scopus 로고    scopus 로고
    • Mitigating buffer overflows by operating system randomization
    • Dept. of Computer Science, Carnegie Mellon Univ.
    • M. Chew and D. Song, "Mitigating Buffer Overflows by Operating System Randomization," Technical Report CMU-CS-02-197, Dept. of Computer Science, Carnegie Mellon Univ., 2002.
    • (2002) Technical Report CMU-CS- 02-197
    • Chew, M.1    Song, D.2
  • 14
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • ("Aleph One")
    • E. Levy ("Aleph One"), "Smashing the Stack for Fun and Profit," Phrack, vol. 7, no. 49, 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • Levy, E.1
  • 16
    • 0000596666 scopus 로고
    • Purify: Fast detection of memory leaks and access errors
    • R. Hastings and B. Joyce, "Purify: Fast Detection of Memory Leaks and Access Errors," Proc. Winter USENIX Conf., vol. 136, 1992.
    • (1992) Proc. Winter USENIX Conf. , vol.136
    • Hastings, R.1    Joyce, B.2
  • 17
    • 0043199887 scopus 로고    scopus 로고
    • Characteristics of I/O traffic in personal computer and server workloads
    • W. Hsu and A. Smith, "Characteristics of I/O Traffic in Personal Computer and Server Workloads," IBM Systems J., vol. 42, pp. 347- 372, 2003.
    • (2003) IBM Systems J. , vol.42 , pp. 347-372
    • Hsu, W.1    Smith, A.2
  • 18
    • 79957601858 scopus 로고    scopus 로고
    • Intel, Intel Developer Forum
    • Intel, "Paul Otellini Keynote," Intel Developer Forum, 2006.
    • (2006) Paul Otellini Keynote
  • 20
    • 85077706009 scopus 로고    scopus 로고
    • Oslo: Improving the security of trusted computing
    • B. Kauer, "Oslo: Improving the Security of Trusted Computing," Proc. USENIX Security Symp., pp. 229-237, 2007.
    • (2007) Proc. USENIX Security Symp. , pp. 229-237
    • Kauer, B.1
  • 22
    • 0022581573 scopus 로고
    • An experimental evaluation of the assumption of independence in multiversion programming
    • J. Knight and N. Leveson, "An Experimental Evaluation of the Assumption of Independence in Multiversion Programming," IEEE Trans. Software Eng., vol. SE-12, no. 1, pp. 96-109, Jan. 1986. (Pubitemid 16575808)
    • (1986) IEEE Transactions on Software Engineering , vol.SE-12 , Issue.1 , pp. 96-109
    • Knight John, C.1    Leveson Nancy, G.2
  • 23
    • 51549109037 scopus 로고
    • A combination hardware-software debugging system
    • Jan.
    • K. Knowlton, "A Combination Hardware-Software Debugging System," IEEE Trans. Computers, vol. 17, no. 1, pp. 84-86, Jan. 1968.
    • (1968) IEEE Trans. Computers , vol.17 , Issue.1 , pp. 84-86
    • Knowlton, K.1
  • 24
    • 0028714365 scopus 로고
    • Automated detection of vulnerabilities in privileged programs by execution monitoring
    • C. Ko, G. Fink, and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," Proc. Ann. Computer Security Applications Conf., pp. 134-144, 1994.
    • (1994) Proc. Ann. Computer Security Applications Conf. , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 30
    • 79957618600 scopus 로고    scopus 로고
    • Nat'l Inst. of Standards and Technologies
    • Nat'l Inst. of Standards and Technologies, Nat'l Vulnerability Database, http://nvd.nist.gov, 2009.
    • (2009) Nat'l Vulnerability Database
  • 35
    • 0036036816 scopus 로고    scopus 로고
    • BASE: Using abstraction to improve fault tolerance
    • DOI 10.1145/502059.502037
    • R. Rodrigues, M. Castro, and B. Liskov, "BASE: Using Abstraction to Improve Fault Tolerance," ACM SIGOPS Operating Systems Rev., vol. 35, no. 5, pp. 15-28, 2001. (Pubitemid 33612602)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 15-28
    • Rodrigues, R.1    Castro, M.2    Liskov, B.3
  • 38
    • 70349127596 scopus 로고    scopus 로고
    • Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space
    • B. Salamat, T. Jackson, A. Gal, and M. Franz, "Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space," Proc. European Conf. Computer Systems, pp. 33-46, 2009.
    • (2009) Proc. European Conf. Computer Systems , pp. 33-46
    • Salamat, B.1    Jackson, T.2    Gal, A.3    Franz, M.4
  • 40
    • 0026868479 scopus 로고
    • Principal features of the voltan family of reliable node architectures for distributed systems
    • May
    • S. Shrivastava, P. Ezhilchelvan, N. Speirs, S. Tao, and A. Tully, "Principal Features of the Voltan Family of Reliable Node Architectures for Distributed Systems," IEEE Trans. Computers, vol. 41, no. 5, pp. 542-549, May 1992.
    • (1992) IEEE Trans. Computers , vol.41 , Issue.5 , pp. 542-549
    • Shrivastava, S.1    Ezhilchelvan, P.2    Speirs, N.3    Tao, S.4    Tully, A.5
  • 43
    • 41149146993 scopus 로고    scopus 로고
    • Tolerating byzantine faults in transaction processing systems using commit barrier scheduling
    • DOI 10.1145/1294261.1294268, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
    • B. Vandiver, H. Balakrishnan, B. Liskov, and S. Madden, "Tolerating Byzantine Faults in Transaction Processing Systems Using Commit Barrier Scheduling," Proc. Symp. Operating Systems Principles, pp. 59-72, 2007. (Pubitemid 351429369)
    • (2007) Operating Systems Review (ACM) , pp. 59-72
    • Vandiver, B.1    Balakrishnan, H.2    Liskov, B.3    Madden, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.