메뉴 건너뛰기




Volumn , Issue , 2003, Pages 105-120

Address obfuscation: An efficient approach to combat a broad range of memory error exploits

Author keywords

[No Author keywords available]

Indexed keywords

ERRORS; LOCATION; RANDOM PROCESSES;

EID: 84862209017     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (468)

References (40)
  • 1
    • 85077751615 scopus 로고    scopus 로고
    • Published on World-Wide Web at
    • Pax. Published on World-Wide Web at URL http://pageexec.virtualave.net, 2001.
    • (2001) Pax
  • 2
    • 84860095094 scopus 로고    scopus 로고
    • Once upon a free⋯
    • Anonymous. August
    • Anonymous. Once upon a free⋯. Phrack, 11(57), August 2001.
    • (2001) Phrack , vol.11 , Issue.57
  • 3
    • 14844288825 scopus 로고    scopus 로고
    • Bypassing pax aslr protection
    • Anonymous. July
    • Anonymous. Bypassing pax aslr protection. Phrack, 11(59), July 2002.
    • (2002) Phrack , vol.11 , Issue.59
  • 4
    • 84955621400 scopus 로고    scopus 로고
    • Tamper-resistant software: An implementation
    • Ross Anderson, editor Cambridge, U.K., May 30-June 1 proceedings, Volume 1174 of Lecture Notes in Computer Science Berlin, Germany /Heidelberg, Germany /London, UK /etc., 1996. Springer-Verlag
    • D. Aucsmith. Tamper-resistant software: An implementation. In Ross Anderson, editor, Information hiding: first international workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings, Volume 1174 of Lecture Notes in Computer Science, pages 317-333, Berlin, Germany /Heidelberg, Germany /London, UK /etc., 1996. Springer-Verlag.
    • (1996) Information Hiding: First International Workshop , pp. 317-333
    • Aucsmith, D.1
  • 7
    • 17644393012 scopus 로고    scopus 로고
    • Bypassing stackguard and stackshield
    • Bulba and Ki13r. May
    • Bulba and Ki13r. Bypassing stackguard and stackshield. Phrack, 11(56), May 2000.
    • (2000) Phrack , vol.11 , Issue.56
  • 16
    • 14944385012 scopus 로고    scopus 로고
    • Published on World-Wide Web at URL June
    • Hiroaki Etoh and Kunikazu Yoda. Protecting from stack-smashing attacks. Published on World-Wide Web at URL http://www.trl.ibm.com/projects/security/ssp/main.html, June 2000.
    • (2000) Protecting from Stack-smashing Attacks
    • Etoh, H.1    Yoda, K.2
  • 19
    • 0000596666 scopus 로고
    • Purify: A tool for detecting memory leaks and access errors in C and C++ programs
    • USENIX Association, editor Berkeley, CA, USA, January USENIX
    • Reed Hastings and Bob Joyce. Purify: A tool for detecting memory leaks and access errors in C and C++ programs. In USENIX Association, editor, Proceedings of the Winter 1992 USENIX Conference, pages 125-138, Berkeley, CA, USA, January 1992. USENIX.
    • (1992) Proceedings of the Winter 1992 USENIX Conference , pp. 125-138
    • Hastings, R.1    Joyce, B.2
  • 20
    • 84859476272 scopus 로고    scopus 로고
    • Big loop integer protection
    • December
    • Oded Horovitz. Big loop integer protection. Phrack, 11(60), December 2002.
    • (2002) Phrack , vol.11 , Issue.60
    • Horovitz, O.1
  • 22
    • 12544250338 scopus 로고    scopus 로고
    • Backwards-compatible bounds checking for arrays and pointers in C programs
    • M. Kamkar and D. Byers, editors Linkoping University Electronic Press
    • Robert W. M. Jones and Paul H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In M. Kamkar and D. Byers, editors, Third International Workshop on Automated Debugging. Linkoping University Electronic Press, 1997.
    • (1997) Third International Workshop on Automated Debugging
    • Jones, R.W.M.1    Kelly, P.H.J.2
  • 23
    • 14844307465 scopus 로고    scopus 로고
    • Vudo malloc tricks
    • August
    • Michel Kaempf. Vudo malloc tricks. Phrack, 11(57), August 2001.
    • (2001) Phrack , vol.11 , Issue.57
    • Kaempf, M.1
  • 24
    • 0005372144 scopus 로고
    • Saber-C - An interpreter-based programming environment for the C language
    • USENIX Association, editor Berkeley, CA, USA, Summer USENIX
    • Stephen Kaufer, Russell Lopez, and Sesha Pratap. Saber-C - an interpreter-based programming environment for the C language. In USENIX Association, editor, Summer USENIX Conference Proceedings, pages 161-171, Berkeley, CA, USA, Summer 1988. USENIX.
    • (1988) Summer USENIX Conference Proceedings , pp. 161-171
    • Kaufer, S.1    Lopez, R.2    Pratap, S.3
  • 25
    • 17644371841 scopus 로고
    • Bcc: Run-time checking for c programs
    • El. Cerrito, California, USA USENIX Association
    • Samuel C. Kendall. Bcc: run-time checking for c programs. In Proceedings of the USENIX Summer Conference, El. Cerrito, California, USA, 1983. USENIX Association.
    • (1983) Proceedings of the USENIX Summer Conference
    • Kendall, S.C.1
  • 27
    • 84874953600 scopus 로고    scopus 로고
    • Mudge. Published on World-Wide Web at URL
    • Mudge. How to write buffer overflows. Published on World-Wide Web at URL http://www.insecure.org/stf/mudge-buffer-overflow-tutorial.html, 1997.
    • (1997) How to Write Buffer Overflows
  • 29
    • 3042642332 scopus 로고    scopus 로고
    • The advanced return-into-lib(c) exploits
    • Dec
    • Nergal. The advanced return-into-lib(c) exploits. Phrack, 11(58), Dec 2001.
    • (2001) Phrack , vol.11 , Issue.58
    • Nergal1
  • 31
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One. November
    • Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), November 1996.
    • (1996) Phrack , vol.7 , Issue.49
  • 33
    • 12344323612 scopus 로고    scopus 로고
    • Scut. Published on World-Wide Web March
    • Scut. Exploting format string vulnerabilities. Published on World-Wide Web at URL http://www.team-teso.net/articles/formatstring, March 2001.
    • (2001) Exploting Format String Vulnerabilities
  • 34
    • 85077739253 scopus 로고    scopus 로고
    • April Published on World-Wide Web
    • Snort(tm) advisory: Integer overflow in stream4. April 2003. Published on World-Wide Web at URL http://www.kb.cert.org/vuls/id/JPLA-5LPR9S.
    • (2003) Snort(tm) Advisory: Integer Overflow in Stream4
  • 36
    • 0026845567 scopus 로고
    • Adding run-time checking to the portable c compiler
    • April
    • Joseph L. Steffen. Adding run-time checking to the portable c compiler. Software-Practice and Experience, 22:305-316, April 1992.
    • (1992) Software-Practice and Experience , vol.22 , pp. 305-316
    • Steffen, J.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.