메뉴 건너뛰기




Volumn , Issue , 2012, Pages

CFIMon: Detecting violation of control flow integrity using performance counters

Author keywords

[No Author keywords available]

Indexed keywords

COMMODITY PROCESSORS; CONTROL FLOWS; FALSE NEGATIVES; FALSE POSITIVE; HARDWARE SUPPORTS; LEGAL CONTROLS; MODERN PROCESSORS; NON-INTRUSIVE; ON-THE-FLY; PERFORMANCE COUNTERS; PERFORMANCE MONITORING; RUNTIMES; SECURITY ATTACKS; SECURITY BREACHES; SECURITY EVALUATION; SERVER APPLICATIONS;

EID: 84866672217     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2012.6263958     Document Type: Conference Paper
Times cited : (184)

References (47)
  • 1
    • 0038349210 scopus 로고    scopus 로고
    • Code red worm propagation modeling and analysis
    • C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. CCS, 2002, pp. 138-147.
    • (2002) Proc. CCS , pp. 138-147
    • Zou, C.1    Gong, W.2    Towsley, D.3
  • 12
    • 77954614533 scopus 로고    scopus 로고
    • Defeating return-oriented rootkits with return-less kernels
    • J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, "Defeating return-oriented rootkits with Return-Less kernels," in Proc. Eurosys, 2010, pp. 195-208.
    • (2010) Proc. Eurosys , pp. 195-208
    • Li, J.1    Wang, Z.2    Jiang, X.3    Grace, M.4    Bahram, S.5
  • 14
    • 84897489745 scopus 로고    scopus 로고
    • Mitigating code-reuse attacks with control-flow locking
    • T. Bletsch, X. Jiang, and V. Freeh, "Mitigating code-reuse attacks with control-flow locking," in Proc. ACSAC, 2011.
    • (2011) Proc. ACSAC
    • Bletsch, T.1    Jiang, X.2    Freeh, V.3
  • 17
    • 36049008184 scopus 로고    scopus 로고
    • Augmenting branch predictor to secure program execution
    • DSN'07. 37th Annual IEEE/IFIP International Conference on. IEEE
    • Y. Shi and G. Lee, "Augmenting branch predictor to secure program execution," in Dependable Systems and Networks, 2007. DSN'07. 37th Annual IEEE/IFIP International Conference on. IEEE, 2007, pp. 10-19.
    • (2007) Dependable Systems and Networks, 2007 , pp. 10-19
    • Shi, Y.1    Lee, G.2
  • 19
    • 0031340339 scopus 로고    scopus 로고
    • ProfileMe: Hardware support for instruction-level profiling on out-of-order processors
    • J. Dean, J. Hicks, C. Waldspurger, W. Weihl, and G. Chrysos, "ProfileMe: Hardware support for instruction-level profiling on out-of-order processors," in Proc. MICRO, 1997, pp. 292-302.
    • (1997) Proc. MICRO , pp. 292-302
    • Dean, J.1    Hicks, J.2    Waldspurger, C.3    Weihl, W.4    Chrysos, G.5
  • 20
    • 0036652569 scopus 로고    scopus 로고
    • Pentium 4 performance-monitoring features
    • B. Sprunt, "Pentium 4 performance-monitoring features," IEEE Micro, vol. 22, no. 4, pp. 72-82, 2002.
    • (2002) IEEE Micro , vol.22 , Issue.4 , pp. 72-82
    • Sprunt, B.1
  • 24
    • 84866653453 scopus 로고    scopus 로고
    • Metasploit Team
    • Metasploit Team, "Metasploit," http://www.metasploit.com/.
  • 25
    • 84866697887 scopus 로고    scopus 로고
    • "Exim," http://www.exim.org/.
  • 26
    • 55549119760 scopus 로고    scopus 로고
    • Distributed caching with memcached
    • B. Fitzpatrick, "Distributed caching with memcached," Linux journal, 2004.
    • (2004) Linux Journal
    • Fitzpatrick, B.1
  • 28
    • 0030645124 scopus 로고    scopus 로고
    • Exploiting hardware performance counters with flow and context sensitive profiling
    • G. Ammons, T. Ball, and J. Larus, "Exploiting hardware performance counters with flow and context sensitive profiling," in Proc. PLDI, 1997, pp. 85-96.
    • (1997) Proc. PLDI , pp. 85-96
    • Ammons, G.1    Ball, T.2    Larus, J.3
  • 29
    • 32844456410 scopus 로고    scopus 로고
    • Online performance analysis by statistical sampling of microprocessor performance counters
    • R. Azimi, M. Stumm, and R. Wisniewski, "Online performance analysis by statistical sampling of microprocessor performance counters," in Proc. Supercomputing, 2005, pp. 101-110.
    • (2005) Proc. Supercomputing , pp. 101-110
    • Azimi, R.1    Stumm, M.2    Wisniewski, R.3
  • 30
    • 84866697886 scopus 로고    scopus 로고
    • Security breaches as pmu deviation: Detecting and identifying security attacks using performance counters
    • L. Yuan, W. Xing, H. Chen, and B. Zang, "Security breaches as pmu deviation: Detecting and identifying security attacks using performance counters," in 2011 ACM SIGOPS Asia-pacific Workshop on Systems, 2011.
    • (2011) 2011 ACM SIGOPS Asia-pacific Workshop on Systems
    • Yuan, L.1    Xing, W.2    Chen, H.3    Zang, B.4
  • 35
    • 77952266375 scopus 로고    scopus 로고
    • Orthrus: Efficient software integrity protection on multi-cores
    • R. Huang, D. Deng, and G. Suh, "Orthrus: efficient software integrity protection on multi-cores," in Proc. ASPLOS, 2010, pp. 371-384.
    • (2010) Proc. ASPLOS , pp. 371-384
    • Huang, R.1    Deng, D.2    Suh, G.3
  • 36
    • 14844317200 scopus 로고    scopus 로고
    • Countering code-injection attacks with instruction-set randomization
    • G. Kc, A. Keromytis, and V. Prevelakis, "Countering code-injection attacks with instruction-set randomization," in Proc. CCS, 2003.
    • (2003) Proc. CCS
    • Kc, G.1    Keromytis, A.2    Prevelakis, V.3
  • 39
    • 84991997276 scopus 로고    scopus 로고
    • Securing software by enforcing data-flow integrity
    • M. Castro, M. Costa, and T. Harris, "Securing software by enforcing data-flow integrity," in Proc. OSDI, 2006.
    • (2006) Proc. OSDI
    • Castro, M.1    Costa, M.2    Harris, T.3
  • 41
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • J. Crandall and F. Chong, "Minos: Control Data Attack Prevention Orthogonal to Memory Model," in Proc. MICRO, 2004.
    • (2004) Proc. MICRO
    • Crandall, J.1    Chong, F.2
  • 42
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar, "Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks," in Proc. USENIX Security, 2006, pp. 121-136.
    • (2006) Proc. USENIX Security , pp. 121-136
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 43
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in Proc. NDSS, 2005.
    • (2005) Proc. NDSS
    • Newsome, J.1    Song, D.2
  • 44
    • 40349087553 scopus 로고    scopus 로고
    • LIFT: A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu, "LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks," in Proc. MICRO, 2006, pp. 135-148.
    • Proc. MICRO , vol.2006 , pp. 135-148
    • Qin, F.1    Wang, C.2    Li, Z.3    Kim, H.4    Zhou, Y.5    Wu, Y.6
  • 45
    • 79955570859 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, and A. Sheth, "TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones," in Proc. OSDI, 2010.
    • (2010) Proc. OSDI
    • Enck, W.1    Gilbert, P.2    Chun, B.3    Cox, L.4    Jung, J.5    McDaniel, P.6    Sheth, A.7
  • 46
    • 52649112833 scopus 로고    scopus 로고
    • From speculation to security: Practical and efficient information flow tracking using speculative hardware
    • H. Chen, X. Wu, L. Yuan, B. Zang, P. Yew, and F. Chong, "From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware," in Proc. ISCA, 2008, pp. 401-412.
    • (2008) Proc. ISCA , pp. 401-412
    • Chen, H.1    Wu, X.2    Yuan, L.3    Zang, B.4    Yew, P.5    Chong, F.6
  • 47
    • 76749151451 scopus 로고    scopus 로고
    • Control flow obfuscation with information flow tracking
    • H. Chen, L. Yuan, X. Wu, B. Zang, B. Huang, and P. Yew, "Control flow obfuscation with information flow tracking," in Proc. MICRO, 2009, pp. 391-400.
    • (2009) Proc. MICRO , pp. 391-400
    • Chen, H.1    Yuan, L.2    Wu, X.3    Zang, B.4    Huang, B.5    Yew, P.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.