메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2-13

Fides: Selectively hardening software application components against kernel-level or process-level malware

Author keywords

Fully abstract compilation; Secure execution; Trusted computing

Indexed keywords

API DESIGN; COMMODITY OPERATING SYSTEMS; FULLY ABSTRACT COMPILATION; FULLY PROTECTED; LINES OF CODE; MALWARES; PERFORMANCE COSTS; RUNTIMES; SECURE EXECUTION; SECURITY ARCHITECTURE; SHEER SIZE; SOFTWARE APPLICATIONS; SOFTWARE MODULES; SOURCE CODES; TRUSTED COMPUTING;

EID: 84869412964     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382200     Document Type: Conference Paper
Times cited : (67)

References (40)
  • 3
  • 17
    • 0026837069 scopus 로고
    • An automatic search for security flaws in key management schemes
    • Longley, D., and Rigby, S. An automatic search for security flaws in key management schemes. Computers & Security 11, 1 (1992), 75-89.
    • (1992) Computers & Security , vol.11 , Issue.1 , pp. 75-89
    • Longley, D.1    Rigby, S.2
  • 23
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • One, A. Smashing the stack for fun and profit. Phrack magazine 7, 49 (1996).
    • (1996) Phrack Magazine , vol.7 , pp. 49
    • One, A.1
  • 26
    • 85035001592 scopus 로고
    • Definitional interpreters for higher-order programming languages
    • Reynolds, J. Definitional interpreters for higher-order programming languages. In proceedings 25th ACM National Conference (1972), pp. 717-740.
    • (1972) Proceedings 25th ACM National Conference , pp. 717-740
    • Reynolds, J.1
  • 27
    • 55549097262 scopus 로고    scopus 로고
    • Subverting VistaTM kernel for fun and profit
    • Rutkowska, J. Subverting VistaTM Kernel For Fun And Profit. Black Hat Briefings (2006).
    • (2006) Black Hat Briefings
    • Rutkowska, J.1
  • 28
    • 84866901447 scopus 로고    scopus 로고
    • Protecting critical applications on mobile platforms
    • Sahita R, Warrier U., D. P. Protecting Critical Applications on Mobile Platforms. Intel Technology Journal 13 (2009), 16-35.
    • (2009) Intel Technology Journal , vol.13 , pp. 16-35
    • Sahita, R.1    Warrier, U.D.P.2
  • 29
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J., and Schroeder, M. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (1975), 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 32
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • (New York, NY, USA), CCS '07, ACM
    • Shacham, H. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM conference on Computer and communications security (New York, NY, USA, 2007), CCS '07, ACM, pp. 552-561.
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security , pp. 552-561
    • Shacham, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.