메뉴 건너뛰기




Volumn , Issue , 2012, Pages 319-328

Distributed application tamper detection via continuous software updates

Author keywords

Distributed systems; Security; Software protection

Indexed keywords

ATTACK TARGET; CLIENT CODE; CLIENT DEVICES; CODE TRANSFORMATION; DISTRIBUTED APPLICATIONS; DISTRIBUTED SYSTEMS; SECURITY; SOFTWARE PROTECTION; SOFTWARE UPDATES; TAMPER DETECTION;

EID: 84872108915     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2420950.2420997     Document Type: Conference Paper
Times cited : (70)

References (31)
  • 4
    • 84955621400 scopus 로고    scopus 로고
    • Tamper resistant software: An implementation
    • R. J. Anderson, editor. Springer-Verlag, May
    • D. Aucsmith. Tamper resistant software: An implementation. In R. J. Anderson, editor, Information Hiding, pages 317-333. Springer-Verlag, May 1996.
    • (1996) Information Hiding , pp. 317-333
    • Aucsmith, D.1
  • 6
    • 79952172643 scopus 로고    scopus 로고
    • Codebender: Remote software protection using orthogonal replacement
    • M. Ceccato and P. Tonella. Codebender: Remote software protection using orthogonal replacement. IEEE Software, 28(2):28-34, 2011.
    • (2011) IEEE Software , vol.28 , Issue.2 , pp. 28-34
    • Ceccato, M.1    Tonella, P.2
  • 10
    • 0031649930 scopus 로고    scopus 로고
    • Manufacturing cheap, resilient, and stealthy opaque constructs
    • Jan.
    • C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In POPL'98, Jan. 1998.
    • (1998) POPL'98
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 13
    • 84976675319 scopus 로고
    • Stack caching for interpreters
    • M. A. Ertl. Stack caching for interpreters. SIGPLAN Not., 30(6):315-327, 1995.
    • (1995) SIGPLAN Not. , vol.30 , Issue.6 , pp. 315-327
    • Ertl, M.A.1
  • 15
    • 0030697765 scopus 로고    scopus 로고
    • Building diverse computer systems
    • S. Forrest, A. Somayaji, and D. Ackley. Building diverse computer systems. In HotOS-VI, pages 67-72, 1997.
    • (1997) HotOS-VI , pp. 67-72
    • Forrest, S.1    Somayaji, A.2    Ackley, D.3
  • 18
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Mobile Agents and Security
    • F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security, pages 92-113, 1998. (Pubitemid 128104564)
    • (1998) Lecture Notes in Computer Science , Issue.1419 , pp. 92-113
    • Hohl, F.1
  • 19
    • 35248901117 scopus 로고    scopus 로고
    • Discouraging software piracy using software aging
    • M. Jakobsson and M. K. Reiter. Discouraging software piracy using software aging. In DRM Workshop, pages 1-12, 2001.
    • (2001) DRM Workshop , pp. 1-12
    • Jakobsson, M.1    Reiter, M.K.2
  • 20
    • 84959039613 scopus 로고    scopus 로고
    • CIL: Intermediate language and tools for analysis and transformation of C programs
    • Grenoble
    • G. C. Necula, S. Mcpeak, S. P. Rahul, and W. Weimer. CIL: Intermediate language and tools for analysis and transformation of C programs. In Compiler Construction, pages 213-228, Grenoble, 2002.
    • (2002) Compiler Construction , pp. 213-228
    • Necula, G.C.1    McPeak, S.2    Rahul, S.P.3    Weimer, W.4
  • 21
    • 84872110094 scopus 로고    scopus 로고
    • Optimizing ANSI C with superoperators
    • ACM Press, Jan.
    • T. Proebsting. Optimizing ANSI C with superoperators. In POPL'96. ACM Press, Jan. 1996.
    • (1996) POPL'96
    • Proebsting, T.1
  • 23
    • 27244434460 scopus 로고    scopus 로고
    • Design and implementation of a tcg-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a tcg-based integrity measurement architecture. In SSYM'04, pages 16-16, 2004.
    • (2004) SSYM'04 , pp. 16-16
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 27
    • 33845427178 scopus 로고    scopus 로고
    • Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
    • DOI 10.1145/1095809.1095812
    • A. Seshadri, M. Luk, E. Shi, A. Perrig, L. van Doorn, and P. Khosla. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. SIGOPS Oper. Syst. Rev., 39(5):1-16, 2005. (Pubitemid 44892201)
    • (2005) Operating Systems Review (ACM) , vol.39 , Issue.5 , pp. 1-16
    • Seshadri, A.1    Perrig, A.2    Luk, M.3    Van Doom, L.4    Shi, E.5    Khosla, P.6
  • 28
    • 78651389253 scopus 로고    scopus 로고
    • Detecting malware variants via function-call graph similarity
    • Oct.
    • S. Shang, N. Zheng, J. Xu, M. Xu, and H. Zhang. Detecting malware variants via function-call graph similarity. In MALWARE, pages 113 -120, Oct. 2010.
    • (2010) MALWARE , pp. 113-120
    • Shang, S.1    Zheng, N.2    Xu, J.3    Xu, M.4    Zhang, H.5
  • 29
    • 29144524010 scopus 로고    scopus 로고
    • Mutatis mutandis: Safe and predictable dynamic software updating
    • ACM
    • G. Stoyle, M. Hicks, G. Bierman, P. Sewell, and I. Neamtiu. Mutatis mutandis: safe and predictable dynamic software updating. In POPL '05, pages 183-194. ACM, 2005.
    • (2005) POPL '05 , pp. 183-194
    • Stoyle, G.1    Hicks, M.2    Bierman, G.3    Sewell, P.4    Neamtiu, I.5
  • 30
    • 0035789216 scopus 로고    scopus 로고
    • Protection of software-based survivability mechanisms
    • C. Wang, J. Hill, J. Knight, and J. Davidson. Protection of software-based survivability mechanisms. Dsn, 00:0193, 2001.
    • (2001) Dsn , pp. 0193
    • Wang, C.1    Hill, J.2    Knight, J.3    Davidson, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.