메뉴 건너뛰기




Volumn , Issue , 2013, Pages 311-322

Enforcing system-wide control flow integrity for exploit detection and diagnosis

Author keywords

exploit detection; exploit diagnosis; software security; virtual machine introspection; vulnerability detection

Indexed keywords

CONTROL-FLOW INTEGRITIES; DETECTION AND DIAGNOSIS; HARDWARE INTEGRATIONS; IDENTIFICATION ALGORITHMS; MEMORY OVERHEADS; SOFTWARE SECURITY; VIRTUAL MACHINE INTROSPECTION; VULNERABILITY DETECTION;

EID: 84877996319     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484352     Document Type: Conference Paper
Times cited : (28)

References (40)
  • 1
    • 84877933896 scopus 로고    scopus 로고
    • Sycurelab, Syracuse University
    • DECAF: Binary Analysis Platform. Sycurelab, Syracuse University. http://code.google.com/p/decaf-platform/.
    • DECAF: Binary Analysis Platform
  • 2
    • 72449145808 scopus 로고    scopus 로고
    • Control-flow integrity principles, implementations, and applications
    • Nov.
    • ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13, 1 (Nov. 2009), 4:1-4:40.
    • (2009) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.1
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 9
    • 57349156632 scopus 로고    scopus 로고
    • A type system for data-flow integrity on windows vista
    • Feb.
    • CHAUDHURI, A., NALDURG, P., AND RAJAMANI, S. A type system for data-flow integrity on windows vista. SIGPLAN Not. 43, 12 (Feb. 2009), 9-20.
    • (2009) SIGPLAN Not. , vol.43 , Issue.12 , pp. 9-20
    • Chaudhuri, A.1    Naldurg, P.2    Rajamani, S.3
  • 37
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
    • USENIX Association
    • YAN, L. K., AND YIN, H. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX conference on Security symposium - 2012, USENIX Association.
    • Proceedings of the 21st USENIX Conference on Security Symposium - 2012
    • Yan, L.K.1    Yin, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.