메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Security bugs in embedded interpreters

Author keywords

[No Author keywords available]

Indexed keywords

COMPRESSED FILES; EMBEDDED INTERPRETERS; IN-BUILDINGS; PACKET FILTERING; REVERSIBLE TRANSFORMATION; SECURITY BUGS; SECURITY VULNERABILITIES; SOFTWARE STACKS;

EID: 84883115659     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2500727.2500747     Document Type: Conference Paper
Times cited : (9)

References (30)
  • 1
    • 84883071911 scopus 로고    scopus 로고
    • Bitcoin. Script - Bitcoin, 2013. https://en.bitcoin.it/wiki/Script.
    • (2013) Script - Bitcoin
  • 6
    • 84883074512 scopus 로고    scopus 로고
    • DragonFlyBSD. Dragonflybsd bug 1748, 2010. http://bugs.dragonflybsd.org/ issues/1748.
    • (2010) Dragonflybsd Bug 1748
  • 10
  • 11
    • 0003722586 scopus 로고    scopus 로고
    • Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba. Dec
    • Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification, Dec. 2011. http://www.acpi. info/DOWNLOADS/ACPIspec50.pdf.
    • (2011) Advanced Configuration and Power Interface Specification
  • 20
    • 69149107997 scopus 로고    scopus 로고
    • Browser security: Lessons from google chrome
    • June
    • C. Reis, A. Barth, and C. Pizano. Browser security: Lessons from Google Chrome. Communications of the ACM, 52(8):45-49, June 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.8 , pp. 45-49
    • Reis, C.1    Barth, A.2    Pizano, C.3
  • 21
    • 84859701688 scopus 로고    scopus 로고
    • The security challenges of clientside just-in-time engines
    • C. Rohlf and Y. Ivnitskiy. The security challenges of clientside just-in-time engines. Security & Privacy, IEEE, 10 (2):84-86, 2012.
    • (2012) Security & Privacy, IEEE , vol.10 , Issue.2 , pp. 84-86
    • Rohlf, C.1    Ivnitskiy, Y.2
  • 22
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • Alexandria, VA, Oct.-Nov
    • H. Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), pages 552-561, Alexandria, VA, Oct.-Nov. 2007.
    • (2007) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS) , pp. 552-561
    • Shacham, H.1
  • 26
    • 84883110492 scopus 로고    scopus 로고
    • TrueType
    • TrueType. The instruction set, 2011. https://developer.apple.com/fonts/ TTRefMan/RM05/Chap5.html.
    • (2011) The Instruction Set
  • 27
    • 84883109984 scopus 로고    scopus 로고
    • TrueType. TrueType hinting, 2012. http://www.truetype-typography.com/ tthints.htm.
    • (2012) TrueType Hinting


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.