메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Exploiting and Protecting Dynamic Code Generation

Author keywords

[No Author keywords available]

Indexed keywords

JUST IN TIME PRODUCTION; MEMORY ARCHITECTURE; PROGRAM COMPILERS;

EID: 84945230261     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2015.23233     Document Type: Conference Paper
Times cited : (44)

References (64)
  • 3
    • 85057365973 scopus 로고    scopus 로고
    • Adobe Product Security Incident Response Team, “Inside Adobe Reader Protected Mode, ” http://blogs.adobe.com/security/2010/11/inside-adobe-reader-protected-mode-part-3broker-process-policies-and-inter-process-communication.html, 2010.
    • (2010) Inside Adobe Reader Protected Mode
  • 7
    • 0345565890 scopus 로고    scopus 로고
    • A brief history of just-in-time
    • J. Aycock, “A brief history of just-in-time, ” ACM Computing Surveys (CSUR), vol. 35, no. 2, pp. 97-113, 2003.
    • (2003) ACM Computing Surveys (CSUR) , vol.35 , Issue.2 , pp. 97-113
    • Aycock, J.1
  • 17
    • 85180546894 scopus 로고    scopus 로고
    • CVE, “CVE vulnerabilities found in browsers, ” http://web.nvd.nist.gov/view/vuln/search-results?query=browser&search_type=all&cves=on.
    • CVE vulnerabilities found in browsers
  • 22
    • 85180545695 scopus 로고    scopus 로고
    • Google, “Seccompsandbox, ” https://code.google.com/p/seccompsandbox/wiki/overview.
    • Seccompsandbox
  • 24
    • 85180550568 scopus 로고    scopus 로고
    • Google, “Design of chrome v8, ” https://developers.google.com/v8/design, 2008.
    • (2008) Design of chrome v8
  • 29
    • 0016336411 scopus 로고
    • Operating system integrity in os/vs2
    • W. S. McPhee, “Operating system integrity in os/vs2, ” IBM Systems Journal, vol. 13, no. 3, pp. 230-252, 1974.
    • (1974) IBM Systems Journal , vol.13 , Issue.3 , pp. 230-252
    • McPhee, W. S.1
  • 41
    • 0030836322 scopus 로고    scopus 로고
    • Low-cost, concurrent checking of pointer and array accesses in c programs
    • H. PATIL and C. FISCHER, “Low-cost, concurrent checking of pointer and array accesses in c programs, ” Software: Practice and Experience, vol. 27, no. 1, pp. 87-110, 1997.
    • (1997) Software: Practice and Experience , vol.27 , Issue.1 , pp. 87-110
    • PATIL, H.1    FISCHER, C.2
  • 44
    • 85180546011 scopus 로고    scopus 로고
    • T. project authors
    • T. V. project authors, http://v8.googlecode.com/svn/data/benchmarks/v7/run.html.
  • 48
    • 67650092861 scopus 로고    scopus 로고
    • Strata: A software dynamic translation infrastructure
    • K. Scott and J. Davidson, “Strata: A software dynamic translation infrastructure, ” Tech. Rep., 2001.
    • (2001) Tech. Rep
    • Scott, K.1    Davidson, J.2
  • 50
    • 84937679667 scopus 로고    scopus 로고
    • The info leak era on software exploitation
    • F. J. Serna, “The info leak era on software exploitation, ” Black Hat USA, 2012.
    • (2012) Black Hat USA
    • Serna, F. J.1
  • 56
    • 84888986097 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation, “SPEC CINT2006 Benchmarks, ” http://www.spec.org/cpu2006/CINT2006/.
    • SPEC CINT2006 Benchmarks
  • 57
    • 85180554439 scopus 로고    scopus 로고
    • W3C, http://www.w3.org/TR/workers/, 2012.
    • (2012)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.