메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Howard: a Dynamic Excavator for Reverse Engineering Data Structures

Author keywords

[No Author keywords available]

Indexed keywords

CODES (SYMBOLS); DATA STRUCTURES; NETWORK SECURITY;

EID: 84951736831     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (128)

References (47)
  • 2
    • 85180622802 scopus 로고    scopus 로고
    • Ollydbg. http://www.ollydbg.de/.
    • Ollydbg
  • 6
    • 0028743437 scopus 로고
    • Compiler transformations for high-performance computing
    • D. F. Bacon, S. L. Graham, and O. J. Sharp. Compiler transformations for high-performance computing. ACM Comput. Surv., 26:345–420, 1994.
    • (1994) ACM Comput. Surv , vol.26 , pp. 345-420
    • Bacon, D. F.1    Graham, S. L.2    Sharp, O. J.3
  • 19
    • 0004046658 scopus 로고    scopus 로고
    • Technical report, Department of Computer Sciences, The University of Auckland, Auckland, New Zealand
    • C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical report, Department of Computer Sciences, The University of Auckland, Auckland, New Zealand, 1997.
    • (1997) A taxonomy of obfuscating transformations
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 25
    • 70349288894 scopus 로고    scopus 로고
    • Advances in openbsd
    • April
    • T. DeRaadt. Advances in openbsd. CanSecWest, http://www.openbsd.org/papers/csw03/index.html, April 2003.
    • (2003) CanSecWest
    • DeRaadt, T.1
  • 26
    • 33749664064 scopus 로고    scopus 로고
    • Generalising the array split obfuscation
    • S. Drape. Generalising the array split obfuscation. Information Sciences, 177:202–219, 2007.
    • (2007) Information Sciences , vol.177 , pp. 202-219
    • Drape, S.1
  • 32
    • 34548027516 scopus 로고    scopus 로고
    • Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels
    • K. Makris and K. D. Ryu. Dynamic and adaptive updates of non-quiescent subsystems in commodity operating system kernels. In EuroSys, pages 327–340, 2007.
    • (2007) EuroSys , pp. 327-340
    • Makris, K.1    Ryu, K. D.2
  • 35
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Proceedings of the Network and Distributed Systems Security Symposium, 2005.
    • (2005) Proceedings of the Network and Distributed Systems Security Symposium
    • Newsome, J.1    Song, D.2
  • 36
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • A. One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
    • (1996) Phrack , vol.7 , Issue.49
    • One, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.