메뉴 건너뛰기




Volumn , Issue , 2006, Pages 147-160

Securing software by enforcing data-flow integrity

Author keywords

[No Author keywords available]

Indexed keywords

C++ (PROGRAMMING LANGUAGE); COMPUTER SOFTWARE; DATA FLOW GRAPHS; DATA TRANSFER; GRAPHIC METHODS; STATIC ANALYSIS; SYSTEMS ANALYSIS;

EID: 84991997276     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (297)

References (41)
  • 5
    • 33646767376 scopus 로고    scopus 로고
    • Control-flow Integrity: Principles, implementations, and applications
    • Nov
    • ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow Integrity: Principles, implementations, and applications. In ACM CCS (Nov. 2005).
    • (2005) ACM CCS
    • Abadi, M.1    Budiu, M.2    Erlingsson, U.3    Ligatti, J.4
  • 11
    • 65349145047 scopus 로고    scopus 로고
    • Using programmer-written compiler extensions to catch security holes
    • May
    • ASHCRAFT, K., AND ENGLER, D. Using Programmer-Written Compiler Extensions to Catch Security Holes. In IEEE Symposium on Security and Privacy (May 2002).
    • (2002) IEEE Symposium on Security and Privacy
    • Ashcraft, K.1    Engler, D.2
  • 12
    • 33244470892 scopus 로고    scopus 로고
    • Improving software security with a C pointer analysis
    • May
    • AVOTS, D., DALTON, M., LIVSHITS, V. B., AND LAM, M. S. Improving software security with a C pointer analysis. In ICSE (May 2005).
    • (2005) ICSE
    • Avots, D.1    Dalton, M.2    Livshits, V.B.3    Lam, M.S.4
  • 13
    • 27544498541 scopus 로고    scopus 로고
    • Defeating memory corruption attacks via pointer taintedness detection
    • July
    • CHEN, S., XU, J., NAKKA, N., KALBARCZYK, Z., AND IYER, R. K. Defeating memory corruption attacks via pointer taintedness detection. In DSN (July 2005).
    • (2005) DSN
    • Chen, S.1    Xu, J.2    Nakka, N.3    Kalbarczyk, Z.4    Iyer, R.K.5
  • 19
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • Dec
    • CRANDALL, J. R., AND CHONG, F. T. Minos: Control data attack prevention orthogonal to memory model. In MICRO-37 (Dec. 2004).
    • (2004) MICRO-37
    • Crandall, J.R.1    Chong, F.T.2
  • 20
    • 0031648445 scopus 로고    scopus 로고
    • Alias analysis of executable code
    • Jan
    • DEBRAY, S. K., MUTH, R., AND WEIPPERT, M. Alias analysis of executable code. In POPL (Jan. 1998).
    • (1998) POPL
    • Debray, S.K.1    Muth, R.2    Weippert, M.3
  • 21
    • 0034832870 scopus 로고    scopus 로고
    • Ultra-fast Aliasing Analysis using CLA: A million lines of C code in a second
    • June
    • HEINTZE, N., AND TARDIEU, O. Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second. In PLDI (June 2001).
    • (2001) PLDI
    • Heintze, N.1    Tardieu, O.2
  • 22
    • 34748845128 scopus 로고    scopus 로고
    • Practical taint-based protection using demand emulation
    • Apr
    • HO, A., FETTERMAN, M., CLARK, C., WARFIELD, A., AND HAND, S. Practical taint-based protection using demand emulation. In EuroSys (Apr. 2006).
    • (2006) EuroSys
    • Ho, A.1    Fetterman, M.2    Clark, C.3    Warfield, A.4    Hand, S.5
  • 23
    • 85076735834 scopus 로고    scopus 로고
    • I B M. Purify. http://www-306.ibm.com/software/awdtools/ purify.
    • Purify, I.B.M.1
  • 26
    • 17644371841 scopus 로고
    • BCC: Run–time checking for C programs
    • June
    • KENDALL, S. Bcc: run–time checking for C programs. In USENIX Summer Conference (June 1983).
    • (1983) USENIX Summer Conference
    • Kendall, S.1
  • 29
    • 84869297317 scopus 로고    scopus 로고
    • M I C RO S O F T. Phoenix compiler framework. http://research.microsoft.com/phoenix/phoenixrdk.aspx.
    • Phoenix Compiler Framework
  • 31
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software
    • Feb
    • NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software. In NDSS (Feb. 2005).
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 32
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Nov
    • ONE, A. Smashing the stack for fun and profit. Phrack 7, 49 (Nov. 1996).
    • (1996) Phrack , vol.7 , pp. 49
    • One, A.1
  • 33
    • 33750325871 scopus 로고    scopus 로고
    • Argos: An emulator for fingerprinting zero-day attacks
    • Apr
    • PORTOKALIDIS, G., SLOWINSKA, A., AND BOS, H. Argos: an emulator for fingerprinting zero-day attacks. In EuroSys (Apr. 2006).
    • (2006) EuroSys
    • Portokalidis, G.1    Slowinska, A.2    Bos, H.3
  • 34
    • 77954504457 scopus 로고    scopus 로고
    • A practical dynamic buffer overflow detector
    • Feb
    • RUWASE, O., AND LAM, M. A practical dynamic buffer overflow detector. In NDSS (Feb. 2004).
    • (2004) NDSS
    • Ruwase, O.1    Lam, M.2
  • 35
    • 85180409373 scopus 로고    scopus 로고
    • Dira: Automatic detection, identification, and repair of control-hijacking attacks
    • Feb
    • SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification, and repair of control-hijacking attacks. In NDSS (Feb. 2005).
    • (2005) NDSS
    • Smirnov, A.1    Chiueh, T.2
  • 36
    • 0026845567 scopus 로고
    • Adding run-time checking to the portable C compiler
    • Apr
    • STEFFEN, J. L. Adding run-time checking to the portable C compiler. Software - Practice and Experience 22, 4 (Apr. 1992), 305–306.
    • (1992) Software - Practice and Experience , vol.22 , Issue.4 , pp. 305-306
    • Steffen, J.L.1
  • 37
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Oct
    • SUH, G. E., LEE, J., AND DEVADAS, S. Secure program execution via dynamic information flow tracking. In ASPLOS XI (Oct. 2004).
    • (2004) ASPLOS XI
    • Suh, G.E.1    Lee, J.2    Devadas, S.3
  • 38
    • 0002946830 scopus 로고    scopus 로고
    • A first step towards automated detection of buffer overrun vulnerabilities
    • Feb
    • WAGNER, D., FOSTER, J. S., BREWER, E. A., AND AIKEN, A. A first step towards automated detection of buffer overrun vulnerabilities. In NDSS (Feb. 2000).
    • (2000) NDSS
    • Wagner, D.1    Foster, J.S.2    Brewer, E.A.3    Aiken, A.4
  • 40
    • 34247546866 scopus 로고    scopus 로고
    • A comparison of publicly available tools for dynamic buffer overflow prevention
    • Feb
    • WILANDER, J., AND KAMKAR, M. A comparison of publicly available tools for dynamic buffer overflow prevention. In NDSS (Feb. 2003).
    • (2003) NDSS
    • Wilander, J.1    Kamkar, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.