메뉴 건너뛰기




Volumn , Issue , 2006, Pages 121-136

Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; NETWORK SECURITY;

EID: 85038810709     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (248)

References (34)
  • 2
    • 84862209017 scopus 로고    scopus 로고
    • Address obfuscation: An efficient approach to combat a broad range of memory error exploits
    • August
    • S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security Symposium, August 2003.
    • (2003) USENIX Security Symposium
    • Bhatkar, S.1    DuVarney, D.C.2    Sekar, R.3
  • 3
    • 84962259930 scopus 로고    scopus 로고
    • Building survivable systems: An integrated approach based on intrusion detection and damage containment
    • T. Bowen, D. Chee, M. Segal, R. Sekar, T. Shanbhag, and P. Uppuluri. Building survivable systems: An integrated approach based on intrusion detection and damage containment. In DIS-CEX, 2000.
    • (2000) DIS-CEX
    • Bowen, T.1    Chee, D.2    Segal, M.3    Sekar, R.4    Shanbhag, T.5    Uppuluri, P.6
  • 8
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504–513, July 1977.
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 10
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • J. S. Fenton. Memoryless subsystems. Computing Journal, 17(2):143–147, May 1974.
    • (1974) Computing Journal , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 13
    • 0024089972 scopus 로고
    • The confused deputy: (or why capabilities might have been invented)
    • October
    • N. Hardy. The confused deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 22(4):36–38, October 1988.
    • (1988) ACM SIGOPS Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 15
    • 85084161650 scopus 로고    scopus 로고
    • Finding user/kernel pointer bugs with type inference
    • R. Johnson and D. Wagner. Finding user/kernel pointer bugs with type inference. In USENIX Security Symposium, 2004.
    • (2004) USENIX Security Symposium
    • Johnson, R.1    Wagner, D.2
  • 17
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in java applications with static analysis
    • V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security Symposium, 2005.
    • (2005) USENIX Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 18
    • 0028058408 scopus 로고
    • A general theory of composition for trace sets closed under selective interleaving functions
    • May
    • J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In IEEE Symposium on Security and Privacy, pages 79–93, May 1994.
    • (1994) IEEE Symposium on Security and Privacy , pp. 79-93
    • McLean, J.1
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 30
  • 32
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In USENIX Security Symposium, 2006.
    • (2006) USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2
  • 34
    • 85084161756 scopus 로고    scopus 로고
    • Using CQual for static analysis of authorization hook placement
    • X. Zhang, A. Edwards, and T. Jaeger. Using CQual for static analysis of authorization hook placement. In USENIX Security Symposium, 2002.
    • (2002) USENIX Security Symposium
    • Zhang, X.1    Edwards, A.2    Jaeger, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.