메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Enforcing Kernel Security Invariants with Data Flow Integrity

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS; CONTROL SYSTEMS;

EID: 85135962401     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.14722/ndss.2016.23218     Document Type: Conference Paper
Times cited : (112)

References (68)
  • 4
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Tech. Rep. ESD-TR-73-51
    • J. P. Anderson, “Computer security technology planning study,” U.S. Air Force Electronic Systems Division, Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Tech. Rep. ESD-TR-73-51, 1972.
    • (1972)
    • Anderson, J. P.1
  • 5
    • 85063250778 scopus 로고    scopus 로고
    • Android Open Source Project, “Verified boot,” https://source.android.com/ devices/tech/security/verifiedboot/index.html.
    • Verified boot
  • 32
    • 85084161650 scopus 로고    scopus 로고
    • Finding user/kernel pointer bugs with type inference
    • R. Johnson and D. Wagner, “Finding user/kernel pointer bugs with type inference.” in Usenix Security Symposium, 2004.
    • (2004) Usenix Security Symposium
    • Johnson, R.1    Wagner, D.2
  • 38
    • 85084164558 scopus 로고    scopus 로고
    • Statically detecting likely buffer overflow vulnerabilities
    • D. Larochelle and D. Evans, “Statically detecting likely buffer overflow vulnerabilities.” in Usenix Security Symposium, 2001.
    • (2001) Usenix Security Symposium
    • Larochelle, D.1    Evans, D.2
  • 46
    • 85019266862 scopus 로고    scopus 로고
    • MITRE, “Cve-2013-6282,” https://cve.mitre.org/cgi-bin/cvename.cgi? name=CVE-2013-6282, 2013.
    • (2013) Cve-2013-6282
  • 48
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song, “Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software,” in Network and Distributed System Security Symposium (NDSS), 2005.
    • (2005) Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 50
    • 85180795675 scopus 로고    scopus 로고
    • ARM TrustZone and KVM Coexistence with RTOS For Automotive
    • M. Paolino, “ARM TrustZone and KVM Coexistence with RTOS For Automotive,” in ALS Japan, 2015.
    • (2015) ALS Japan
    • Paolino, M.1
  • 53
    • 84991799247 scopus 로고    scopus 로고
    • An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
    • N. L. Petroni Jr, T. Fraser, A. Walters, and W. A. Arbaugh, “An architecture for specification-based detection of semantic integrity violations in kernel dynamic data.” in Usenix Security Symposium, 2006.
    • (2006) Usenix Security Symposium
    • Petroni, N. L.1    Fraser, T.2    Walters, A.3    Arbaugh, W. A.4
  • 59
    • 85180736276 scopus 로고    scopus 로고
    • “System error code,” https://msdn.microsoft.com/en-us/library/windows/ desktop/ms681382%28v=vs.85%29.aspx, 2001.
    • (2001) System error code
  • 60
    • 85180763769 scopus 로고    scopus 로고
    • The IEEE and The Open Group, errno.h system error numbers. The Open Group, the Open Group Base Specifications 7, IEEE Std 1003.1, 2013 Edition
    • The IEEE and The Open Group, errno.h - system error numbers. The Open Group, 2013, the Open Group Base Specifications Issue 7, IEEE Std 1003.1, 2013 Edition, http://pubs.opengroup.org/onlinepubs/9699919799/ functions/rename.html.
    • (2013)
  • 61
    • 85180789023 scopus 로고    scopus 로고
    • The Linux Foundation, “Llvmlinux,” http://llvm.linuxfoundation.org/ index.php/Main_Page.
    • Llvmlinux
  • 65
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • Z. Wang and X. Jiang, “Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity,” in IEEE Symposium on Security and Privacy (Oakland), 2010.
    • (2010) IEEE Symposium on Security and Privacy (Oakland)
    • Wang, Z.1    Jiang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.