References
- Andersen L.O Program Analysis and Specialization for the C Programming Language , Copenhagen : University of Copenhagen . Ph.D . 1994 ,pp. 112 – 152
- Forrest S , Hofmeyr S.A Somayaji A , Longstaff T.A. A Sense of Self for UNIX Processes . In Proc. of the 1996 IEEE Symposium on Security and Privacy . Los Alamitos , CA(IEEE Computer Society Press. 1996) pp. 120 – 128
- Li , W , Dai , Y.X. and Lian , Y.F. 2009 . Context sensitive Hostbased IDS using Hybrid Automaton . Journal of Software , 20 ( 1 ) : 138 – 151 .
- Michael C , Ghosh A Using Finite Automate to Mine Execution Data for Intrusion Detection: A Preliminary Report . Lecture Notes in Computer Science 1907 , RAID 2000 ,pp. 66 – 79
- Feng H , Kolesnikov O , Fogla P , Lee W , Gong W Anomaly Detection Using Call Stack Information . In IEEE Symposium on Security and Privacy , Oakland , California 2003 ,pp. 62 – 76
- Abadi M , Budiu M Erlingsson Ú Control-flow integrity . In Proc. of the 12th ACM conference on Computer and communications security , New York , USA 2005 ,pp. 340 – 353
- Newsome J. Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proc. of the 12th Annual Network and Distributed System Security Symposium (NDSS) 2005 ,pp. 10 – 17
- Jedidiah R. Crandall , Frederic T.C. Minos: Control Data Attack Prevention Orthogonal to Memory Model . In: Proc. of the 37th annual IEEE/ACM International Symposium on Microarchitecture 2004 ,pp. 221 – 232
- Horwitz , S , Reps , T and Binkley , D . 2004 . Interprocedural slicing using dependence graphs . ACM SIGPLAN Notices , 39 ( 4 ) : 229 – 243 .
- Wang , N and Liu , J . 2003 . Proficiency and effectiveness comparision of five types pointer analysis algorithm . Computer Engineer and design , 24 ( 12 ) : 38 – 42 .
- ROSE . https://www.rosecompiler.org/
- Dyninst . http://www.dyninst.org
- DWARF http://www.dwarfstd.org/