26
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

A Dynamic Verification Model based on Information Flow Constraint

, , &
Pages 712-723 | Received 07 Jan 2012, Accepted 14 Feb 2013, Published online: 08 May 2013

References

  • Andersen L.O Program Analysis and Specialization for the C Programming Language , Copenhagen : University of Copenhagen . Ph.D . 1994 ,pp. 112 – 152
  • Forrest S , Hofmeyr S.A Somayaji A , Longstaff T.A. A Sense of Self for UNIX Processes . In Proc. of the 1996 IEEE Symposium on Security and Privacy . Los Alamitos , CA(IEEE Computer Society Press. 1996) pp. 120 – 128
  • Li , W , Dai , Y.X. and Lian , Y.F. 2009 . Context sensitive Hostbased IDS using Hybrid Automaton . Journal of Software , 20 ( 1 ) : 138 – 151 .
  • Michael C , Ghosh A Using Finite Automate to Mine Execution Data for Intrusion Detection: A Preliminary Report . Lecture Notes in Computer Science 1907 , RAID 2000 ,pp. 66 – 79
  • Feng H , Kolesnikov O , Fogla P , Lee W , Gong W Anomaly Detection Using Call Stack Information . In IEEE Symposium on Security and Privacy , Oakland , California 2003 ,pp. 62 – 76
  • Abadi M , Budiu M Erlingsson Ú Control-flow integrity . In Proc. of the 12th ACM conference on Computer and communications security , New York , USA 2005 ,pp. 340 – 353
  • Newsome J. Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proc. of the 12th Annual Network and Distributed System Security Symposium (NDSS) 2005 ,pp. 10 – 17
  • Jedidiah R. Crandall , Frederic T.C. Minos: Control Data Attack Prevention Orthogonal to Memory Model . In: Proc. of the 37th annual IEEE/ACM International Symposium on Microarchitecture 2004 ,pp. 221 – 232
  • Horwitz , S , Reps , T and Binkley , D . 2004 . Interprocedural slicing using dependence graphs . ACM SIGPLAN Notices , 39 ( 4 ) : 229 – 243 .
  • Wang , N and Liu , J . 2003 . Proficiency and effectiveness comparision of five types pointer analysis algorithm . Computer Engineer and design , 24 ( 12 ) : 38 – 42 .
  • ROSE . https://www.rosecompiler.org/
  • Dyninst . http://www.dyninst.org
  • DWARF http://www.dwarfstd.org/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.