A Study on MS Crash Analyzer
![]() |
Noh, Myoung Sun
(전남대학교 정보보안협동과정)
Na, Jong Bae (전남대학교 정보보안협동과정) Jung, Gwang Un (충남대학교 컴퓨터공학과) Ryou, Jae Cheol (충남대학교 컴퓨터공학과) Noh, Bong Nam (전남대학교 전자컴퓨터공학부) |
1 | Microsoft, "First and Second chance exception handling," 2013년 4월 확인. |
2 | MSEC, "!exploitable Crash Analyzer - MSEC Debugger Extensions," Mar., 2009. |
3 | Microsoft Security Engineering Center, "The History of the !exploitable Crash Analyzer," Apr., 2009. |
4 | Microsoft, "EXCEPTION_RECORD structure," 2012.10, http://msdn.microsoft.com/en-us/library/windows/desktop/aa363082(v=vs.85).aspx |
5 | J. Newsome and D. Song. "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," NDSS '05, Feb., 2005. |
6 | C. Cowan et al., "StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks," 7th USENIX, Jan., 1998. |
7 | Alexander Sotirov, "Heap Feng Shui in JavaScript," BlackHat, 2007. |
8 | Adel Abdouchaev et al., "Analyze Crashes to Find Security Vulnerabilities in Your Apps," Nov., 2007. |
9 | Jaecheol Ryou et al.,, "A Study on Major Domestic S/W Vulnerability Discovery and Analysis Method," Oct., 2012. |
![]() |