1 |
SCARFONE, Karen; MELL, Peter. Guide to intrusion detection and prevention systems(idps). NIST special publication, 2007, 800.2007: 94.
|
2 |
Johri, Abhai, and Gary L. Luckenbaugh, "Trusted path mechanism for an operating system," U.S. Patent No. 4,918,653, 17 Apr., 1990.
|
3 |
Ozdoganoglu, Hilmi, et al., "SmashGuard: A hardware solution to prevent security attacks on the function return address," Computers, IEEE Transactions on 55.10(2006): 1271-1285.
DOI
ScienceOn
|
4 |
RICHARTE, Gerardo, et al. Four different tricks to bypass stackshield and stackguard protection. World Wide Web, http://www1.corest.com/files/files/11/StackGuardPaper.pdf, 2002.
|
5 |
http://www.exploit-db.com/wp-content/themes/exploit/docs/27657.pdf
|
6 |
Cowan, Crispin, et al., "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks," Proceedings of the 7th USENIX Security Symposium, Vol. 81, 1998.
|
7 |
Ju-Hyuk Kim, Soo-Hyun Oh, "Detection Mechanism against Code Re-use Attack in Stack region," Journal of the Korea Academia-Industrial cooperation Society, Vol.15 No.5, pp.3121-3131, 2014.
과학기술학회마을
DOI
|
8 |
TRAN, Minh, et al., On the expressiveness of return-intolibc attacks. In: Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, pp.121-141, 2011.
|
9 |
LETOU, Kopelo; DEVI, Dhruwajita; SINGH, Y. Jayanta. Host-based Intrusion Detection and Prevention System (HIDPS), International Journal of Computer Applications, 69.26: 28-33, 2013.
|
10 |
GOVINDARAJAN, M.; CHANDRASEKARAN, R. M. Intrusion detection using neural based hybrid classification methods, Computer networks, 55.8: 1662-1671, 2011.
DOI
|
11 |
http://lwn.net/Articles/262464
|
12 |
https://www.kernel.org/doc/Documentation/security/credentials.txt
|
13 |
http://www.linfo.org/su.html
|
14 |
http://en.wikipedia.org/wiki/System_call
|
15 |
Wright, Chris, et al. "Linux security module framework." Ottawa Linux Symposium. Vol.8032. 2002.
|
16 |
McGrath, R. and W. Akkerman, "Source Forge Strace Project," 2004.
|