Back to Results
First PageMeta Content
Computer programming / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / Call stack / Subroutine / Pointer / Return-to-libc attack / Software bugs / Computing / Software engineering


Enlisting Hardware Architecture to Thwart Malicious Code Injection Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi
Add to Reading List

Document Date: 2004-07-02 15:00:06


Open Document

File Size: 77,27 KB

Share Result on Facebook

City

the processor / /

Company

Hewlett-Packard / StackGhost / Microsoft / /

Currency

USD / /

/

Facility

Electrical Engineering Princeton University / SANS Institute / /

IndustryTerm

multi-layer software / susceptible computing device / longer-term solution / Dynamic software security solutions / Transparent run-time software defenses / legacy software / attack network / software patches / pervasive computing devices / victim networks / software safeguards / software methods / vulnerable devices / software countermeasures / agent software / service attack network / security-aware processors / potential solutions / compromised pervasive computing devices / attack networks / Software vulnerabilities / attack tools / pervasive Internet-connected computing devices / computing / attack software / static software defenses / static software techniques / software defenses / software solutions / legacy applications / Internet security vulnerabilities / software-based countermeasures / /

OperatingSystem

Multics / Linux / /

Organization

National Science Foundation / SANS Institute / Princeton University / FP SP / Federal Bureau of Investigation / /

Person

Trinity / John P. McGregor / Ruby B. Lee / David K. Karig / /

Position

programmer / /

Product

CCR / Thwart Malicious Code Injection / /

ProgrammingLanguage

FP / C / C++ / /

Technology

Alpha / security-aware processors / Linux / The processor / operating system / Source code Yes Yes No No No No No Compiler OS Processor / operating systems / /

SocialTag