Intrusion detection using sequences of system calls, Journal of Computer Security, vol.6, issue.3, 1998. ,
DOI : 10.3233/JCS-980109
Automating mimicry attacks using static binary analysis, 14th conference on USENIX Security Symposium, 2005. ,
On the Detection of Anomalous System Call Arguments, 8th European Symposium on Research in Computer Security, 2003. ,
DOI : 10.1007/978-3-540-39650-5_19
Dataflow anomaly detection, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006. ,
DOI : 10.1109/SP.2006.12
Exploiting Execution Context for the Detection of Anomalous System Calls, Proceeding of the 10th International Symposium on Recent Advances in Intrusion Detection, 2007. ,
DOI : 10.1007/978-3-540-74320-0_1
Anomaly detection using call stack information, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.65, 2003. ,
DOI : 10.1109/SECPRI.2003.1199328
Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102165
Secure execution via program shepherding, Proceedings of the Usenix Security Symposium, 2002. ,
Non-control-data attacks are realistic threats, Usenix Security Symposium, 2005. ,
Preventing Memory Error Exploits with WIT, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.30
Securing software by enforcing data-flow integrity, 7th USENIX Symposium on Operating Systems Design and Implementation, 2006. ,
SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), 2009. ,
DOI : 10.1109/CRISIS.2009.5411977
URL : https://hal.archives-ouvertes.fr/hal-00424574
Program Slicing, IEEE Transactions on Software Engineering, vol.10, issue.4, 1982. ,
DOI : 10.1109/TSE.1984.5010248
Dependence graphs and its use in optimization, 8th ACM Symposium on Principles of Programming Languages, 1981. ,
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, 1977. ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/inria-00528590
Static analysis of arithmetical congruences, International Journal of Computer Mathematics, vol.30, issue.3-4, pp.165-190, 1989. ,
DOI : 10.1145/29873.29875
Automatic discovery of linear restraints among variables of a program, Proceedings of the 5th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '78, 1978. ,
DOI : 10.1145/512760.512770
Affine relationships among variables of a program, Acta Informatica, vol.6, issue.2, pp.133-151, 1976. ,
DOI : 10.1007/BF00268497
Static analysis of linear congruence equalities among variables of a program, TAPSOFT'91, pp.169-192, 1991. ,
DOI : 10.1007/3-540-53982-4_10
Soft-error detection using control flow assertions, Proceedings. 16th IEEE Symposium on Computer Arithmetic, 2003. ,
DOI : 10.1109/DFTVS.2003.1250158
CEDA: Control-flow Error Detection through Assertions, 12th IEEE International On-Line Testing Symposium (IOLTS'06), 2006. ,
DOI : 10.1109/IOLTS.2006.14
Using Attack Injection to Discover New Vulnerabilities, International Conference on Dependable Systems and Networks (DSN'06), 2006. ,
DOI : 10.1109/DSN.2006.72