[llvm-commits] CVS: llvm-www/safecode/menagerie/other.html

John Criswell criswell at cs.uiuc.edu
Thu Dec 16 13:05:34 PST 2010



Changes in directory llvm-www/safecode/menagerie:

other.html updated: 1.7 -> 1.8
---
Log message:

Added papers on other techniques (such as taint tracking and control-flow
integrity).


---
Diffs of the changes:  (+49 -2)

 other.html |   51 +++++++++++++++++++++++++++++++++++++++++++++++++--
 1 files changed, 49 insertions(+), 2 deletions(-)


Index: llvm-www/safecode/menagerie/other.html
diff -u llvm-www/safecode/menagerie/other.html:1.7 llvm-www/safecode/menagerie/other.html:1.8
--- llvm-www/safecode/menagerie/other.html:1.7	Fri Jul  2 14:15:04 2010
+++ llvm-www/safecode/menagerie/other.html	Thu Dec 16 15:04:29 2010
@@ -88,7 +88,36 @@
         <br>
         </li>
 
+        <br>
+
+        <li><a href="http://www.crhc.illinois.edu/DEPEND/pubs/papers/DSN_05_Pointer_Taintedness.pdf">
+        <b>
+        Defeating Memory Corruption Attacks via Pointer Taintedness Detection
+        </b></a>
+        <br>
+        Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, and Ravishankar
+        K. Iyer
+        <br>
+        <i>Proceedings of the 2005 International Conference on Dependable
+        Systems and Networks (DSN 2005)</i>,
+        June 2005.
+        <br>
+        </li>
 
+        <br>
+
+        <li><a href="http://www.cs.berkeley.edu/%7Edawnsong/papers/taintcheck.pdf">
+        <b>
+         Dynamic Taint Analysis: Automatic Detection, Analysis, and Signature
+Generation of Exploit Attacks on Commodity Software
+        </b></a>
+        <br>
+        James Newsome and Dawn Song
+        <br>
+        <i>Proceedings of the Network and Distributed Systems Security
+        Symposium </i>, February 2005.
+        <br>
+        </li>
       </ul>
 
       <a name="random"></a>
@@ -201,8 +230,8 @@
         </li>
       </ul>
 
-      <a name="adhoc"></a>
-      <h1>Miscellaneous Papers</h1>
+      <a name="cfi"></a>
+      <h1>Control Flow Integrity Papers</h1>
 
       <ul>
         <li><a href="http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND10.pdf">
@@ -221,6 +250,24 @@
 
         <br>
 
+        <li><a href="http://portal.acm.org/citation.cfm?id=1609956.1609960">
+        <b>
+        Control-flow Integrity Principles, Implementations, and Applications
+        </b></a>
+        <br>
+        Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti
+        <br>
+        <i>
+        ACM Transactions on Information and System Security (TISSEC 2009)</i>,
+        October 2009.
+        <br>
+        </li>
+      </ul>
+
+      <a name="adhoc"></a>
+      <h1>Miscellaneous Papers</h1>
+
+      <ul>
         <li><a href="http://portal.acm.org/citation.cfm?id=1755913.1755934">
         <b>
         Defeating Return-Oriented Rootkits with "Return-Less" Kernels






More information about the llvm-commits mailing list