Computer Science ›› 2013, Vol. 40 ›› Issue (5): 184-188.
Previous Articles Next Articles
CHEN Shu,YE Jun-min and ZHANG Fan
[1] Challener D,Catherman R.A practical Guide to Trusted Computing [M].北京:机械工业出版社,2009 [2] 沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-16 [3] Newsome J,Song D.Dynamic Taint Analysis for Automatic Detection,Analysis,and Signature Generation of Exploits on Commodity Software[C]∥Proceedings of the Network and Distributed Systems Security Symposium(NDSS).Feb 2005:56-73 [4] Kang M G,Camant S M,Poosankam P,et al.DTA++:Dynamic Taint Analysis with Targeted Control-Flow Propagation [C]∥Proceedings of the 18th Annual Network and Distributed System Security Symposium(NDSS).SanDiego,CA,2011:67-81 [5] Coogan K,Lu Gen,Debray S.Deobfuscation of VirtualizationObfuscated Software A Semantics-Based Approach [C]∥CCS 2011.Chicago,Illinois,USA,2011:17-21 [6] 王蕊,冯登国,杨轶,等.基于语义的恶意代码行为特征提取及检测方法[J].软件学报,2012,23(2):378-39 [7] Li Y,Zuo ZH.An overview of object code obfuscation technologies[J].Journal of Computer Technology and Development,2007,17(41):125-127 [8] Ushby J.Noninterference,Transitivity,and Channel-Control Se-curity Policies[R].Computer Science Laboratory,SRI International,2005 [9] Haigh J T,Yong W D.Extending the noninterference model of MLS for SAT [J].IEEE Transaction On Software Engineering,1987,2(13):141-150 [10] Goguen J A,Meseguer J.Security policies and security models [C]∥Proc.of the 1982IEEE Symposium on Security and Privacy.IEEE Computer Society Press,April 1982:11-20 [11] 赵佳,沈昌祥,刘吉强,等.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980 [12] 张帆,陈曙,桑永宣,等.完整性条件下无干扰模型[J].通信学报,2011,2(10):11-19 [13] Bellard F.QEMU documentation . http://wiki.qemu.org/Main_Page,2011 |
No related articles found! |
|