共 16 条
[2]
Design andimplementation of a TCG-based integrity measurementarchitecture. Sailer R,ZHANG Xiaolan,Jaeger T,et al. Proceedings of the 13th USENIX SecuritySymposium . 2004
[3]
ZIP[P]. FROEHLICH ALFONS.CS194201B2,1979-11-30
[4]
Automatic detection of unsafecomponent loadings. Kwon T,SU Zhendong. Proceedings of the 19thInternational Symposium on Software Testing and Analysis . 2010
[5]
Dynamic link library search order[Z/OL]. Microsoft Corporation. http://msdn.microsoft.com/zh-cn/library/ms682586 (v=VS.85).aspx . 2012
[7]
Address obfuscation:anefficient approach to combat a board range of memory errorexploits. Bhatkar S,DuVarney D C,Sekar R. Proceedings of the 12th Conference on USENIXSecurity Symposium . 2003
[8]
Dynamic link library[Z/OL]. Microsoft Corporation. http://msdn.microsoft.com/en-us/library/windows/desktop/ms682589%28v=vs.85%29.aspx . 2012
[10]
StackGuard:Automatic AdaptiveDetection and Prevention of Buffer-Overflow Attacks. COWAN C,PU C. Proceedings of the 7thUSENIX Security Symposi-um . 1998