Author image not provided
 Elena Gabriela Barrantes

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article59.33
Citation Count178
Publication count3
Publication years2003-2006
Available for download2
Average downloads per article1,737.00
Downloads (cumulative)3,474
Downloads (12 Months)85
Downloads (6 Weeks)12
Arrow RightAuthor only

See all colleagues of this author

See all subject areas


3 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 3 of 3
Sort by:

December 2006 ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Citation Count: 7

Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomized Instruction Set Emulator (RISE), based on the open-source Valgrind IA-32 to IA-32 binary translator. Although RISE is effective against attacks that are not RISEaware, it ...

2 published by ACM
February 2005 ACM Transactions on Information and System Security (TISSEC): Volume 8 Issue 1, February 2005
Publisher: ACM
Citation Count: 52
Downloads (6 Weeks): 5,   Downloads (12 Months): 27,   Downloads (Overall): 1,733

Full text available: PDFPDF
Injecting binary code into a running program is a common form of attack. Most defenses employ a “guard the doors” approach, blocking known mechanisms of code injection. Randomized instruction set emulation (RISE) is a complementary method of defense, one that performs a hidden randomization of an application's machine code. If ...
Keywords: software diversity, randomized instruction sets, Automated diversity

3 published by ACM
October 2003 CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
Publisher: ACM
Citation Count: 119
Downloads (6 Weeks): 7,   Downloads (12 Months): 58,   Downloads (Overall): 1,741

Full text available: PDFPDF
Binary code injection into an executing program is a common form of attack. Most current defenses against this form of attack use a 'guard all doors' strategy, trying to block the avenues by which execution can be diverted. We describe a complementary method of protection, which disrupts foreign code execution ...
Keywords: information hiding, language randomization, security, automated diversity, obfuscation, emulation

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us