Author image not provided
 Elena Gabriela Barrantes

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article59.33
Citation Count178
Publication count3
Publication years2003-2006
Available for download2
Average downloads per article1,737.00
Downloads (cumulative)3,474
Downloads (12 Months)85
Downloads (6 Weeks)12
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


3 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 3 of 3
Sort by:

1
December 2006 ACSAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

Instruction Set Randomization (ISR) has been proposed as a form of defense against binary code injection into an executing program. One proof-of-concept implementation is Randomized Instruction Set Emulator (RISE), based on the open-source Valgrind IA-32 to IA-32 binary translator. Although RISE is effective against attacks that are not RISEaware, it ...

2 published by ACM
February 2005 ACM Transactions on Information and System Security (TISSEC): Volume 8 Issue 1, February 2005
Publisher: ACM
Bibliometrics:
Citation Count: 52
Downloads (6 Weeks): 5,   Downloads (12 Months): 27,   Downloads (Overall): 1,733

Full text available: PDFPDF
Injecting binary code into a running program is a common form of attack. Most defenses employ a “guard the doors” approach, blocking known mechanisms of code injection. Randomized instruction set emulation (RISE) is a complementary method of defense, one that performs a hidden randomization of an application's machine code. If ...
Keywords: software diversity, randomized instruction sets, Automated diversity

3 published by ACM
October 2003 CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
Publisher: ACM
Bibliometrics:
Citation Count: 119
Downloads (6 Weeks): 7,   Downloads (12 Months): 58,   Downloads (Overall): 1,741

Full text available: PDFPDF
Binary code injection into an executing program is a common form of attack. Most current defenses against this form of attack use a 'guard all doors' strategy, trying to block the avenues by which execution can be diverted. We describe a complementary method of protection, which disrupts foreign code execution ...
Keywords: information hiding, language randomization, security, automated diversity, obfuscation, emulation



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us