Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ahn, Youngjung | - |
dc.contributor.author | Lee, Yongsuk | - |
dc.contributor.author | Choi, Jin-Young | - |
dc.contributor.author | Lee, Gyungho | - |
dc.contributor.author | Ahn, Dongkyun | - |
dc.date.accessioned | 2021-09-05T07:22:15Z | - |
dc.date.available | 2021-09-05T07:22:15Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-07 | - |
dc.identifier.issn | 0018-9162 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/98089 | - |
dc.description.abstract | By identifying memory pages that external I/O operations have modified, a proposed scheme blocks malicious injected code activation, accurately distinguishing an attack from legitimate code injection with negligible performance impact and no changes to the user application. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE COMPUTER SOC | - |
dc.title | Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Choi, Jin-Young | - |
dc.contributor.affiliatedAuthor | Lee, Gyungho | - |
dc.identifier.doi | 10.1109/MC.2013.228 | - |
dc.identifier.scopusid | 2-s2.0-84905018423 | - |
dc.identifier.wosid | 000344475400022 | - |
dc.identifier.bibliographicCitation | COMPUTER, v.47, no.7, pp.66 - 72 | - |
dc.relation.isPartOf | COMPUTER | - |
dc.citation.title | COMPUTER | - |
dc.citation.volume | 47 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 66 | - |
dc.citation.endPage | 72 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | Code injection | - |
dc.subject.keywordAuthor | data execution prevention | - |
dc.subject.keywordAuthor | hackers | - |
dc.subject.keywordAuthor | invasive software | - |
dc.subject.keywordAuthor | security | - |
dc.subject.keywordAuthor | TLB | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.