[1]周勇林.重大网络安全事件揭示应用软件安全重要性[J].计算机工程与应用,2009(7):76.
[2]KEVIN S,JACK W D.Software security using software dynamic translation[C].The 2003 USENIX Annual Technical Conference,2003:21-34.
[3]GIUSEPPE D,DENIZ H,MADAN J,et al.Avinash lakshman dynamo:amazons highly available key-value store[C].New York,NY,USA:ACM2007:1-12.
[5]HU Wei,JASON H,DAN W,et al.Secure and practical defense against code-injection attacks using software dynamic translation[J].SIGARCH Computer Architecture News,2005(1):108-117.
[6]潘丽君,姜玲燕.跳转链接技术在动态二进制翻译中的应用[J].微型电脑应用,2009(6):1-3.
[7]王楠,单征,岳峰,等.I386到Alpha动态二进制翻译中的代码缓存管理优化[J].信息工程大学学报,2010(6):1-4.
[8]JACK DAVIDSON.Software security via lightweight process virtualization[C].In Workshop on Exploring the Trace Space,International Conference on Supercomputing,2003:1-13.
[9]BRUCE C,JACK D,MARY L S.Continuous compilation:a new approach to aggressive and adaptive code transformation[J].ACM Transactions on Information System Security,2005(11):3-40.
[10]SRIDHAR S,SHAPIRO J S,BUNGALE P P.Hdtrans:Alow-overhead dynamic translator[C].In Proceedings of the 2005 Workshop on Binary Instrumentation and Applications(September 2005),IEEE Computer Society,2005:1-10.
[11]JASON D H,DANIEL W,BRUCE R C,et al.Evaluating fragment construction policies for sdt systems[C].VEE′06,2006:1-10.
[12]ZHOU S,CHILDERS B R,SOFFA M L.Planning for code buffer management in distributed virtual execution environments[C].New York,NY,USA:In VEE′05:Proceedings of the 1st ACM/USENIX International Conference on Virtual Execution Environments,2005:100-109.
[13]SCOTT K,KUMAR N,VELUSWAMY S,et al.Reconfigurable and retargetable software dynamic translation[C].First Annual IEEE/ACM International Symposium,2003:1-15. |