Open Access
Issue
MATEC Web Conf.
Volume 228, 2018
2018 3rd International Conference on Circuits and Systems (CAS 2018)
Article Number 02004
Number of page(s) 5
Section Communications and Information Technology
DOI https://doi.org/10.1051/matecconf/201822802004
Published online 14 November 2018
  1. Bennet Yee, David Sehr, Gregory Dardyk, et al. Native Client: a sandbox for portable, untrusted x86 native code [J]. Commun. ACM, 2010 (1): 91-99. [Google Scholar]
  2. Inside Adobe Reader Protect Mode [OL]. http://blogs.adobe.com/security, 2010. [Google Scholar]
  3. CVE-2011-1353[OL], https://web.nvd.nist.gov, 2011. [Google Scholar]
  4. CVE-2013-0641[OL], https://web.nvd.nist.gov, 2013. [Google Scholar]
  5. CVE-2013-3186[OL], https://web.nvd.nist.gov, 2013. [Google Scholar]
  6. Cui Bao-jiang, Liang Xiao-bing, Wang Yu. The study of binary program test techniques based on backtracking and leading for covering key code area [J]. Journal of Electronics&Information Technology, 2012, 34 (1): 108-114. [Google Scholar]
  7. Ou Yang Yong-ji, Wei Qiang, Wang Qing-xian. Intelligent Fuzzing Based on Exception Distribution Steering [J]. Journal of Electronics & Information Technology, 2015, 37 (1): 143-149 [Google Scholar]
  8. Sabanal, Paul, and Mark Vincent Yason. Playing in the Reader X Sandbox [OL], https://www.blackhat.com, 2011. [Google Scholar]
  9. Mark Vincent Yason. Understanding the Attack Surface and Attack Resilience of Project Spartans New EdgeHtml Rendering Engine [OL], https://www.blackhat.com, 2015. [Google Scholar]
  10. James Forshaw. Digging for Sandbox Escapes Finding sandbox breakouts in Internet Explorer [OL], https://www.blackhat.com, 2014. [Google Scholar]
  11. Koh, Yong Chuan. Understanding the Microsoft Office 2013 Protected-View Sandbox [OL], https://recon.cx/2015/slides/ 2015. [Google Scholar]
  12. Xiaoning Li, Haifei Li. Smart COM Fuzzing-Auditing IE Sandbox Bypass in COM Objects [OL], https://cansecwest.com/csw15archive.html, 2015. [Google Scholar]
  13. Brain Gorenc, Jasiel Spelman. Thinking outside the sandbox Violating trust boundaries in uncommon ways [OL], https://www.blackhat.com/html/bh-media-archives/bh-archives-2014.html, 2014. [Google Scholar]
  14. Zhenhua Liu, Guilaume Lovet. Breeding Sandworms: How to fuzz your way out of Adobe Reader’s Sandbox [OL], https://www.blackhat.com/html/bh-media-archives/bh-archives-2012.html, 2012. [Google Scholar]
  15. Wang Z, Jiang X, Cui W, et al. Countering persistent kernel rootkits through systematic hook discovery[C], Recent Advances in Intrusion Detection. Springer Berlin Heidelberg, 2008: 21-38. [CrossRef] [Google Scholar]
  16. Yin H, Poosankam P, Hanna S, et al. HookScout: Proactive binary-centric hook detection [J], Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg. 2010: 1-20. [Google Scholar]
  17. Butler, James, and Greg Hoglund. VICE–catch the hookers [OL]. https://www.blackhat.com/html/bhmedia-archives/bh-archives-2014.html, 2014. [Google Scholar]
  18. Rutkowska J. System virginity verifier [OL], http://www.cs.dartmouth.edu, 2015. [Google Scholar]
  19. Hooks hark [OL]. http://www.gamedeception.net, 2010. [Google Scholar]
  20. Bellard, Fabrice. QEMU, a Fast and Portable Dynamic Translator [C]. Proc. USENIX Annual Technical Conference, FREENIX Track. Marriott Anaheim, CA, 2005. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.