Acknowledgement
본 연구는 정부(과학기술정보통신부)의 재원으로 한국연구재단의 지원을 받아 수행된 연구임(NRF-2022R1F1A1076100). 또한 이 논문은 2024년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임(No. 2021-0-00724, 임베디드 시스템 악성코드 탐지·복원을 위한 RISC-V 기반 보안 CPU 아키텍처 핵심기술 개발)
References
- Roger S. Pressman "Software Engineering A Practltiners' Approach" 3rd Ed. McGraw Hill
- S. Nagarakatte, J. Zhao, M. M. K. Martin, and S. Zdancewic, "Cets: compiler enforced temporal safety for c." in ISMM, J. Vitek and D. Lea, Eds. ACM, 2010.
- H. Cho, J. Park, A. Oest, T. Bao, R. Wang, Y. Shoshi-taishvili, A. Doupe, and G.-J. Ahn, "Vik: practical mitigation of temporal memory safety violations through object id inspection,"in Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2022, pp. 271-284.
- B. Lee, C. Song, Y. Jang, T. Wang, T. Kim, L. Lu, and W. Lee, "Preventing use-after-free with dangling pointers nullification," in Proceedings of the 2015 Annual Network and Distributed System Security Symposium(NDSS), San Diego, CA, Feb. 2015.
- E. van der Kouwe, V. Nigade, and C. Giuffrida, "Dangsan: Scalable use-after-free detection," in Proceedings of the Twelfth European Conference on Computer Systems, ser. EuroSys '17. New York, NY, USA: Association for Computing Machinery, 2017, p. 405-419.
- Yulei Sui and Jingling Xue. 2016. SVF: interprocedural static value-flow analysis in LLVM. In Proceedings of the 25th International Conference on Compiler Construction (CC 2016). Association for Computing Machinery, New York, NY, USA, 265-266. https://doi.org/10.1145/2892208.2892235