1
0
Files
BSc-Thesis/thesis/src/99.intercept.bib

175 lines
6.0 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
@online{dwarfstd.org,
author = {DWARF Committee},
title = {DWARF Debugging Information Format},
date = {2025-06-24},
url = {https://dwarfstd.org/},
}
@manual{ld.so.8,
title = {ld.so(8) -- System Manager's Manual -- Linux manual pages},
}
@manual{dlsym.3,
title = {dlsym(3) -- Library Functions Manual -- Linux manual pages},
}
@manual{ld.1,
title = {ld(1) -- GNU Development Tools -- Linux manual pages},
}
@manual{gcc.1,
title = {GCC(1) -- GNU -- Linux manual pages},
}
@manual{ptrace.2,
title = {ptrace(2) -- System Calls Manual -- Linux manual pages},
}
@manual{strace.1,
title = {STRACE(1) -- General Commands Manual -- Linux manual pages},
}
@manual{ltrace.1,
title = {LTRACE(1) -- User Commands -- Linux manual pages},
}
@manual{ltrace.conf.5,
title = {ltrace.conf(5) -- ltrace configuration file -- Linux manual pages},
}
@manual{dladdr.3,
title = {dladdr(3) -- Library Functions Manual -- Linux manual pages},
}
@manual{readelf.1,
title = {READELF(1) -- GNU Development Tools -- Linux manual pages},
}
@manual{malloc.3,
title = {malloc(3) -- Library Functions Manual -- Linux manual pages},
}
@manual{getaddrinfo.3,
title = {getaddrinfo(3) -- Library Functions Manual -- Linux manual pages},
}
@manual{getline.3,
title = {getline(3) -- Library Functions Manual -- Linux manual pages},
}
@book{netsectools2005,
author = {Dhanjani, Nitesh and Clarke, Justin},
title = {Network Security Tools},
subtitle = {Writing, Hacking, and Modifying Security Tools},
date = {April 2005},
isbn = {0-596-00794-9},
publisher = {O'Reilly},
url = {https://litux.nl/mirror/networksecuritytools/0596007949/toc.html},
}
@book{linuxkernel,
author = {Daniel P. Bovet and Marco Cesati},
title = {Understanding the Linux Kernel},
subtitle = {From I/O Ports to Process Management},
edition = {3rd},
date = {November 2005},
isbn = {978-0-596-00565-8},
publisher = {O'Reilly},
}
@manual{gcc,
title = {Using the GNU Compiler Collection (GCC)},
url = {https://gcc.gnu.org/onlinedocs/gcc/index.html},
}
@manual{sud,
title = {Syscall User Dispatch -- The Linux Kernel documentation},
url = {https://docs.kernel.org/admin-guide/syscall-user-dispatch.html},
}
@inproceedings{zpoline,
author = {Kenichi Yasukata and Hajime Tazaki and Pierre-Louis Aublin and Kenta Ishiguro},
title = {zpoline: a system call hook mechanism based on binary rewriting},
booktitle = {2023 USENIX Annual Technical Conference (USENIX ATC '23)},
year = {2023},
isbn = {978-1-939133-35-9},
address = {Boston, MA},
pages = {293--300},
url = {https://www.usenix.org/conference/atc23/presentation/yasukata},
publisher = {USENIX Association},
month = jul,
}
@article{datahook,
author = {Hong, Quan and Li, Jiaqi and Zhang, Wen and Zhai, Lidong},
title = {DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification},
year = {2025},
issue_date = {July 2025},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {2},
number = {ISSTA},
url = {https://doi.org/10.1145/3728874},
doi = {10.1145/3728874},
journal = {Proc. ACM Softw. Eng.},
month = jun,
articleno = {ISSTA005},
numpages = {21},
keywords = {DataHook, Hooking technique, Software analysis, Software debugging, System call},
}
@article{lopez2017,
title={A survey on function and system call hooking approaches},
author={Lopez, Juan and Babun, Leonardo and Aksu, Hidayet and Uluagac, A. Selcuk},
journal={Journal of Hardware and Systems Security},
volume={1},
number={2},
pages={114--136},
year={2017},
publisher={Springer},
}
@masterthesis{kern2023,
author = {Patrick Kern},
title = {Injecting Shared Libraries with LD\_PRELOAD for Cyber Deception},
school = {TU Wien},
year = {2023},
}
@inproceedings{guo2011cde,
title={CDE: Using system call interposition to automatically create portable software packages},
author={Guo, Philip J. and Engler, Dawson},
booktitle={2011 USENIX Annual Technical Conference (USENIX ATC 11)},
year={2011},
}
@inproceedings{detours,
title={Detours: Binary interception of Win32 functions},
author={Galen Hunt and Doug Brubacher},
booktitle={Windows NT 3rd symposium},
year={1999},
}
@inproceedings{spillane2007,
author = {Spillane, Richard P. and Wright, Charles P. and Sivathanu, Gopalan and Zadok, Erez},
title = {Rapid file system development using ptrace},
year = {2007},
isbn = {9781595937513},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/1281700.1281722},
doi = {10.1145/1281700.1281722},
booktitle = {Proceedings of the 2007 Workshop on Experimental Computer Science},
pages = {22es},
keywords = {rapid prototyping, monitors},
location = {San Diego, California},
series = {ExpCS '07},
}
@inproceedings{spif,
author = {Sze, Wai Kit and Sekar, R.},
title = {Provenance-based Integrity Protection for Windows},
year = {2015},
isbn = {9781450336826},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/2818000.2818011},
doi = {10.1145/2818000.2818011},
booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference},
pages = {211220},
numpages = {10},
location = {Los Angeles, CA, USA},
series = {ACSAC '15},
}
@inproceedings{ostia,
title={Ostia: A Delegating Architecture for Secure System Call Interposition},
author={Garfinkel, Tal and Pfaff, Ben and Rosenblum, Mendel},
booktitle={NDSS},
year={2004},
}
@inproceedings{fraser2000,
author={Fraser, T. and Badger, L. and Feldman, M.},
booktitle={Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00},
title={Hardening COTS software with generic software wrappers},
year={2000},
volume={2},
number={},
pages={323-337 vol.2},
doi={10.1109/DISCEX.2000.821530},
}