1
0
Files
BSc-Thesis/thesis/src/99.intercept.bib

95 lines
3.2 KiB
BibTeX

@online{dwarfstd.org,
author = {DWARF Committee},
title = {DWARF Debugging Information Format},
date = {2025-06-24},
url = {https://dwarfstd.org/},
}
@manual{ld.so.8,
title = {ld.so(8) -- System Manager's Manual -- Linux manual pages},
}
@manual{dlsym.3,
title = {dlsym(3) -- Library Functions Manual -- Linux manual pages},
}
@manual{ld.1,
title = {ld(1) -- GNU Development Tools -- Linux manual pages},
}
@manual{gcc.1,
title = {GCC(1) -- GNU -- Linux manual pages},
}
@manual{ptrace.2,
title = {ptrace(2) -- System Calls Manual -- Linux manual pages},
}
@manual{strace.1,
title = {STRACE(1) -- General Commands Manual -- Linux manual pages},
}
@manual{ltrace.1,
title = {LTRACE(1) -- User Commands -- Linux manual pages},
}
@manual{ltrace.conf.5,
title = {ltrace.conf(5) -- ltrace configuration file -- Linux manual pages},
}
@manual{dladdr.3,
title = {dladdr(3) -- Library Functions Manual -- Linux manual pages},
}
@manual{readelf.1,
title = {READELF(1) -- GNU Development Tools -- Linux manual pages},
}
@manual{malloc.3,
title = {malloc(3) -- Library Functions Manual -- Linux manual pages},
}
@book{netsectools2005,
author = {Dhanjani, Nitesh and Clarke, Justin},
title = {Network Security Tools},
subtitle = {Writing, Hacking, and Modifying Security Tools},
date = {April 2005},
isbn = {0-596-00794-9},
publisher = {O'Reilly},
url = {https://litux.nl/mirror/networksecuritytools/0596007949/toc.html},
}
@book{linuxkernel,
author = {Daniel P. Bovet and Marco Cesati},
title = {Understanding the Linux Kernel},
subtitle = {From I/O Ports to Process Management},
edition = {3rd},
date = {November 2005},
isbn = {978-0-596-00565-8},
publisher = {O'Reilly},
}
@manual{gcc,
title = {Using the GNU Compiler Collection (GCC)},
url = {https://gcc.gnu.org/onlinedocs/gcc/index.html},
}
@manual{sud,
title = {Syscall User Dispatch -- The Linux Kernel documentation},
url = {https://docs.kernel.org/admin-guide/syscall-user-dispatch.html},
}
@inproceedings{zpoline,
author = {Kenichi Yasukata and Hajime Tazaki and Pierre-Louis Aublin and Kenta Ishiguro},
title = {zpoline: a system call hook mechanism based on binary rewriting},
booktitle = {2023 USENIX Annual Technical Conference (USENIX ATC '23)},
year = {2023},
isbn = {978-1-939133-35-9},
address = {Boston, MA},
pages = {293--300},
url = {https://www.usenix.org/conference/atc23/presentation/yasukata},
publisher = {USENIX Association},
month = jul,
}
@article{datahook,
author = {Hong, Quan and Li, Jiaqi and Zhang, Wen and Zhai, Lidong},
title = {DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification},
year = {2025},
issue_date = {July 2025},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {2},
number = {ISSTA},
url = {https://doi.org/10.1145/3728874},
doi = {10.1145/3728874},
journal = {Proc. ACM Softw. Eng.},
month = jun,
articleno = {ISSTA005},
numpages = {21},
keywords = {DataHook, Hooking technique, Software analysis, Software debugging, System call}
}