-
1
-
-
84949505015
-
ITS4: A static vulnerability scanner for c and c++ code
-
2000, IEEE Computer Soc. Press, Los Alamitos, Calif: the ITS4 tool
-
J. Viega et al., "ITS4: A Static Vulnerability Scanner for C and C++ Code," To appear in Proc. Ann. Computer Security Applications Conf. 2000, IEEE Computer Soc. Press, Los Alamitos, Calif: the ITS4 tool is available at www.rstcorp.com/its4.
-
Proc. Ann. Computer Security Applications Conf.
-
-
Viega, J.1
-
2
-
-
0002946830
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Internet Soc., Reston, Va
-
D. Wagner et al., "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities," Proc. Network and Distributed Systems Security Symposium (NDSS 2000), Internet Soc., Reston, Va., 2000, pp. 3-18.
-
(2000)
Proc. Network and Distributed Systems Security Symposium (Ndss 2000)
, pp. 3-18
-
-
Wagner, D.1
-
4
-
-
0016555241
-
The protection of information in computer systems
-
IEEE Press, Piscataway, N.J
-
J.H. Salzter and M.D. Schroeder, "The Protection of Information in Computer Systems," Proc. IEEE, IEEE Press, Piscataway, N.J., Vol. 9, No. 63, 1975, pp. 1278-1308.
-
(1975)
Proc. Ieee
, vol.9
, Issue.63
, pp. 1278-1308
-
-
Salzter, J.H.1
Schroeder, M.D.2
-
7
-
-
0033724116
-
IRM enforcement of Java stack inspection
-
IEEE Press, Piscataway, N.J
-
U. Erlingsson and F.B. Schneider, "IRM Enforcement of Java Stack Inspection," IEEE Symp. Security and Privacy, IEEE Press, Piscataway, N.J., 2000.
-
(2000)
IEEE Symp. Security and Privacy
-
-
Erlingsson, U.1
Schneider, F.B.2
-
8
-
-
84940110094
-
Policy-directed code safety
-
IEEE Press, Piscataway, N.J
-
D. Evans and A. Twyman, "Policy-Directed Code Safety," Proc. IEEE Symp. Security an Privacy, IEEE Press, Piscataway, N.J., 1999; see also www.cs.virginia. edu/∼evans.
-
(1999)
Proc. IEEE Symp. Security An Privacy
-
-
Evans, D.1
Twyman, A.2
-
9
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
U. ACM Press, New York
-
U. Erlingsson, U. and F.B. Schneider, ∼SASI Enforcement of Security Policies: A Retrospective,∼ Proc. New Security Paradigms Workshop, ACM Press, New York, 1999, pp. 246-255.
-
(1999)
Proc. New Security Paradigms Workshop
, pp. 246-255
-
-
Erlingsson, U.1
Schneider, F.B.2
-
11
-
-
0032670051
-
Dependent types in practical programming
-
ACM Press, New York
-
H. Xi and F. Pfenning, "Dependent Types in Practical Programming," Proc. 26th ACM Symp. Principles of Programming Languages (POPL), ACM Press, New York, 1999, pp. 214-227.
-
(1999)
Proc. 26th ACM Symp. Principles of Programming Languages (POPL)
, pp. 214-227
-
-
Xi, H.1
Pfenning, F.2
-
12
-
-
0041525084
-
From system-F to typed assembly language
-
May
-
G. Morrisett et al., "From System-F to Typed Assembly Language," ACM Trans. Programming Languages and Systems, Vol., 21, No. 3, May 1999, pp. 528-569; www.cs.cornell.edu/talc.
-
(1999)
ACM Trans. Programming Languages and Systems
, vol.21
, Issue.3
, pp. 528-569
-
-
Morrisett, G.1
-
14
-
-
84939573910
-
Differential power analysis: Leaking secrets
-
M. Weiner, ed., Lecture Notes in Computer Science, Springer, New York, Aug
-
P. Kocher, J. Jaffee, and B. Jun, "Differential Power Analysis: Leaking Secrets," Advances in Cryptology-CRYPTO'99. . In M. Weiner, ed., Lecture Notes in Computer Science, Vol. 1666, Springer, New York, Aug. 1999, pp. 388-397; www.cryptography.com/dpa/Dpa.pdf.
-
(1999)
Advances in Cryptology-cRYPTO'99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffee, J.2
Jun, B.3
|