-
1
-
-
0342772508
-
Conflict and the computer: Information warfare and related ethical issues
-
Nat'l Computer Security Center, Fort Meade, Md.
-
S. Kitzberg, "Conflict and the Computer: Information Warfare and Related Ethical Issues," Proc. 21st Nat'1 Information System Security Conf., Nat'l Computer Security Center, Fort Meade, Md., pp. 126-135.
-
Proc. 21st Nat'1 Information System Security Conf.
, pp. 126-135
-
-
Kitzberg, S.1
-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
9 Nov. 1996; current Sept.
-
Aleph One, "Smashing the Stack for Fun and Profit," Phrack Online, Vol. 7, No. 49, 9 Nov. 1996; www. phrack.com (current Sept. 2000).
-
(2000)
Phrack Online
, vol.7
, Issue.49
-
-
Aleph, O.1
-
4
-
-
0041065277
-
The internet worm program: Analysis
-
Jan.
-
E. Spafford, "The Internet Worm Program: Analysis," Computer Comm. Review, Vol. 19, No. 1, Jan. 1989.
-
(1989)
Computer Comm. Review
, vol.19
, Issue.1
-
-
Spafford, E.1
-
5
-
-
0343207196
-
-
Carnegie Mellon Software Eng. Inst.; current Sept.
-
CERT/CC Advisories 1988-2000, Carnegie Mellon Software Eng. Inst.; www.cert.org/advisories (current Sept. 2000).
-
(2000)
CERT/CC Advisories 1988-2000
-
-
-
6
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Dilger, "Checking for Race Conditions in File Accesses," Computing Systems, Vol. 9, No. 2, Spring 1996, pp. 131-152.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
7
-
-
85059291063
-
-
Tech. Report NBS 919, Inst. for Computer Sciences and Technology, Nat'l Bureau of Standards, US Dept. of Commerce, Washington, D.C.
-
T.A. Linden, Operating System Structures to Support Security and Reliable Software, Tech. Report NBS 919, Inst. for Computer Sciences and Technology, Nat'l Bureau of Standards, US Dept. of Commerce, Washington, D.C., 1976.
-
(1976)
Operating System Structures to Support Security and Reliable Software
-
-
Linden, T.A.1
-
8
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
USENIX, Berkeley, Calif.
-
C. Cowan et al., "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh USENIX Security Symp., USENIX, Berkeley, Calif., 1998, pp. 63-78.
-
(1998)
Proc. Seventh USENIX Security Symp.
, pp. 63-78
-
-
Cowan, C.1
-
9
-
-
46749145715
-
On preventing intrusions by process behavior monitoring
-
Berkeley, Calif., USENIX
-
R. Sekar, T. Bowen, and M. Segal, "On Preventing Intrusions by Process Behavior Monitoring," Proc. Workshop on Intrusion Detection and Network Monitoring Proceedings, Berkeley, Calif., USENIX, 1999, pp. 29-40.
-
(1999)
Proc. Workshop on Intrusion Detection and Network Monitoring Proceedings
, pp. 29-40
-
-
Sekar, R.1
Bowen, T.2
Segal, M.3
-
10
-
-
0012624241
-
Experiences with tripwire: Using integrity checkers for intrusion detection
-
USENIX, Berkeley, Calif.
-
G.H. Kim and E.H. Spafford, "Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection," Proc. Systems Administration, Networking, and Security Conf. III, USENIX, Berkeley, Calif., 1994, pp. 89-101.
-
(1994)
Proc. Systems Administration, Networking, and Security Conf. III
, vol.3
, pp. 89-101
-
-
Kim, G.H.1
Spafford, E.H.2
-
11
-
-
0028994280
-
Fault-tolerance for off-the-shelf applications and hardware
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
M. Russinovich and Z. Segall, "Fault-Tolerance for Off-the-Shelf Applications and Hardware," Proc. 25th Int'l Symp. Fault-Tolerant Computing, IEEE Computer Society Press, Los Alamitos, Calif., 1995, pp. 67-71.
-
(1995)
Proc. 25th Int'l Symp. Fault-Tolerant Computing
, pp. 67-71
-
-
Russinovich, M.1
Segall, Z.2
-
12
-
-
0031332426
-
Using kernel hypervisors to secure applications
-
IEEE Computer Soc. Press, Los Alamitos, Calif.
-
T. Mitchem, R. Lu, and R. O'Brien, "Using Kernel Hypervisors to Secure Applications," Proc. Ann. Computer Security Application Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1997, pp. 175-181.
-
(1997)
Proc. Ann. Computer Security Application Conf.
, pp. 175-181
-
-
Mitchem, T.1
Lu, R.2
O'Brien, R.3
-
13
-
-
0342772502
-
-
Computer Associates white paper, Jan. 2000; current Sept.
-
eTrust Access Control for UNIX, Computer Associates white paper, Jan. 2000; www.ca.com/solutions/ enterprise/etrust/whitepapers.htm (current Sept. 2000).
-
(2000)
eTrust Access Control for UNIX
-
-
-
14
-
-
84940106242
-
Hardening COTS software with generic software wrappers
-
IEEE Computer Soc. Press, Los Alamitos, Calif.
-
T. Fraser, L. Badger, and M. Feldman, "Hardening COTS Software with Generic Software Wrappers," Proc. 1999 Symp. Security and Privacy, IEEE Computer Soc. Press, Los Alamitos, Calif., 1999, pp. 2-16.
-
(1999)
Proc. 1999 Symp. Security and Privacy
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
15
-
-
0031258214
-
Computer immunology
-
Oct.
-
S. Forrest, S. Hofmeyr, and A. Somayaji, "Computer Immunology," Comm. ACM, Vol. 40, No. 10, Oct. 1997, pp. 88-96.
-
(1997)
Comm. ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
16
-
-
0001913399
-
Mediating connectors
-
IEEE Computer Soc. Press, Los Alamitos, Calif.
-
R.M. Balzer and N.M. Goldman, "Mediating Connectors," Proc. 1999 Int'l Conf. Distributed Computing Systems Workshop on Electronic Commerce and Web-Based Applications/Middleware, IEEE Computer Soc. Press, Los Alamitos, Calif., 1999, pp. 73-77.
-
(1999)
Proc. 1999 Int'l Conf. Distributed Computing Systems Workshop on Electronic Commerce and Web-Based Applications/Middleware
, pp. 73-77
-
-
Balzer, R.M.1
Goldman, N.M.2
|