-
2
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: the insecurity of 802.11. MOBICOM, 2001.
-
(2001)
MOBICOM
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
5
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, and P. W. Q. Zhang. Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. USENIX Security Symposium, pages 63-77, Jan. 1998.
-
(1998)
USENIX Security Symposium
, pp. 63-77
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Zhang, P.W.Q.9
-
6
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
IEEE Computer Soc
-
C. Cowan, F. Wagle, P. Calton, S. Beattie, and J. Walpole. Buffer overflows: attacks and defenses for the vulnerability of the decade. DARPA Information Survivability Conference and Exposition. IEEE Computer Soc, 2:95-107, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 95-107
-
-
Cowan, C.1
Wagle, F.2
Calton, P.3
Beattie, S.4
Walpole, J.5
-
8
-
-
85011293817
-
LCLint: A tool for using specifications to check code
-
D. Evans, J. Guttag, J. Horning, and Y. Tan. LCLint: A tool for using specifications to check code. ACM SIGSOFT Symposium on the Foundations of Software Engineering, pages 87-96, 1994.
-
(1994)
ACM SIGSOFT Symposium on the Foundations of Software Engineering
, pp. 87-96
-
-
Evans, D.1
Guttag, J.2
Horning, J.3
Tan, Y.4
-
9
-
-
85084162735
-
A secure environment for untrusted helper applications
-
July
-
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications. USENIX Security Symposium, pages 1-13, July 1996.
-
(1996)
USENIX Security Symposium
, pp. 1-13
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
11
-
-
0012529658
-
Lint, a C program checker
-
AT&T Bell Laboratories
-
S. Johnson. Lint, a C program checker. Unix Programmer's Manual, AT&T Bell Laboratories, 1978.
-
(1978)
Unix Programmer's Manual
-
-
Johnson, S.1
-
12
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Aug.
-
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. USENIX Security Symposium, pages 177-89, Aug. 2001.
-
(2001)
USENIX Security Symposium
, pp. 177-189
-
-
Larochelle, D.1
Evans, D.2
-
15
-
-
84944878354
-
-
CRC Press, Boca Raton, FL, October
-
A. Menezes, P. V. Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, October 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.V.2
Vanstone, S.3
-
18
-
-
0006100649
-
Smashing the stack for fun and profit
-
A. One. Smashing the stack for fun and profit. Phrack, 49, 1996.
-
(1996)
Phrack
, vol.49
-
-
One, A.1
-
21
-
-
77953555228
-
-
Available on-line at
-
Sci-Worx GmbH. AES Rijndael core. Available on-line at http://www.sci-worx.com.
-
AES Rijndael Core
-
-
-
22
-
-
0024683697
-
The internet worm, password cracking: A game of wits
-
June
-
D. Seeley. The internet worm, password cracking: a game of wits. Communications of the ACM, 32(6):700-3, June 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 700-703
-
-
Seeley, D.1
-
23
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. USENIX Security Symposium, pages 63-78, 1999.
-
(1999)
USENIX Security Symposium
, pp. 63-78
-
-
Sekar, R.1
Uppuluri, P.2
-
24
-
-
0242357321
-
-
U. Shankar, K. Talwar, J. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers, pages 201-20, 2001.
-
(2001)
Detecting Format String Vulnerabilities with Type Qualifiers
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.3
Wagner, D.4
-
26
-
-
0003081830
-
An efficient algorithm for exploiting multiple arithmetic units
-
R. Tomasulo. An efficient algorithm for exploiting multiple arithmetic units. IBM Journal, pages 25-33, 1967.
-
(1967)
IBM Journal
, pp. 25-33
-
-
Tomasulo, R.1
-
28
-
-
0020180633
-
OMEGA - A DATA FLOW ANALYSIS TOOL FOR THE C PROGRAMMING LANGUAGE.
-
C. Wilson and L. Osterweil. Omega - a data flow analysis tool for the C programming language. IEEE Trans, on Software Engineering, 11(9):832-8, 1985. (Pubitemid 16574258)
-
(1982)
IEEE Transactions on Software Engineering
, vol.SE-11
, Issue.9
, pp. 832-838
-
-
Wilson Cindy1
Osterweil Leon, J.2
-
29
-
-
84860043023
-
-
Available on-line at
-
Zero Knowledge Systems Inc. The Intel Pentium III Exploit Page. Available on-line at http://www.zeroknowledge.com/p3/home.asp.
-
The Intel Pentium III Exploit Page
-
-
|