-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M., Gordon, A. D., "A Calculus for Cryptographic Protocols: The Spi Calculus," Information and Computation, 148, 1, pp. 1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0025230154
-
Secure circuit evaluation: A protocol based on hiding information from an oracle
-
Abadi, M., Feigenbaum, J., "Secure Circuit Evaluation: A Protocol Based on Hiding Information from an Oracle," J. of Cryptology, 2, 1, pp. 1-12, 1990.
-
(1990)
J. of Cryptology
, vol.2
, Issue.1
, pp. 1-12
-
-
Abadi, M.1
Feigenbaum, J.2
-
3
-
-
85038458744
-
Formalization and verification of a mail server in coq
-
to appear
-
Affeldt, R. and Kobayashi, N., "Formalization and Verification of a Mail Server in Coq," in Proc. of ISSS2002, LNCS, to appear, 2003.
-
(2003)
Proc. of ISSS2002, LNCS
-
-
Affeldt, R.1
Kobayashi, N.2
-
4
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One
-
Aleph One, "Smashing the Stack for Fun and Profit," Phrack 49, 7, 1996, http://www.phrack.org/leecharch.php?p=49
-
(1996)
Phrack
, vol.49
, Issue.7
-
-
-
5
-
-
84955621400
-
Tamper resistant software: An implementation
-
Aucsmith, D., "Tamper Resistant Software: An Implementation," Information Hiding, LNCS 1174, pp. 317-333, 1996.
-
(1996)
Information Hiding, LNCS 1174
, pp. 317-333
-
-
Aucsmith, D.1
-
6
-
-
0030419725
-
A domain and type enforcement UNIX prototype
-
Badger, L., Sterne, D. F., Sherman, D. L. and Walker, K. M., "A Domain and Type Enforcement UNIX Prototype," USENIX Computing Systems, 9, 1, pp. 47-83, 1996.
-
(1996)
USENIX Computing Systems
, vol.9
, Issue.1
, pp. 47-83
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
-
7
-
-
85084160891
-
Transparent run-time defense against stack-smashing attacks
-
Baratloo, A., Singh, N. and Tsai, T., "Transparent Run-Time Defense against Stack-smashing Attacks," in Proc. of USENIX Annual Conf., 2000.
-
Proc. of USENIX Annual Conf., 2000
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
8
-
-
0035551933
-
Portable resource control in Java: The J-SEAL2 approach
-
Binder, W., Hulaas, J. and Villazón, A., "Portable Resource Control in Java: The J-SEAL2 Approach," in Proc. of ACM Conf. on Object Oriented Programming Systems Languages and Applications, pp. 139-155, 2001.
-
(2001)
Proc. of ACM Conf. on Object Oriented Programming Systems Languages and Applications
, pp. 139-155
-
-
Binder, W.1
Hulaas, J.2
Villazón, A.3
-
9
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M. and Needham, R., "A Logic of Authentication," in Proc. of the Royal Society, Series A 426, 233-271, 1989.
-
(1989)
Proc. of the Royal Society, Series A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
84967701397
-
The design philosophy of the DARPA internet protocols
-
Clark, D. D., "The Design Philosophy of the DARPA Internet Protocols," in Proc. of SIGCOMM'88, Computer Communication Review, 18, 4, pp. 106-114, 1988.
-
(1988)
Proc. of SIGCOMM'88, Computer Communication Review
, vol.18
, Issue.4
, pp. 106-114
-
-
Clark, D.D.1
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S. Grier, A., Wagle, P., Zhang, Q. and Hinton, H., "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks," in Proc. of 7th USENIX Security Conf., pp. 63-78, 1998.
-
(1998)
Proc. of 7th USENIX Security Conf.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E., "A Lattice Model of Secure Information Flow," Comm. of the ACM, 19, 5, pp. 236-243, 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
0007928023
-
FDR2 user manual
-
Formal Systems (Europe) Ltd.
-
Formal Systems (Europe) Ltd., "FDR2 User Manual," http://www.formal.demon.co.uk/fdr2manual/index.html, 2000.
-
(2000)
-
-
-
14
-
-
4444381692
-
An empirical study of the robustness of windows NT applications using random testing
-
Forrester, J. E. and Miller, B. P., "An Empirical Study of the Robustness of Windows NT Applications Using Random Testing," USENIX Windows Systems Symp., 2000.
-
USENIX Windows Systems Symp., 2000
-
-
Forrester, J.E.1
Miller, B.P.2
-
15
-
-
84887507059
-
Going beyond the sandbox: An overview of the new security architecture in the Java development kit 1.2
-
Gong, L., Mueller, M., Prafullchandra, H. and Schemers, R., "Going beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2," USENIX Symp. on Internet Technologies and Systems, pp. 103-112, 1997.
-
(1997)
USENIX Symp. on Internet Technologies and Systems
, pp. 103-112
-
-
Gong, L.1
Mueller, M.2
Prafullchandra, H.3
Schemers, R.4
-
16
-
-
0035551973
-
Encapsulating objects with confined types
-
Grothoff, C., Palsberg, J. and Vitek, J., "Encapsulating Objects with Confined Types," in Proc. of ACM Conf. on Object Oriented Programming Systems Languages and Applications, pp. 241-255, 2001.
-
(2001)
Proc. of ACM Conf. on Object Oriented Programming Systems Languages and Applications
, pp. 241-255
-
-
Grothoff, C.1
Palsberg, J.2
Vitek, J.3
-
17
-
-
85084163781
-
Lessons learned in implementing and deploying crypto software
-
Gutmann, P., "Lessons Learned in Implementing and Deploying Crypto Software," in Proc. of 11th USENIX Security Symp., pp. 315-326, 2002.
-
(2002)
Proc. of 11th USENIX Security Symp.
, pp. 315-326
-
-
Gutmann, P.1
-
18
-
-
84896693469
-
Model checking Java programs using Java pathfinder
-
Havelund, K. and Pressburger, T., "Model Checking Java Programs Using Java PathFinder," Int'l J. on Software Tools for Technology Transfer, 2, 4, pp. 366-381, 1998.
-
(1998)
Int'l J. on Software Tools for Technology Transfer
, vol.2
, Issue.4
, pp. 366-381
-
-
Havelund, K.1
Pressburger, T.2
-
19
-
-
18944390941
-
The model checker SPIN
-
Holzmann, G. J., "The Model Checker SPIN," IEEE Trans. on Software Engineering, 23, 5, pp. 279-295, 1997.
-
(1997)
IEEE Trans. on Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
22
-
-
78650021071
-
Software pot: An encapsulated transferable file system for secure software circulation
-
to appear
-
Kato, K. and Oyama, Y., "Software Pot: An Encapsulated Transferable File System for Secure Software Circulation," in Proc. of ISSS2002, LNCS, to appear, 2003.
-
(2003)
Proc. of ISSS2002, LNCS
-
-
Kato, K.1
Oyama, Y.2
-
23
-
-
0032010343
-
A partially deadlock-free typed process calculus
-
Kobayashi, N., "A Partially Deadlock-free Typed Process Calculus," ACM Trans. on Programming Languages and Systems, 20, 2, pp. 436-482, 1998.
-
(1998)
ACM Trans. on Programming Languages and Systems
, vol.20
, Issue.2
, pp. 436-482
-
-
Kobayashi, N.1
-
26
-
-
0025557712
-
An empirical study of the reliability of UNIX utilities
-
Miller, B. P., Fredriksen, L. and So, B., "An Empirical Study of the Reliability of UNIX Utilities," Comm. of the ACM, 33, 12, pp. 32-44, 1990.
-
(1990)
Comm. of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
28
-
-
0041525084
-
From system F to typed assembly language
-
Morrisett, G., Walker, D., Crary, K. and Glew, N., "From System F to Typed Assembly Language," ACM Trans. on Programming Languages and Systems, 21, 3, pp. 527-268, 1999.
-
(1999)
ACM Trans. on Programming Languages and Systems
, vol.21
, Issue.3
, pp. 527-568
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
29
-
-
0003508570
-
Data encryption standard (DES)
-
National Institute of Standards and Technology; FIPS PUB 46-3
-
National Institute of Standards and Technology, "Data Encryption Standard (DES)," FIPS PUB 46-3, 1999.
-
(1999)
-
-
-
32
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
Necula, G. C., McPeak, S. and Weimer, W., "CCured: Type-safe Retrofitting of Legacy Code," ACM Symp. on Principles of Programming Languages, pp. 128-139, 2002.
-
(2002)
ACM Symp. on Principles of Programming Languages
, pp. 128-139
-
-
Necula, G.C.1
Mcpeak, S.2
Weimer, W.3
-
33
-
-
85038453214
-
Fail-safe ANSI-C compiler: An approach to making C programs secure
-
to appear
-
Oiwa, Y., Sekiguchi, T., Sumii, E., Yonezawa, A., "Fail-safe ANSI-C Compiler: An Approach to Making C Programs Secure," in Proc. of ISSS2002, LNCS, to appear, 2003.
-
(2003)
Proc. of ISSS2002, LNCS
-
-
Oiwa, Y.1
Sekiguchi, T.2
Sumii, E.3
Yonezawa, A.4
-
34
-
-
85084160542
-
A flexible containment mechanism for executing untrusted code
-
Peterson, D. S., Bishop, M. and Pandey, R., "A Flexible Containment Mechanism for Executing Untrusted Code," in Proc. of 11th USENIX Security Symp., pp. 207-225, 2002.
-
(2002)
Proc. of 11th USENIX Security Symp.
, pp. 207-225
-
-
Peterson, D.S.1
Bishop, M.2
Pandey, R.3
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R. L., Shamir, A., and Adelman, L. M., "A Method for Obtaining Digital Signatures and Public-key Cryptosystems," Comm. of the ACM, 21, 2, pp. 120-126, 1978.
-
(1978)
Comm. of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
36
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
Rochlis, J. A. and Eichin, M. W., "With Microscope and Tweezers: the Worm from MIT's Perspective," Comm. of the ACM, 32, 6, 689-698, 1989.
-
(1989)
Comm. of the ACM
, vol.32
, Issue.6
, pp. 689-698
-
-
Rochlis, J.A.1
Eichin, M.W.2
-
37
-
-
84881225236
-
Enforceable security policies
-
Schneider, F. B., "Enforceable Security Policies," ACM Trans. Information and System Security, 3, 1, pp. 30-50, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
39
-
-
85038450559
-
Anzenmail: A secure and certified e-mail system
-
to appear
-
Shibayama, E., Hagihara, S., Kobayashi, N., Nisizaki, S., Taura, K. and Watanabe, T., "AnZenMail: A Secure and Certified E-mail System," in Proc. of ISSS2002, LNCS, to appear, 2003.
-
(2003)
Proc. of ISSS2002, LNCS
-
-
Shibayama, E.1
Hagihara, S.2
Kobayashi, N.3
Nisizaki, S.4
Taura, K.5
Watanabe, T.6
-
43
-
-
0035338198
-
Confined types in Java
-
Vitek, J. and Bokowski, B., "Confined Types in Java," Software Practice and Experience, 31, 6, pp. 507-532, 2001.
-
(2001)
Software Practice and Experience
, vol.31
, Issue.6
, pp. 507-532
-
-
Vitek, J.1
Bokowski, B.2
-
44
-
-
0027836576
-
Efficient software-based fault isolation
-
Wahbe, R. Lucco, S., Anderson, T. E., and Graham, S. L., "Efficient Software-based Fault Isolation," in Proc. of ACM Symp. on Operating Systems Principles, pp. 203-216, 1993.
-
(1993)
Proc. of ACM Symp. on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
46
-
-
0034952594
-
Web security: Authentication protocols and their analysis
-
Wen, W. and Mizoguchi, F., "Web Security: Authentication Protocols and Their Analysis," New Generation Computing, 19, 3, pp. 283-299, 2001.
-
(2001)
New Generation Computing
, vol.19
, Issue.3
, pp. 283-299
-
-
Wen, W.1
Mizoguchi, F.2
|