-
2
-
-
0030092390
-
Checking for race conditions in file accesses
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131-152, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
4
-
-
33748164174
-
Runtime verification of authorization hook placement for the Linux Security Modules framework
-
Technical Report RC22254, IBM Research, December
-
A. Edwards, T. Jaeger, and X. Zhang. Runtime verification of authorization hook placement for the Linux Security Modules framework. Technical Report RC22254, IBM Research, December 2001.
-
(2001)
-
-
Edwards, A.1
Jaeger, T.2
Zhang, X.3
-
5
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the Fourth Symposium on Operation System Design and Implementation (OSDI), October 2000.
-
Proceedings of the Fourth Symposium on Operation System Design and Implementation (OSDI), October 2000
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
7
-
-
3142617536
-
The design and verification of a cryptographic security architecture
-
August 2000; Submitted thesis
-
P. Gutmann. The design and verification of a cryptographic security architecture, August 2000. Submitted thesis. Available at www.cs.auckland.ac.nz/pgut001/pubs/thesis/html.
-
-
-
Gutmann, P.1
-
10
-
-
0004327108
-
Drawing graphs with dot
-
E. Koutsofios and S. North. Drawing graphs with Dot. Available at http://www.research.att.com/sw/tools/graphviz/.
-
-
-
Koutsofios, E.1
North, S.2
-
11
-
-
0038108908
-
Access rights analysis for Java
-
K. Koved, M. Pistoia, and A. Kerschenbaum. Access rights analysis for Java. In Proceedings of 17th Annual ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), November 2002.
-
Proceedings of 17th Annual ACM Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), November 2002
-
-
Koved, K.1
Pistoia, M.2
Kerschenbaum, A.3
-
13
-
-
0038289816
-
-
NCSC; National Computer Security Center; DoD 5200.28-STD, also known as the Orange Book
-
NCSC. Trusted Computer Security Evaluation Criteria. National Computer Security Center, 1985, DoD 5200.28-STD, also known as the Orange Book.
-
(1985)
Trusted Computer Security Evaluation Criteria
-
-
-
15
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
August
-
U. Shankar, K. Talwar, J.S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proceedings of the Tenth USENIX Security Symposium, pages 201-216, August 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
16
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
J. Viega, J. Bloch, Y. Kohno, and G. McGraw, ITS4: A static vulnerability scanner for C and C++ code. In Proceedings of 2000 Annual Security Applications Conference, December 2000.
-
Proceedings of 2000 Annual Security Applications Conference, December 2000
-
-
Viega, J.1
Bloch, J.2
Kohno, Y.3
McGraw, G.4
|