-
3
-
-
84860923810
-
-
Trusted Computing Platform Alliance. http://www.trustedcomputing.org/.
-
-
-
-
5
-
-
84860933402
-
-
CERT Advisory CA-2001-33: November
-
CERT Advisory CA-2001-33: Multiple Vulnerabilities in WU-FTPD. http://www.cert.org/advisories/CA-2001-33.html, November 2001.
-
(2001)
Multiple Vulnerabilities in WU-FTPD
-
-
-
6
-
-
35048878974
-
-
CERT Advisory CA-2002-12: May
-
CERT Advisory CA-2002-12: Format String Vulnerability in ISC DHCPD. http://www.cert.org/advisories/CA-2002-12.html, May 2002.
-
(2002)
Format String Vulnerability in ISC DHCPD
-
-
-
9
-
-
2642519394
-
-
Cert Advisory CA-2003-04: January
-
Cert Advisory CA-2003-04: MS-SQL Server Worm. http://www.cert.org/ advisories/CA-2003-04.html, January 2003.
-
(2003)
MS-SQL Server Worm
-
-
-
11
-
-
85084161234
-
Mapbox: Using parameterized behavior classes to confine applications
-
August
-
A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the 9th USENIX Security Symposium, pages 1-17, August 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 1-17
-
-
Acharya, A.1
Raje, M.2
-
12
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
14
-
-
85084162426
-
Security of web browser scripting languages: Vulnerabilities, attacks, and remedies
-
January
-
V. Anupam and A. Mayer. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. In Proceedings of the 7th USENIX Security Symposium, pages 187-200, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 187-200
-
-
Anupam, V.1
Mayer, A.2
-
18
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
August
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
19
-
-
17644393012
-
Bypassing StackGuard and StackShield
-
Bulba and Kil3r. May
-
Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 5(56), May 2000.
-
(2000)
Phrack
, vol.5
, Issue.56
-
-
-
21
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
August
-
C. Cowan, M. Barringer, S. Beattie, and G. Kroah-Hartman. FormatGuard: Automatic Protection From printf Format String Vulnerabilities. In Proceedings of the 10th USENIX Security Symposium, pages 191-199, August 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 191-199
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
22
-
-
85009448253
-
PointGuard: Protecting pointers from buffer overflow vulnerabilities
-
August
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
23
-
-
1542697134
-
SubDomain: Parsimonious security for server appliances
-
March
-
C. Cowan, S. Beattie, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Security for Server Appliances. In Proceedings of the 14th USENIX System Administration Conference (LISA 2000), March 2000.
-
(2000)
Proceedings of the 14th USENIX System Administration Conference (LISA 2000)
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
24
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan.
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, Jan. 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
25
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
December
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
29
-
-
84940106242
-
Hardening COTS software with generic software wrappers
-
Oakland, CA, May
-
T. Fraser, L. Badger, and M. Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
32
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
June
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson. SLIC: An Extensibility System for Commodity Operating Systems. In Proceedings of the 1998 USENIX Annual Technical Conference, pages 39-52, June 1998.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
34
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Monterey, California, June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In Proceedings of the USENIX Annual Technical Conference, pages 275-288, Monterey, California, June 2002.
-
(2002)
Proceedings of the USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
42
-
-
0038524497
-
-
January
-
M. Conover and w00w00 Security Team. w00w00 on heap overflows, http://www.w00w00.org/files/articles/heaptut.txt, January 1999.
-
(1999)
W00w00 on Heap Overflows
-
-
Conover, M.1
-
46
-
-
0003508568
-
-
January FIPS-46
-
National Bureau of Standards. Data Encryption Standard, January 1977. FIPS-46.
-
(1977)
Data Encryption Standard
-
-
-
53
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
August
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting Format String Vulnerabilities with Type Qualifiers. In Proceedings of the 10th USENIX Security Symposium, pages 201-216, August 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
54
-
-
0003545819
-
The internet worm program: An analysis
-
Purdue University, West Lafayette, IN 47907-2004
-
E. H. Spafford. The Internet Worm Program: An Analysis. Technical Report Technical Report CSD-TR-823, Purdue University, West Lafayette, IN 47907-2004, 1988.
-
(1988)
Technical Report Technical Report
, vol.CSD-TR-823
-
-
Spafford, E.H.1
-
55
-
-
18744373147
-
Bespoke chips for the common man
-
14-20 December
-
Technology Quarterly. Bespoke chips for the common man. The Economist, pages 29-30, 14-20 December 2002.
-
(2002)
The Economist
, pp. 29-30
-
-
-
57
-
-
33846266424
-
-
Vendicator. Stack shield. http://www.angelfire.com/sk/stackshield/.
-
Stack Shield.
-
-
-
58
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
February
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), pages 3-17, February 2000.
-
(2000)
Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
59
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
July
-
K. M. Walker, D. F. Stern, L. Badger, K. A. Oosendorp, M. J. Petkac, and D. L. Sherman. Confining root programs with domain and type enforcement. In Proceedings of the USENIX Security Symposium, pages 21-36, July 1996.
-
(1996)
Proceedings of the USENIX Security Symposium
, pp. 21-36
-
-
Walker, K.M.1
Stern, D.F.2
Badger, L.3
Oosendorp, K.A.4
Petkac, M.J.5
Sherman, D.L.6
|