-
1
-
-
18744407397
-
"Trusted Computing" and competition policy - Issues for computing professionals
-
ANDERSON, R. 2003. "Trusted Computing" and competition policy - Issues for computing professionals. Upgrade IV, 3 (June), 35-41.
-
(2003)
Upgrade IV
, vol.3
, Issue.JUNE
, pp. 35-41
-
-
Anderson, R.1
-
2
-
-
85008038596
-
Improving the TCPA specification
-
ARBAUGH, W. A. 2002. Improving the TCPA specification. IEEE Comput. 35, 8 (Aug.), 77-79.
-
(2002)
IEEE Comput.
, vol.35
, Issue.8 AUG
, pp. 77-79
-
-
Arbaugh, W.A.1
-
3
-
-
85084159869
-
Tied, libsafeplus: Tools for dynamic buffer overflow protection
-
San Diego, CA
-
AVIJIT, K., GUPTA, P., AND GUPTA, D. 2004. Tied, libsafeplus: Tools for dynamic buffer overflow protection. In Proceeding of the 13th USENIX Security Symposium. San Diego, CA.
-
(2004)
Proceeding of the 13th USENIX Security Symposium
-
-
Avijit, K.1
Gupta, P.2
Gupta, D.3
-
4
-
-
0003217728
-
The methodology of N-version programming
-
M. Lyu, Ed. Wiley, New York
-
AVIZIENIS, A. 1995. The methodology of N-version programming. In Software Fault Tolerance, M. Lyu, Ed. Wiley, New York, 23-46.
-
(1995)
Software Fault Tolerance
, pp. 23-46
-
-
Avizienis, A.1
-
5
-
-
0017792448
-
On the implementation of N-version programming for software fault tolerance during execution
-
AVIZIENIS, A. AND CHEN, L. 1977. On the implementation of N-Version programming for software fault tolerance during execution. In Proceedings of IEEE COMPSAC 77. 149-155.
-
(1977)
Proceedings of IEEE COMPSAC
, vol.77
, pp. 149-155
-
-
Avizienis, A.1
Chen, L.2
-
6
-
-
0034449842
-
Dynamo: A transparent dynamic optimization system
-
ACM Press, Vancouver, British Columbia, Canada
-
BALA, V., DUESTERWALD, E., AND BANERJIA, S. 2000. Dynamo: A transparent dynamic optimization system. In Proceedings of the ACM SIGPLAN '00 Conference on Programming language design and implementation. ACM Press, Vancouver, British Columbia, Canada, 1-12.
-
(2000)
Proceedings of the ACM SIGPLAN '00 Conference on Programming Language Design and Implementation
, pp. 1-12
-
-
Bala, V.1
Duesterwald, E.2
Banerjia, S.3
-
7
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
Berkeley, CA
-
BARATLOO, A., SINGH, N., AND TSAI, T. 2000. Transparent run-time defense against stack smashing attacks. In Proceedings of the 2000 USENIX Annual Technical Conference (USENIX-00), Berkeley, CA. 251-262.
-
(2000)
Proceedings of the 2000 USENIX Annual Technical Conference (USENIX-00)
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
8
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Washington, DC
-
BARRANTES, E. G., ACKLEY, D., FORREST, S., PALMER, T., STEFANOVIC, D., AND Zovi, D. D. 2003. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC. 272-280.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Barrantes, E.G.1
Ackley, D.2
Forrest, S.3
Palmer, T.4
Stefanovic, D.5
Zovi, D.D.6
-
9
-
-
16644369397
-
-
Microprocessor for executing enciphered programs, U.S. Patent no. 4 168 396
-
BEST, R. M. 1979. Microprocessor for executing enciphered programs, U.S. Patent no. 4 168 396.
-
(1979)
-
-
Best, R.M.1
-
10
-
-
0018995481
-
Preventing software piracy with crypto-microprocessors
-
San Francisco, CA
-
BEST, R. M. 1980. Preventing software piracy with crypto-microprocessors. In Proceedings of the IEEE Spring COMPCON '80, San Francisco, CA. 466-469.
-
(1980)
Proceedings of the IEEE Spring COMPCON '80
, pp. 466-469
-
-
Best, R.M.1
-
11
-
-
3042667685
-
Address obfuscation: An approach to combat buffer overflows, format-string attacks and more
-
Washington, DC
-
BHATKAE, S., DUVARNEY, D., AND SEKAR, R. 2003. Address obfuscation: An approach to combat buffer overflows, format-string attacks and more. In Proceedings of the 12th USENIX Security Symposium, Washington, DC. 105-120.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkae, S.1
Duvarney, D.2
Sekar, R.3
-
14
-
-
84860105712
-
-
BUTLER, T. R. 2004. Bochs. http://bochs.sourceforge.net/.
-
(2004)
Bochs
-
-
Butler, T.R.1
-
17
-
-
0027684663
-
Operating system protection through program evolution
-
COHEN, F. 1993. Operating system protection through program evolution. Computers and Security 12, 6 (Oct.), 565-584.
-
(1993)
Computers and Security
, vol.12
, Issue.6 OCT
, pp. 565-584
-
-
Cohen, F.1
-
18
-
-
84860092706
-
-
CORE SECURITY. 2004. CORE security technologies, http://www1.corest.com/ home/home.php.
-
(2004)
CORE Security Technologies
-
-
-
19
-
-
85084161775
-
Format guard: Automatic protection from printf format string vulnerabilities
-
Washington, DC
-
COWAN, C., BARRINGER, M., BEATTIE, S., AND KROAH-HARTMAN, G. 2001. Format guard: Automatic protection from printf format string vulnerabilities. In Proceedings of the 10th USENIX Security Symposium, Washington, DC. 191-199.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 191-199
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
20
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, DC
-
COWAN, C., BEATTIE, S., JOHANSEN, J., AND WAGLE, P. 2003. Pointguard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, Washington, DC. 91-104.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
21
-
-
84858929364
-
A cracker patch choice: An analysis of post hoc security techniques
-
Baltimore MD
-
COWAN, C., HINTON, H., PU, C., AND WALPOLE, J. 2000. A cracker patch choice: An analysis of post hoc security techniques. In National Information Systems Security Conference (NISSC), Baltimore MD.
-
(2000)
National Information Systems Security Conference (NISSC)
-
-
Cowan, C.1
Hinton, H.2
Pu, C.3
Walpole, J.4
-
22
-
-
85084160243
-
Automatic detection and prevention of buffer-overflow attacks
-
San Antonio, TX
-
COWAN, C., Pu, C., MAIER, D., HINTON, H., BAKKE, P., BEATTIE, S., GRIEB, A., WAGLE, P., AND ZHANG, Q. 1998. Automatic detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grieb, A.7
Wagle, P.8
Zhang, Q.9
-
23
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
COWAN, C., WAGLE, P., PU, C., BEATTIE, S., AND WALPOLE, J. 2000b. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Exposition (DISCEX 2000). 119-129.
-
(2000)
DARPA Information Survivability Conference and Exposition (DISCEX 2000)
, pp. 119-129
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
26
-
-
14944385012
-
-
Web publishing, IBM Research Division, Tokyo Research Laboratory
-
ETOH, H. AND YODA, K. 2000. Protecting from stack-smashing attacks. Web publishing, IBM Research Division, Tokyo Research Laboratory, http://www.trl.ibm.com/projects/security/ssp/main.html. June 19.
-
(2000)
Protecting from Stack-smashing Attacks
-
-
Etoh, H.1
Yoda, K.2
-
27
-
-
14844332687
-
Propolice: Improved stack smashing attack detection
-
ETOH, H. AND YODA, K. 2001. Propolice: Improved stack smashing attack detection. IPSJ SIG-Notes Computer Security (CSEC) 14 (Oct. 26).
-
(2001)
IPSJ SIG-notes Computer Security (CSEC)
, vol.14
, Issue.OCT. 26
-
-
Etoh, H.1
Yoda, K.2
-
31
-
-
16644376176
-
Smashing the stack for fun and profit
-
GERA AND RIQ. 2002. Smashing the stack for fun and profit. Phrack B9, 11 (July 28).
-
(2002)
Phrack
, vol.B9
, Issue.11 JULY 28
-
-
Gera1
Riq2
-
32
-
-
16644365624
-
SQL injection attacks - Are you safe?
-
HARPER, M. 2002. SQL injection attacks - Are you safe? In Sitepoint, http://www.sitepoint.com/article/794.
-
(2002)
Sitepoint
-
-
Harper, M.1
-
35
-
-
85084164164
-
Cyclone: A safe dialect of c
-
Monterey, CA
-
JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. 2002. Cyclone: A safe dialect of c. In Proceedings of the USENIX Annual Technical Conference, Monterey, CA. 275-288.
-
(2002)
Proceedings of the USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
37
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
ACM Press, Washington, DC
-
Kc, G. S., KEROMYTIS, A. D., AND PREVELAKIS, V. 2003. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, Washington, DC. 272-280.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
38
-
-
85084162336
-
Secure execution via program sheperding
-
San Francisco, CA
-
KIRIANSKY, V., BRUENING, D., AND AMARASINGHE, S. 2002. Secure execution via program sheperding. In Proceeding of the 11th USENIX Security Symposium, San Francisco, CA.
-
(2002)
Proceeding of the 11th USENIX Security Symposium
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.3
-
39
-
-
0003902445
-
The technology behind the crusoe processors
-
January
-
KLAIBER, A. 2000. The technology behind the crusoe processors. White Paper http://www.transmeta.com/pdf/white_papers/paper_aklaiber_19jan00.pdf. January.
-
(2000)
White Paper
-
-
Klaiber, A.1
-
43
-
-
77953085315
-
A framework for trusted instruction execution via basic block signature verification
-
ACM Press, Huntsville, AL
-
MILENKOVIĆ, M., MILENCOVIĆ, A., AND JOVANOV, E. 2004. A framework for trusted instruction execution via basic block signature verification. In Proceedings of the 42nd Annual Southeast Regional Conference (ACM SE'04). ACM Press, Huntsville, AL. 191-196.
-
(2004)
Proceedings of the 42nd Annual Southeast Regional Conference (ACM SE'04)
, pp. 191-196
-
-
Milenković, M.1
Milencović, A.2
Jovanov, E.3
-
45
-
-
72849146986
-
Install-time vaccination of Windows executables to defend against stack smashing attacks
-
Kluwer, Toulouse, France
-
NEBENZAHL, D. AND WOOL, A. 2004. Install-time vaccination of Windows executables to defend against stack smashing attacks. In Proceedings of the 19th IFIP International Information Security Conference. Kluwer, Toulouse, France, 225-240.
-
(2004)
Proceedings of the 19th IFIP International Information Security Conference
, pp. 225-240
-
-
Nebenzahl, D.1
Wool, A.2
-
47
-
-
3042642332
-
The advanced return-into-lib(c) exploits
-
NERGAL. 2001, The advanced return-into-lib(c) exploits. Phrack 58, 4 (Dec.).
-
(2001)
Phrack
, vol.58
, Issue.4 DEC
-
-
Nergal1
-
48
-
-
16244366310
-
Valgrind: A program supervision framework
-
O. Sokolsky and M. Viswanathan, Eds. Elsevier, Amsterdam
-
NETHERCOTE, N. AND SEWARD, J. 2003. Valgrind: A program supervision framework. In Electronic Notes in Theoretical Computer Science, O. Sokolsky and M. Viswanathan, Eds. Vol. 89. Elsevier, Amsterdam.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.89
-
-
Nethercote, N.1
Seward, J.2
-
50
-
-
84860106824
-
Documentation for the PaX project
-
PAX TEAM. 2003. Documentation for the PaX project. See Homepage of The PaX Team. http://pax.grsecurity.net/docs/index.html.
-
(2003)
Homepage of the PaX Team
-
-
-
52
-
-
50249089163
-
A specialization toolkit to increase the diversity of operating systems
-
Nara, Japan
-
Pu, C., BLACK, A., COWAN, C., AND WALPOLE, J. 1996. A specialization toolkit to increase the diversity of operating systems. In Proceedings of the 1996 ICMAS Workshop on Immunity-Based Systems, Nara, Japan.
-
(1996)
Proceedings of the 1996 ICMAS Workshop on Immunity-based Systems
-
-
Pu, C.1
Black, A.2
Cowan, C.3
Walpole, J.4
-
53
-
-
0016522101
-
System structure for software fault tolerance
-
RANDELL, B. 1975. System structure for software fault tolerance. IEEE Trans. Software Eng. 1, 2, 220-232.
-
(1975)
IEEE Trans. Software Eng.
, vol.1
, Issue.2
, pp. 220-232
-
-
Randell, B.1
-
59
-
-
16644376379
-
-
Tech. Rep. SPEC web 99_Design.062999.html, SPEC Inc. June 29
-
SPEC INC. 1999. Specweb99. Tech. Rep. SPEC web 99_Design.062999.html, SPEC Inc. June 29.
-
(1999)
Specweb99
-
-
-
61
-
-
18744401718
-
-
Tool Interface Standards Committee
-
TOOL INTERFACE STANDARDS COMMITTEE. 1995. Executabk and Linking Format (ELF). Tool Interface Standards Committee.
-
(1995)
Executabk and Linking Format (ELF)
-
-
-
62
-
-
0012528068
-
Libsafe 2.0: Detection of format string vulnerability exploits
-
Avaya Labs, Avaya Inc. February 6
-
TSAI, T. AND SINOH, N. 2001. Libsafe 2.0: Detection of format string vulnerability exploits. White Paper Version 3-21-01, Avaya Labs, Avaya Inc. February 6.
-
(2001)
White Paper Version 3-21-01
-
-
Tsai, T.1
Sinoh, N.2
-
65
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA
-
WAGNER, D., FOSTER, J. S., BREWER, E. A., AND AIKEN, A. 2000. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, San Diego, CA. 3-17.
-
(2000)
Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
67
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy
-
Xu, J., KALBARCZYK, Z., AND IYER, R. K. 2003. Transparent runtime randomization for security. In Proceeding of the 22nd International Symposium on Reliable Distributed Systems (SRDS'03), Florence, Italy. 26-272.
-
(2003)
Proceeding of the 22nd International Symposium on Reliable Distributed Systems (SRDS'03)
, pp. 26-272
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
68
-
-
12344316966
-
Architecture support for defending against buffer overflow attacks
-
San Jose, CA
-
Xu, J., KALBARCZYK, Z., PATEL, S., AND IYER, R. K. 2002. Architecture support for defending against buffer overflow attacks. In 2nd Workshop on Evaluating and Architecting System dependability (EASY), San Jose, CA. http://www.crhc.uiuc.edu/EASY/.
-
(2002)
2nd Workshop on Evaluating and Architecting System Dependability (EASY)
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Iyer, R.K.4
|