-
4
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan C., C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang and H. Hinton, StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks, in: Proc. 7th USENIX Security Conference, 1998, pp. 63-78
-
(1998)
Proc. 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
5
-
-
18944384875
-
Design assurance arguments for intrusion tolerance
-
Dawson S., Levy J., Riemenschneider R., Saïdi H., Stavridou V., Valdes A. Design assurance arguments for intrusion tolerance. Workshop on Intrusion Tolerant Systems, DSN 2002. 2002;C.8.1, C.8.5
-
(2002)
Workshop on Intrusion Tolerant Systems, DSN 2002
, pp. 81
-
-
Dawson, S.1
Levy, J.2
Riemenschneider, R.3
Saïdi, H.4
Stavridou, V.5
Valdes, A.6
-
6
-
-
0022514018
-
'Sometime' and 'not never' revisited: On branching time versus linear time
-
Emerson E.A., Halpern J.Y. 'Sometime' and 'not never' revisited: On branching time versus linear time. Journal of the ACM. 33:1986;151-178
-
(1986)
Journal of the ACM
, vol.33
, pp. 151-178
-
-
Emerson, E.A.1
Halpern, J.Y.2
-
7
-
-
11344253696
-
On the construction of monitors for temporal logic properties
-
RV'01 - First Workshop on Runtime Verification
-
Geilen M. On the construction of monitors for temporal logic properties. Electronic Notes in Theoretical Computer Science. 55:2001;. RV'01 - First Workshop on Runtime Verification
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.55
-
-
Geilen, M.1
-
9
-
-
0031618223
-
-
Jeffery C.L., Zhou W., Templer K., Brazell M. A lightweight architecture for program execution monitoring, in: ACM SIGPLAN Workshop on Program Analysis for Software Tools and Engineering. 1998;67-74
-
(1998)
A Lightweight Architecture for Program Execution Monitoring, In: ACM SIGPLAN Workshop on Program Analysis for Software Tools and Engineering
, pp. 67-74
-
-
Jeffery, C.L.1
Zhou, W.2
Templer, K.3
Brazell, M.4
-
10
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Jim T., G. Morrisett, D. Grossman, M. Hicks, J. Cheney and Y. Wang, Cyclone: A safe dialect of C, in: USENIX Annual Technical Conference, 2002
-
(2002)
USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
13
-
-
0030677523
-
Execution monitoring of security critical programs in distributed systems: A specification-based approach
-
Ko C., M. Ruschitzka and K. Levitt, Execution monitoring of security critical programs in distributed systems: A specification-based approach, in: IEEE Symposium on Security and Privacy, 1997, pp. 175-187
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
15
-
-
0037816679
-
Runtime assurance based on formal specifications
-
Lee I., S. Kannan, M. Kim, O. Sokolsky and M. Viswanathan, Runtime assurance based on formal specifications, in: International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
-
(1999)
International Conference on Parallel and Distributed Processing Techniques and Applications
-
-
Lee, I.1
Kannan, S.2
Kim, M.3
Sokolsky, O.4
Viswanathan, M.5
-
16
-
-
84995731256
-
Temporal verification diagrams
-
International Symposium on Theoretical Aspects of Computer Software (TACS'94)
-
Manna Z. and A. Pnueli., Temporal verification diagrams, in: International Symposium on Theoretical Aspects of Computer Software (TACS'94), LNCS 789 (1994), pp. 726-765
-
(1994)
LNCS
, vol.789
, pp. 726-765
-
-
Manna, Z.1
Pnueli, A.2
-
18
-
-
8644227174
-
-
ida Security Advisory AL20010717, eEye Digital Security
-
Permeh R. and M. Maiffret, ida "Code Red" worm, Security Advisory AL20010717, eEye Digital Security (2001), http://www.eeye.com/html/ Research/Advisories/AL20010717.html
-
(2001)
"Code Red" Worm
-
-
Permeh, R.1
Maiffret, M.2
-
19
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, MD
-
Porras P. and P. Neumann, EMERALD: Event monitoring enabling responses to anomalous live disturbances, in: Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, 1997, pp. 353-365
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
22
-
-
4544381702
-
An adaptive intrusion-tolerant server architecture
-
System Design Laboratory, SRI International, CA
-
Valdes A., M. Almgren, S. Cheung, Y. Deswarte, B. Dutertre, J. Levy, H. Saïdi, V. Stavridou and T. E. Uribe, An adaptive intrusion-tolerant server architecture, Technical report, System Design Laboratory, SRI International, CA (2001)
-
(2001)
Technical Report
-
-
Valdes, A.1
Almgren, M.2
Cheung, S.3
Deswarte, Y.4
Dutertre, B.5
Levy, J.6
Saïdi, H.7
Stavridou, V.8
Uribe, T.E.9
-
25
-
-
18944393517
-
-
Ph.D. thesis, Department of Electrical and Computer Engineering, University of Toronto
-
Zakinthinos A., "On the Composition of Security Properties," Ph.D. thesis, Department of Electrical and Computer Engineering, University of Toronto (1996)
-
(1996)
On the Composition of Security Properties
-
-
Zakinthinos, A.1
|