-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One, November 1996. Avaliable from
-
Aleph One. Smashing the stack for fun and profit. Phrack 49, 14, November 1996. Avaliable from http://www.phrack.com.
-
Phrack
, vol.49
, pp. 14
-
-
-
2
-
-
0003400251
-
Secure Computer Systems: Unified Exposition & Multics Interpretation
-
MITRE Corp, July 1975
-
D. Bell and L. LaPadula, 1975. Secure Computer Systems: Unified Exposition & Multics Interpretation, Technical Report MTIS AD-A023588, MITRE Corp, July 1975.
-
(1975)
Technical Report
, vol.MTIS AD-A023588
-
-
Bell, D.1
LaPadula, L.2
-
3
-
-
0022904285
-
Analyzing the Security of an Existing Computer System
-
November 1986
-
M. Bishop, 1986. Analyzing the Security of an Existing Computer System, 1986 Proceedings of the Fall Joint Computer Conference pp. 1115-1119 (November 1986).
-
(1986)
1986 Proceedings of the Fall Joint Computer Conference
, pp. 1115-1119
-
-
Bishop, M.1
-
4
-
-
0003411763
-
A Taxonomy of UNIX System and Network Vulnerabilities
-
Department of Computer Science, University of California at Davis, May 1995
-
M. Bishop, 1995. A Taxonomy of UNIX System and Network Vulnerabilities, Technical Report, Department of Computer Science, University of California at Davis, May 1995.
-
(1995)
Technical Report
-
-
Bishop, M.1
-
5
-
-
1942425813
-
-
http://www.securityfocus.com/bid/5408/discussion/.
-
-
-
-
6
-
-
84976675816
-
Binary Wrapping: A Technique for Instrumenting Object Code
-
June 1992
-
J. Cargille and B. P. Miller, 1992. Binary Wrapping: A Technique for Instrumenting Object Code, ACM SIGPLAN Notices, 27(6):17-18, June 1992.
-
(1992)
ACM SIGPLAN Notices
, vol.27
, Issue.6
, pp. 17-18
-
-
Cargille, J.1
Miller, B.P.2
-
7
-
-
84976675687
-
Information transmission in computational systems
-
1977
-
E. Cohen, 1977. Information transmission in computational systems, ACM SIGOPS Operating Systems Review, 11(5):133-139, 1977.
-
(1977)
ACM SIGOPS Operating Systems Review
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.1
-
9
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May 1976
-
D. Denning, 1976. A Lattice Model of Secure Information Flow, Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
1997
-
D. Denning and P.J. Denning, 1977. Certification of programs for secure information flow, Communications of the ACM, 20 (7) (1977) 504-513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.1
Denning, P.J.2
-
11
-
-
1942425806
-
-
Department of Computer Sciences, Purdue University, Coast TR 98-02, 1998
-
W. Du and A. Mathur, 1998. Vulnerability Testing of Software System Using Fault Injection. Department of Computer Sciences, Purdue University, Coast TR 98-02, 1998 75.
-
(1998)
Vulnerability Testing of Software System Using Fault Injection
, pp. 75
-
-
Du, W.1
Mathur, A.2
-
13
-
-
4444381692
-
An Empirical Study of the Robustness of Windows NT Applications Using Random Testing
-
Seattle, August 2000
-
J. Forrester and B. Miller, 2000. An Empirical Study of the Robustness of Windows NT Applications Using Random Testing, The 4th Usenix Windows System Symposium, Seattle, August 2000.
-
(2000)
The 4th Usenix Windows System Symposium
-
-
Forrester, J.1
Miller, B.2
-
15
-
-
1942457565
-
Analyzing Programs for Vulnerability to Buffer Overrun Attacks
-
Reliable Software Technologies, January
-
A. Ghosh and T. O'Connor. Analyzing Programs for Vulnerability to Buffer Overrun Attacks, Technical Report, Reliable Software Technologies, January 1998.
-
(1998)
Technical Report
-
-
Ghosh, A.1
O'Connor, T.2
-
16
-
-
84880450431
-
Web application security assessment by fault injection and behavior monitoring
-
Yao-Wen Huang, Shih-Kun Huang, Tsung-Po Lin, Chung-Hung Tsai. Web application security assessment by fault injection and behavior monitoring. WWW. 2003;148-159.
-
(2003)
WWW
, pp. 148-159
-
-
Yao-Wen, H.1
Shih-Kun, H.2
Tsung-Po, L.3
Chung-Hung, T.4
-
17
-
-
0015672289
-
A Note on the Confinement Problem
-
1973
-
B. Lampson, 1973. A Note on the Confinement Problem, Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
18
-
-
0028514027
-
A Taxonomy of Computer Program Security Flaws, with Examples
-
September 1994
-
C. Landwehr, A. Bull, J. McDermott and W. Choi, 1994. A Taxonomy of Computer Program Security Flaws, with Examples, ACM Computing Surveys 26, no. 3, September 1994.
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
-
-
Landwehr, C.1
Bull, A.2
McDermott, J.3
Choi, W.4
-
19
-
-
0025557712
-
An Empirical Study of the Reliability of Unix Utilities
-
Dec. 1990
-
B. Miller, L. Fredricksen and B. So, 1990. An Empirical Study of the Reliability of Unix Utilities, Communications of the ACM, vol.33, no.12, Dec. 1990, pp. 32-44.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.1
Fredricksen, L.2
So, B.3
-
20
-
-
0003577356
-
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
-
Computer Science Department, University of Wisconsin, November 1995
-
B. Miller, D. Koski, C. P. Lee, V. Maganty, R. Murthy, A. Natarajan and J. Steidl, 1995. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services, Technical Report, Computer Science Department, University of Wisconsin, November 1995.
-
(1995)
Technical Report
-
-
Miller, B.1
Koski, D.2
Lee, C.P.3
Maganty, V.4
Murthy, R.5
Natarajan, A.6
Steidl, J.7
-
21
-
-
1942521935
-
Software development and proofs of multi-level security
-
San Francisco, CA, 1976
-
P. G. Neumann, et al. 1976. Software development and proofs of multi-level security, Proc. 2nd International Conference on Software Engineering, pp. 421-428, San Francisco, CA, 1976.
-
(1976)
Proc. 2nd International Conference on Software Engineering
, pp. 421-428
-
-
Neumann, P.G.1
-
23
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
J. Rochlis and M. Eichin. With microscope and tweezers: The worm from MIT's perspective, Communications of the ACM, June 1989.
-
(1989)
Communications of the ACM
-
-
Rochlis, J.1
Eichin, M.2
-
24
-
-
0003954843
-
Formal Methods and their Role in the Certification of Critical Systems
-
Computer Science Laboratory, SRI International, March 1995
-
J. Rushby, 1995. Formal Methods and their Role in the Certification of Critical Systems, Technical Report CSL-95-1, Computer Science Laboratory, SRI International, March 1995.
-
(1995)
Technical Report
, vol.CSL-95-1
-
-
Rushby, J.1
-
25
-
-
84856043672
-
The Mathematical Theory of Communication
-
1948
-
C. Shannon, 1948. The Mathematical Theory of Communication, The Bell System Technical Journal, vol. 27, pp. 379-423, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
26
-
-
1942457566
-
-
http://www.immunitysec.com/spike.html.
-
-
-
-
27
-
-
0036041314
-
Software Security Vulnerability Testing in Hostile Environments
-
Madrid, Spain, 2002
-
H. Thompson, J. Whittaker and F. Mottay, 2002. Software Security Vulnerability Testing in Hostile Environments, Proceedings of the 17th ACM Software Applications Conference (ACM-SAC), Madrid, Spain, 2002.
-
(2002)
Proceedings of the 17th ACM Software Applications Conference (ACM-SAC)
-
-
Thompson, H.1
Whittaker, J.2
Mottay, F.3
-
29
-
-
1942521938
-
Taxonomy of security considerations and software quality
-
2003
-
H. Wang and C. Wang, 2003. Taxonomy of security considerations and software quality. Communications of the ACM, 46(6): 75-78, 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.6
, pp. 75-78
-
-
Wang, H.1
Wang, C.2
-
30
-
-
85081874807
-
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
-
San Diego, CA, February 2000
-
D. Wagner, J. Foster, E. Brewer and A. Aiken, 2000. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities, Symposium on Network and Distributed Systems Security (NDSS '00), pp. 3-17, San Diego, CA, February 2000.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS '00)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
31
-
-
0037614325
-
MOPS: An infrastructure for examining security properties of software
-
UCB//CSD-02-1197, UC Berkeley, 2002
-
D. Wagner and H. Chen, 2002. MOPS: an infrastructure for examining security properties of software, Technical Report, UCB//CSD-02-1197, UC Berkeley, 2002.
-
(2002)
Technical Report
-
-
Wagner, D.1
Chen, H.2
|