-
3
-
-
80054992065
-
Extensibility, safety and performance in the SPIN operating system
-
B. N. Bershad, S. Savage, P. Pardyak, E. O.Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. Eggers. Extensibility, safety and performance in the SPIN operating system. In Proceedings of the 15th ACM Symposium on Operating Systems principles, pages 267-284, 1995.
-
(1995)
Proceedings of the 15th ACM Symposium on Operating Systems Principles
, pp. 267-284
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.O.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
5
-
-
0036041421
-
An empirical study of operating systems errors
-
October
-
A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, pages 73-88, October 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles
, pp. 73-88
-
-
Chou, A.1
Yang, J.2
Chelf, B.3
Hallem, S.4
Engler, D.5
-
7
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, January
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
11
-
-
77955772815
-
-
Fyodor. Ping of death, http://www.insecure.org/sploits/ping-o-death.html, 1997.
-
(1997)
Ping of Death
-
-
Fyodor1
-
13
-
-
27544441745
-
Loadable kernel modules
-
November
-
K. J. Jones. Loadable kernel modules.;login:, pages 43-49, November 2001.
-
(2001)
Login
, pp. 43-49
-
-
Jones, K.J.1
-
22
-
-
21644435500
-
Proofs on safety for untrusted code
-
October
-
G. Rosu and N. Segerlind. Proofs on safety for untrusted code. UCSD technical report CS1999-0633, October 1999.
-
(1999)
UCSD Technical Report
, vol.CS1999-0633
-
-
Rosu, G.1
Segerlind, N.2
-
23
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
November
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou. Specification-based anomaly detection: a new approach for detecting network intrusions. In Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
24
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
October
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model-carrying code: A practical approach for safe execution of untrusted applications. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
27
-
-
21644441505
-
-
PhD thesis, Harvard University, Division of Engineering and Applied Sciences, October
-
C. Small. Building an Extensible Operating System. PhD thesis, Harvard University, Division of Engineering and Applied Sciences, October 1998.
-
(1998)
Building An Extensible Operating System
-
-
Small, C.1
-
28
-
-
33748161983
-
Configuring the selinux policy
-
National security agency, January
-
S. Smalley. Configuring the selinux policy. Technical report, National security agency, http://www.nsa.gov/selinux/papers/policy2/t1.html, January 2003.
-
(2003)
Technical Report
-
-
Smalley, S.1
-
29
-
-
84860023880
-
Solar designer
-
Solar Designer. Non-Executable User Stack. http://www.openwall.com/linux/.
-
Non-executable User Stack
-
-
-
35
-
-
21644441832
-
-
H. Xie. LIDS hacking HOWTO. http://www.lids.org/lidshowto/lids-hacking-howto.html, 2000.
-
(2000)
LIDS Hacking HOWTO
-
-
Xie, H.1
|