-
2
-
-
84860964920
-
-
CERT, http://www.cert.org.
-
-
-
-
3
-
-
84860965875
-
-
http://minos.cs.ucdavis.edu/.
-
-
-
-
5
-
-
0008564259
-
-
Robert Pinski Translation
-
D. Alighieri. Inferno, (Robert Pinski Translation).
-
Inferno
-
-
Alighieri, D.1
-
6
-
-
84860968277
-
-
B. Babayan. Security, www.elbrus.ru/mcst/eng/SECURE_INFORMATION_SYSTEM. V5-2e.pdf.
-
Security
-
-
Babayan, B.1
-
7
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
ACM Press
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM conference on Computer and Communication Security, pages 281-289. ACM Press, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
8
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Apr
-
K. J. Biba. Integrity Considerations for Secure Computer Systems. In MITRE Technical Report TR-3153, Apr 1977.
-
(1977)
MITRE Technical Report
, vol.TR-3153
-
-
Biba, K.J.1
-
11
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
Aug
-
C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, and J. Lokier. FormatGuard: Automatic protection from printf format string vulnerabilities. In Proc. of the 10th Usenix Security Symposium, Aug 2001.
-
(2001)
Proc. of the 10th Usenix Security Symposium
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
13
-
-
85084160243
-
Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. of the 7th Usenix Security Symposium, pages 63-78, Jan 1998.
-
(1998)
Proc. of the 7th Usenix Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
16
-
-
21644434330
-
-
Intel. Press Release, 12 March 2002
-
Intel. Press Release, 12 March 2002.
-
-
-
-
17
-
-
21644443561
-
Advanced Doug lea's malloc() exploits
-
jp. Advanced Doug lea's malloc() exploits, Phrack 61.
-
Phrack
, vol.61
-
-
-
19
-
-
0036949385
-
Enabling trusted software integrity
-
D. Kirovski, M. Drinic, and M. Potkonjak. Enabling trusted software integrity. In Proceedings of ASPLOS-X, San Jose, CA, 2002.
-
(2002)
Proceedings of ASPLOS-X, San Jose, CA
-
-
Kirovski, D.1
Drinic, M.2
Potkonjak, M.3
-
20
-
-
85084160041
-
Detecting and countering system intrusions using software wrappers
-
Jan
-
C. Ko, T. Fraser, L. Badger, and D. Kilpatrick. Detecting and countering system intrusions using software wrappers. In Proceedings of the USENIX Security Conference, pages 145-156, Jan 2000.
-
(2000)
Proceedings of the USENIX Security Conference
, pp. 145-156
-
-
Ko, C.1
Fraser, T.2
Badger, L.3
Kilpatrick, D.4
-
22
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz. Architectural Support for Copy and Tamper Resistant Software. In Proceedings of ASPLOS-IX, pages 168-177, 2000.
-
(2000)
Proceedings of ASPLOS-IX
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
24
-
-
84924650705
-
-
IBM Corporation Application System 400
-
National Security Agency. Final Evaluation Report, IBM Corporation Application System 400.
-
Final Evaluation Report
-
-
-
25
-
-
21644452554
-
The advanced retum-into-lib(c) exploits: PaX case study
-
Nergal. The advanced retum-into-lib(c) exploits: PaX case study, Phrack 58.
-
Phrack
, vol.58
-
-
Nergal1
-
27
-
-
84976758928
-
Supporting ada memory management in the iAPX-432
-
ACM Press
-
F. J. Pollack, G. W. Cox, D. W. Hammerstrom, K. C. Kahn, K. K. Lai, and J. R. Rattner. Supporting ada memory management in the iAPX-432. In Proceedings of ASPLOS-I, pages 117-131. ACM Press, 1982.
-
(1982)
Proceedings of ASPLOS-I
, pp. 117-131
-
-
Pollack, F.J.1
Cox, G.W.2
Hammerstrom, D.W.3
Kahn, K.C.4
Lai, K.K.5
Rattner, J.R.6
-
29
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
Mar.
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In Proceedings of the 17th Annual ACM International Conference on Supercomputing, Mar. 2003.
-
(2003)
Proceedings of the 17th Annual ACM International Conference on Supercomputing
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
30
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct.
-
G. E. Suh, J. Lee, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In Proceedings of ASPLOS-XI, Oct. 2004.
-
(2004)
Proceedings of ASPLOS-XI
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
33
-
-
21644455479
-
Microsoft stamps out XP buffer overflows
-
vnunet news. Microsoft stamps out XP buffer overflows.
-
Vnunet News
-
-
|