-
2
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington D.C., USA, August
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. of the 12th USENIX Security Symposium, pages 105-120, Washington D.C., USA, August 2003.
-
(2003)
Proc. of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
3
-
-
0031620963
-
Breaking abstractions and unstructuring data structures
-
Chicago, IL, May
-
C. Collberg, C. Thomborson, and D. Low. Breaking abstractions and unstructuring data structures. In Proc. of the IEEE International Conference on Computer Languages, pages 28-38, Chicago, IL, May 1998.
-
(1998)
Proc. of the IEEE International Conference on Computer Languages
, pp. 28-38
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
5
-
-
0033204106
-
On power-law relationships of the internet topology
-
ACM Press
-
Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On power-law relationships of the internet topology. In Proc. of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 251-262. ACM Press, 1999.
-
(1999)
Proc. of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
7
-
-
3042778519
-
Monopoly considered harmful
-
December
-
D. Geer. Monopoly considered harmful. IEEE Security & Privacy Magazine, 1(6):14-16, December 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.6
, pp. 14-16
-
-
Geer, D.1
-
8
-
-
14844282642
-
Cyberinsecurity: The cost of monopoly
-
CCIA
-
D. Geer, R. Bace, P. Gutmann, P. Metzger, C. P. Pfleeger, J. S. Quarterman, and B. Schneier. Cyberinsecurity: The cost of monopoly. Tech report, CCIA, 2003. http://www.ccianet.org/papers/cyberinsecurity.pdf.
-
(2003)
Tech Report
-
-
Geer, D.1
Bace, R.2
Gutmann, P.3
Metzger, P.4
Pfleeger, C.P.5
Quarterman, J.S.6
Schneier, B.7
-
9
-
-
26844555602
-
Addressing the monoculture
-
December
-
G. Goth. Addressing the monoculture. IEEE Security & Privacy Magazine, 1(6):8-10, December 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.6
, pp. 8-10
-
-
Goth, G.1
-
10
-
-
14944350832
-
Review and analysis of synthetic diversity for breaking monocultures
-
Washington, D.C., October
-
J. E. Just and M. Cornwell. Review and analysis of synthetic diversity for breaking monocultures. In Proc. of the 2nd Workshop on Rapid Malcode, Washington, D.C., October 2004.
-
(2004)
Proc. of the 2nd Workshop on Rapid Malcode
-
-
Just, J.E.1
Cornwell, M.2
-
14
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
March-April
-
D. Moore, C. Shannon, G.M. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In IEEE INFOCOM, pages 1901-1910, March-April 2003.
-
(2003)
IEEE INFOCOM
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
15
-
-
14844337104
-
On achieving software diversity for improved network security using distributed coloring algorithms
-
Washington, B.C., October
-
A. J. O'Donnell and H. Sethu. On achieving software diversity for improved network security using distributed coloring algorithms. In Proc. of the 11th ACM Conference on Computer and Communications Security, pages 121-131, Washington, B.C., October 2004.
-
(2004)
Proc. of the 11th ACM Conference on Computer and Communications Security
, pp. 121-131
-
-
O'Donnell, A.J.1
Sethu, H.2
-
16
-
-
0035363452
-
Epidemic dynamics and endemic states in complex networks
-
066117
-
R. Pastor-Satorras and A. Vespignani. Epidemic dynamics and endemic states in complex networks. Phys. Rev. E, 63(066117), 2001.
-
(2001)
Phys. Rev. E
, vol.63
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
18
-
-
26844505311
-
Internet worms
-
NISSC
-
A. Powell. Internet worms. Tech Report 00727, NISSC, 2003. http://www.niscc.gov.uk/niscc/docs/re-20030805-00727.pdf.
-
(2003)
Tech Report 00727
-
-
Powell, A.1
-
19
-
-
4243066282
-
Risks of monoculture
-
M. Stamp. Risks of monoculture. Commun. ACM, 47(3): 120, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.3
, pp. 120
-
-
Stamp, M.1
-
20
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
July
-
C. Wang, J. Davidson, J. Hill, and J. Knight. Protection of software-based survivability mechanisms. In Proc. of the International Conferece on Dependable Systems and Networks, pages 193-202, July 2001.
-
(2001)
Proc. of the International Conferece on Dependable Systems and Networks
, pp. 193-202
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
22
-
-
4544275741
-
Modeling the effects of timing parameters on virus propagation
-
ACM Press
-
Y. Wang and C. Wang. Modeling the effects of timing parameters on virus propagation. In Proc. of the 2003 ACM Workshop on Rapid Malcode, pages 61-66. ACM Press, 2003.
-
(2003)
Proc. of the 2003 ACM Workshop on Rapid Malcode
, pp. 61-66
-
-
Wang, Y.1
Wang, C.2
-
24
-
-
0242539790
-
Heterogeneous networking: A new survivability paradigm
-
ACM Press
-
Y. Zhang, H. Vin, L. Alvisi, W. Lee, and S. K. Dao. Heterogeneous networking: a new survivability paradigm. In Proc. of the 2001 Workshop on New Security Paradigms, pages 33-39. ACM Press, 2001.
-
(2001)
Proc. of the 2001 Workshop on New Security Paradigms
, pp. 33-39
-
-
Zhang, Y.1
Vin, H.2
Alvisi, L.3
Lee, W.4
Dao, S.K.5
|