-
1
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In: Network and Distributed System Security Symposium. (2000) 3-17
-
(2000)
Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One: Smashing the stack for fun and profit. Phrack 7 (1996)
-
(1996)
Phrack
, vol.7
-
-
-
3
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overflows
-
Pincus, J., Baker, B.: Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overflows. IEEE Security & Privacy 2 (2004) 20-27
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
4
-
-
12844286929
-
The shellcode generation
-
Arce, I.: The Shellcode Generation. IEEE Security & Privacy 2 (2004) 72-76
-
(2004)
IEEE Security & Privacy
, vol.2
, pp. 72-76
-
-
Arce, I.1
-
5
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
th USENIX Security Symposium. (1998)
-
(1998)
th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
6
-
-
7244258833
-
New chips stop buffer overflow attacks
-
Garber, L.: New Chips Stop Buffer Overflow Attacks. IEEE Computer 37 (2004) 28
-
(2004)
IEEE Computer
, vol.37
, pp. 28
-
-
Garber, L.1
-
10
-
-
30344459996
-
Countering network worms through automatic patch generation
-
to appear
-
Sidiroglou, S., Keromytis, A.D.: Countering Network Worms Through Automatic Patch Generation. IEEE Security & Privacy (2005) (to appear).
-
(2005)
IEEE Security & Privacy
-
-
Sidiroglou, S.1
Keromytis, A.D.2
-
16
-
-
1442288535
-
Automatic detection and repair of errors in data structures
-
Demsky, B., Rinard, M.C.: Automatic Detection and Repair of Errors in Data Structures. In: Proceedings of the 18th Annual ACM S1GPLAN Conference on Object-Oriented Programming, Systems, Languages, and Application (OOPSLA). (2003)
-
(2003)
Proceedings of the 18th Annual ACM S1GPLAN Conference on Object-Oriented Programming, Systems, Languages, and Application (OOPSLA)
-
-
Demsky, B.1
Rinard, M.C.2
-
17
-
-
0035703918
-
Recursive restartability: Turning the reboot sledgehammer into a scalpel
-
Schloss Elman, Germany, IEEE Computer Society
-
Candea, G., Fox, A.: Recursive restartability: Turning the reboot sledgehammer into a scalpel. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elman, Germany, IEEE Computer Society (2001) 110-115
-
(2001)
Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII)
, pp. 110-115
-
-
Candea, G.1
Fox, A.2
-
20
-
-
3042781457
-
Crossover: Online pests plaguing the offline world
-
Levy, E.: Crossover: Online Pests Plaguing the Offline World. IEEE Security & Privacy 1 (2003) 71-73
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 71-73
-
-
Levy, E.1
-
21
-
-
33645264610
-
Hunting for metamorphic
-
Symantec Corporation
-
Ször, P., Ferrie, P.: Hunting for Metamorphic. Technical report, Symantec Corporation (2003)
-
(2003)
Technical Report
-
-
Ször, P.1
Ferrie, P.2
-
23
-
-
4544239482
-
Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
-
Pasupulati, A., Coit, J., Levitt, K., Wu, S., Li, S., Kuo, J., Fan, K.: Buttercup: On Network-based Detection of Polymorphic Buffer Overflow Vulnerabilities. In: Proceedings of the Network Operations and Management Symposium (NOMS). (2004) 235-248, vol. 1
-
(2004)
Proceedings of the Network Operations and Management Symposium (NOMS)
, vol.1
, pp. 235-248
-
-
Pasupulati, A.1
Coit, J.2
Levitt, K.3
Wu, S.4
Li, S.5
Kuo, J.6
Fan, K.7
-
28
-
-
26444511823
-
Countering network worms through automatic patch generation
-
Columbia University
-
Sidiroglou, S., Keromytis, A.: Countering network worms through automatic patch generation. Technical Report CUCS-029-03, Columbia University (2003)
-
(2003)
Technical Report
, vol.CUCS-029-03
-
-
Sidiroglou, S.1
Keromytis, A.2
|