-
1
-
-
84878558984
-
Protection in programming-language translations
-
K.G. Larsen, S. Skyum, and G. Winskel, editors Proceedings of the 25th International Colloquium on Automata, Languages and Programming, Springer-Verlag
-
M. Abadi. Protection in programming-language translations. In K.G. Larsen, S. Skyum, and G. Winskel, editors, Proceedings of the 25th International Colloquium on Automata, Languages and Programming, volume 1443 of Lecture Notes in Computer Science, pages 868-883. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 868-883
-
-
Abadi, M.1
-
3
-
-
33646767376
-
Control-flow integrity: Principles, implementations, and applications
-
A preliminary version appears as Microsoft Research Technical Report MSR-TR-05-18, February 2005
-
M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In Proceedings of the ACM Conference on Computer and Communications Security, 2005. A preliminary version appears as Microsoft Research Technical Report MSR-TR-05-18, February 2005.
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
5
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the Usenix Security Symposium, pages 63-78, 1998.
-
(1998)
Proceedings of the Usenix Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
7
-
-
0005486528
-
A syntactic approach to foundational proof-carrying code
-
Dept. of Computer Science, Yale University
-
N. Hamid, Z. Shao, V. Trifonov, S. Monnier, and Z, Ni. A Syntactic Approach to Foundational Proof-Carrying Code. Technical Report YALEU/DCS/TR-1224, Dept. of Computer Science, Yale University, 2002.
-
(2002)
Technical Report
, vol.YALEU-DCS-TR-1224
-
-
Hamid, N.1
Shao, Z.2
Trifonov, V.3
Monnier, S.4
Ni, Z.5
-
8
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
February
-
J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, February 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
10
-
-
0041525084
-
From System F to typed assembly language
-
G. Morrisett, D. Walker, K. Crary, and N. Glew. From System F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):527-568, 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.21
, Issue.3
, pp. 527-568
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
12
-
-
84858867819
-
-
PaX Project. The PaX project, 2004. http://pax.grsecurity.net/.
-
(2004)
-
-
-
13
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20-27, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
15
-
-
14844328033
-
On the effectiveness of address-space randomization
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the ACM Conference on Computer and Communications Security, pages 298-307, 2004.
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
16
-
-
0004349103
-
Vulcan: Binary transformation in a distributed environment
-
Microsoft Research
-
A. Srivastava, A. Edwards, and H. Vo. Vulcan: Binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, Microsoft Research, 2001.
-
(2001)
Technical Report
, vol.MSR-TR-2001-50
-
-
Srivastava, A.1
Edwards, A.2
Vo, H.3
-
17
-
-
0004090434
-
ATOM: A system for building customized program analysis tools
-
Digital Equipment Corporation
-
A. Srivastava and A. Eustace. ATOM: A system for building customized program analysis tools. Technical Report WRL Research Report 94/2, Digital Equipment Corporation, 1994.
-
(1994)
Technical Report WRL Research Report
, vol.94
, Issue.2
-
-
Srivastava, A.1
Eustace, A.2
-
18
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G.E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, 2004.
-
(2004)
Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
19
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T.E. Anderson, and S.L. Graham. Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review, 27(5):203-216, 1993.
-
(1993)
ACM SIGOPS Operating Systems Review
, vol.27
, Issue.5
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
|