-
2
-
-
85077599568
-
-
June
-
Apache security bulletin. http://httpd.apache.org/info/security_bulletin_20020617.txt, June 2002.
-
(2002)
Apache Security Bulletin
-
-
-
4
-
-
3042742908
-
An analysis of the slapper worm
-
ARCE, I., AND LEVY, E. An analysis of the slapper worm. IEEE Security and Privacy 1, 1 (2003), 82–87.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
5
-
-
78249276668
-
-
LISA USENIX
-
BEATTIE, S., ARNOLD, S., COWAN, C., WAGLE, P., WRIGHT, C., AND SHOSTACK, A. Timing the application of security patches for optimal uptime. In LISA (2002), USENIX, pp. 233–242.
-
(2002)
Timing the Application of Security Patches for Optimal Uptime
, pp. 233-242
-
-
Beattie, S.1
Arnold, S.2
Cowan, C.3
Wagle, P.4
Wright, C.5
Shostack, A.6
-
6
-
-
0035390859
-
Lessons from giant-scale services
-
Aug
-
BREWER, E. Lessons from giant-scale services. In IEEE Internet Computing (Aug. 2001).
-
(2001)
IEEE Internet Computing
-
-
Brewer, E.1
-
7
-
-
80053199674
-
Microreboot - A technique for cheap recovery
-
Dec
-
CANDEA, G., KAWAMOTO, S., FUJIKI, Y., FRIEDMAN, G., AND FOX, A. Microreboot - a technique for cheap recovery. In Proceedings of the 6th Operating System Design and Implementation (Dec. 2004), pp. 31–44.
-
(2004)
Proceedings of the 6th Operating System Design and Implementation
, pp. 31-44
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
11
-
-
4544285425
-
Towards a self-managing software patching process using persistent-state manifests
-
DUNAGAN, J., ROUSSEV, R., DANIELS, B., JOHNSON, A., VERBOWSKI, C., AND WANG, Y.-M. Towards a self-managing software patching process using persistent-state manifests. In International Conference on Autonomic Computing (ICAC) 2004 (2004).
-
(2004)
International Conference on Autonomic Computing (ICAC) 2004
-
-
Dunagan, J.1
Roussev, R.2
Daniels, B.3
Johnson, A.4
Verbowski, C.5
Wang, Y.-M.6
-
12
-
-
85077582855
-
-
FREE SOFTWARE FOUNDATION, INC. Boston, MA, USA
-
FREE SOFTWARE FOUNDATION, INC. UsingtheGNUCompiler Collection. Boston, MA, USA, 2004.
-
(2004)
UsingtheGNUCompiler Collection
-
-
-
13
-
-
85077588318
-
-
GOBBLES SECURITY
-
GOBBLES SECURITY. Apache “scalp” exploit. http://www.hackindex.org/boletin/0602/apache-scalp.c.
-
Apache “Scalp” Exploit
-
-
-
14
-
-
0027657795
-
On-line software version change using state transfer between processes
-
GUPTA, D., AND JALOTE, P. On-line software version change using state transfer between processes. Softw., Pract. Exper. 23, 9 (1993), 949–964.
-
(1993)
Softw., Pract. Exper.
, vol.23
, Issue.9
, pp. 949-964
-
-
Gupta, D.1
Jalote, P.2
-
15
-
-
0000967507
-
A formal framework for on-line software version change
-
GUPTA, D., JALOTE, P., AND BARUA, G. A formal framework for on-line software version change. IEEE Trans. Softw. Eng. 22, 2 (1996), 120–131.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.2
, pp. 120-131
-
-
Gupta, D.1
Jalote, P.2
Barua, G.3
-
16
-
-
0034833913
-
Dynamic software updating
-
ACM Press
-
HICKS, M., MOORE, J. T., AND NETTLES, S. Dynamic software updating. In PLDI’01: Proceedings of the ACM SIGPLAN 2001 conference on Programming language design and implementation (2001), ACM Press, pp. 13–23.
-
(2001)
PLDI’01: Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation
, pp. 13-23
-
-
Hicks, M.1
Moore, J.T.2
Nettles, S.3
-
18
-
-
85077540904
-
-
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION. International Organization for Standardization, Geneva, Switzerland
-
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION. ISO/IEC9899:1990: Programminglanguages—C. International Organization for Standardization, Geneva, Switzerland, 1990.
-
(1990)
ISO/IEC9899:1990: Programminglanguages—C
-
-
-
21
-
-
84959039613
-
CIL: Intermediate language and tools for analysis and transformations of c programs
-
NECULA, G. C., MCPEAK, S., RAHUL, S. P., AND WEIMER, W. Cil: Intermediate language and tools for analysis and transformations of c programs. In Proceedings of the 11th International Conference on Compiler Construction (2002), pp. 213–228.
-
(2002)
Proceedings of the 11th International Conference on Compiler Construction
, pp. 213-228
-
-
Necula, G.C.1
McPeak, S.2
Rahul, S.P.3
Weimer, W.4
-
22
-
-
0003673089
-
Monsters in a box
-
PESCOBITZ, D. Monsters in a box. Wired 8, 12 (2000), 341–347.
-
(2000)
Wired
, vol.8
, Issue.12
, pp. 341-347
-
-
Pescobitz, D.1
-
23
-
-
84962435308
-
Security holes . . . Who cares?
-
Washington, D.C., August
-
RESCORLA, E. Security holes . . . who cares? In 12th Usenix Security Symposium (Washington, D.C., August 2003), pp. 75–90.
-
(2003)
12th Usenix Security Symposium
, pp. 75-90
-
-
Rescorla, E.1
-
25
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, D.C., Aug
-
SHANKAR, U., TALWAR, K., FOSTER, J. S., AND WAGNER, D. Detecting Format String Vulnerabilities with Type Qualifiers. In Proceedings of the 10th Usenix Security Symposium (Washington, D.C., Aug. 2001).
-
(2001)
Proceedings of the 10th Usenix Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
26
-
-
17044375350
-
Mutatis mutandis: Safe and predictable dynamic software updating
-
STOYLE, G., HICKS, M., BIERMAN, G., SEWELL, P., AND NEAMTIU, L. Mutatis mutandis: Safe and predictable dynamic software updating. In Proceedings of the 32nd ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (2005), pp. 183–194.
-
(2005)
Proceedings of the 32nd ACM SIGPLANSIGACT Symposium on Principles of Programming Languages
, pp. 183-194
-
-
Stoyle, G.1
Hicks, M.2
Bierman, G.3
Sewell, P.4
Neamtiu, L.5
-
27
-
-
22944433043
-
-
THE SOFTWARE DEVELOPMENT LIFE CYCLE TASK FORCE, S. A. Tech. rep., National Cyber Security Partnership, April
-
THE SOFTWARE DEVELOPMENT LIFE CYCLE TASK FORCE, S. A. Improving security across the software development lifecycle. Tech. rep., National Cyber Security Partnership, April 2004.
-
(2004)
Improving Security across the Software Development Lifecycle
-
-
-
32
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
Aug
-
WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In Proceedings of SIGCOMM’04 (Aug. 2004).
-
(2004)
Proceedings of SIGCOMM’04
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
|