-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
November
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), November 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
3
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
5
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
6
-
-
84922924370
-
-
CyberCrime. http://www.ssg-inc.net/cyber.crime/cyber.crime.html.
-
CyberCrime
-
-
-
7
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7):504-513, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
9
-
-
84955507265
-
Caches and hash trees for efficient memory integrity verification
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and Hash Trees for Efficient Memory Integrity Verification. In Proceedings of the Ninth Annual Symposium on High Performance Computer Architecture, 2003.
-
(2003)
Proceedings of the Ninth Annual Symposium on High Performance Computer Architecture
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
11
-
-
84859281942
-
-
iDefense. http://www.idefense.com/advisory/01.28.03.txt.
-
-
-
-
13
-
-
0017971337
-
A language extension for expressing constraints on data access
-
A. K. Jones and B. H. Liskov. A language extension for expressing constraints on data access. Commun. ACM, 21(5):358-367, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.K.1
Liskov, B.H.2
-
16
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
D. Larochelle and D. Evans. Statically Detecting Likely Buffer Overflow Vulnerabilities. In USENIX Security Symposium, 2001.
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
19
-
-
0034445599
-
Architectual support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. B. J. Mitchell, and M. Horowitz. Architectual support for copy and tamper resistant software. In Proceedings of the 9th Symposium on Architectural Support for Programming Languages and Operating Systems, 2000.
-
(2000)
Proceedings of the 9th Symposium on Architectural Support for Programming Languages and Operating Systems
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Mitchell, D.B.J.5
Horowitz, M.6
-
20
-
-
84859279608
-
-
MITRE, http://cve.mitre.org/.
-
-
-
-
21
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
27
-
-
84859281935
-
-
SecurityResponse. http://securityresponse.symantec.com/.
-
-
-
-
30
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
E. G. Suh, D. Clarke, M. van Dijk, B. Gassend, and S.Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing . In Proceedings of The Int'l Conference on Supercomputing, 2003.
-
(2003)
Proceedings of the Int'l Conference on Supercomputing
-
-
Suh, E.G.1
Clarke, D.2
Van Dijk, M.3
Gassend, B.4
Devadas, S.5
-
31
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In Proceedings of the 37th International Symposium on Microarchitecture, 2004.
-
(2004)
Proceedings of the 37th International Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
32
-
-
84859281931
-
-
VirusLibarary. http://www.viruslibrary.com/.
-
-
-
-
35
-
-
84859274465
-
-
www.ncipher.com.
-
-
-
|