-
1
-
-
34247333250
-
-
PaX. http://pax.grsecurity.net/.
-
PaX. http
-
-
-
2
-
-
84960830448
-
Intrusion detection: Randomized instruction set emulation to disrupt binary code injection attacks
-
October
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Intrusion detection: Randomized instruction set emulation to disrupt binary code injection attacks. In 10th ACM International Conference on Computer and Communications Security (CCS), October 2003.
-
(2003)
10th ACM International Conference on Computer and Communications Security (CCS)
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
3
-
-
16644362894
-
Randomized instruction set emulation
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovic. Randomized instruction set emulation. ACM Transactions on Information and System Security, 8(1):3-40, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
7
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Technical report, Carnegie Mellon University
-
M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical report, Carnegie Mellon University, 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
11
-
-
0034486891
-
The Mathematics of Infectious Diseases
-
H. W. Hethcote. The Mathematics of Infectious Diseases. SIAM Review, 42(4):599-653, 2000.
-
(2000)
SIAM Review
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
16
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
March
-
D. Moore, V. Paxson, C. Shannon, G. M. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In Proceedings of IEEE INFOCOM, March 2003.
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Moore, D.1
Paxson, V.2
Shannon, C.3
Voelker, G.M.4
Savage, S.5
-
17
-
-
0742276097
-
Inside the Slammer worm
-
July
-
D. Moore, S. Savage, C. Shannon, S. Stanilbrd, and N. Weaver. Inside the Slammer worm. IEEE Security and Privacy, July 2003.
-
(2003)
IEEE Security and Privacy
-
-
Moore, D.1
Savage, S.2
Shannon, C.3
Stanilbrd, S.4
Weaver, N.5
-
20
-
-
56349146235
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Technical Report CMU-CS-04-140, Carnegie Mellon University
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. Technical Report CMU-CS-04-140, Carnegie Mellon University, 2004.
-
(2004)
-
-
Newsome, J.1
Song, D.2
-
22
-
-
14944359480
-
A hybrid quarantine defense
-
Washington, DC, USA
-
P. Porras, L. Briesemeister, K. Skinner, K. Levitt, J. Rowe, arid Y.-C. A. Ting. A hybrid quarantine defense. In Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM), Washington, DC, USA, 2004.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM)
-
-
Porras, P.1
Briesemeister, L.2
Skinner, K.3
Levitt, K.4
Rowe, J.5
arid, Y.-C.6
Ting, A.7
-
23
-
-
14844328033
-
On the effectiveness of address-space randomization
-
October
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security, October 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
26
-
-
84906818067
-
Where's the feeb? the effectiveness of instruction set randomization
-
August
-
N. Sovarel, D. Evans, and N. Paul. Where's the feeb? the effectiveness of instruction set randomization. In 14th USENIX Security Symposium, August 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Sovarel, N.1
Evans, D.2
Paul, N.3
-
30
-
-
27644552867
-
Transparent runtime randomization for security
-
Technical report, Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May
-
J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. Technical report, Center for Reliable and Higher Performance Computing, University of Illinois at Urbana-Champaign, May 2003.
-
(2003)
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
|