-
1
-
-
33845872882
-
-
CVE: Common Vulnerabilities and Exposures. http://www.cve.mitre.org/.
-
-
-
-
2
-
-
84860089604
-
-
PaX Team
-
PaX Team, Non Executable Data Pages. http://pageexec.virtualave.net/ pageexec.txt.
-
Non Executable Data Pages
-
-
-
3
-
-
84881146783
-
-
Solar Designer
-
Solar Designer, Non-executable User Stack. http://www.openwall.com/linux/ .
-
Non-executable User Stack
-
-
-
5
-
-
33845888333
-
Aleph one. Smashing the stack for fun and profit
-
November
-
Aleph One. Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
-
8
-
-
0026869660
-
Virtual checkpoints: Architecture and performance
-
N. S. Bowen and D. K. Pradhan. Virtual Checkpoints: Architecture and Performance. IEEE Transactions on Computers, 41(5):516-525, 1992.
-
(1992)
IEEE Transactions on Computers
, vol.41
, Issue.5
, pp. 516-525
-
-
Bowen, N.S.1
Pradhan, D.K.2
-
9
-
-
80053199674
-
Microreboot - A technique for cheap recovery
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot - A Technique for Cheap Recovery. In Proc. 6th Symposium on Operating Systems Design and Implementation, 2004.
-
(2004)
Proc. 6th Symposium on Operating Systems Design and Implementation
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
12
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the 7th USENIX Security Symposium, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
14
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
February
-
T. Garfinkel and M. Rosenblum. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In In Proc. Net. and Distributed Sys. Sec. Sym, February 2003.
-
(2003)
Proc. Net. and Distributed Sys. Sec. Sym
-
-
Garfinkel, T.1
Rosenblum, M.2
-
15
-
-
0038346239
-
Transient-fault recovery for chip multiprocessors
-
M. Gomaa, C. Scarbrough, T. N. Vijaykumar, and I. Pomeranz. Transient-Fault Recovery for Chip Multiprocessors. In Proceedings of the 30th annual International Symposium on Computer Architecture, pages 98-109, 2003.
-
(2003)
Proceedings of the 30th Annual International Symposium on Computer Architecture
, pp. 98-109
-
-
Gomaa, M.1
Scarbrough, C.2
Vijaykumar, T.N.3
Pomeranz, I.4
-
22
-
-
33845880476
-
Online blackmail grows
-
Mar
-
D. Neal. Online Blackmail Grows. In IT Week, 08, Mar 2005.
-
(2005)
IT Week
, vol.8
-
-
Neal, D.1
-
27
-
-
84906497159
-
Building a reactive immune system for software services
-
April
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a Reactive Immune System for Software Services. In Proceedings of the USENIX Annual Technical Conference, pages 149-161, April 2005.
-
(2005)
Proceedings of the USENIX Annual Technical Conference
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
|