-
1
-
-
33845943977
-
-
NIST, National, May
-
NIST, National Vunerability Database. http://nvd.nist.gov, May 2006.
-
(2006)
Vunerability Database
-
-
-
2
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks (Libsafe -Libverify)
-
San Diego, California, USA, Jun
-
A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing attacks (Libsafe -Libverify). In Proc. of 2000 USENIX Annual Technical Conference, San Diego, California, USA, Jun. 2000.
-
(2000)
Proc. of 2000 USENIX Annual Technical Conference
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
3
-
-
33845924363
-
-
TIS Tool Interface Standards, Executable and Linkable Format Specification, UNIX System Laboratories
-
TIS (Tool Interface Standards). Executable and Linkable Format Specification, UNIX System Laboratories.
-
-
-
-
7
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proc. of the 7th USENIX Security Symposium, Jan. 1998.
-
(1998)
Proc. of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
8
-
-
29144477245
-
SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address
-
Technical Report, Purdue University, Dec
-
H. Ozdoganoglu, T. Vijaykumar, C. E. Brodley, A. Jalote. SmashGuard: A Hardware Solution to Prevent Security Attacks on the Function Return Address. Technical Report, Purdue University, Dec. 2002.
-
(2002)
-
-
Ozdoganoglu, H.1
Vijaykumar, T.2
Brodley, C.E.3
Jalote, A.4
-
9
-
-
21644489172
-
Enlisting Hardware Architecture to Thwart Malicious Code Injection
-
Boppard, Germany, Mar
-
R. Lee, D. Karig, J. McGregor and Z. Shi. Enlisting Hardware Architecture to Thwart Malicious Code Injection. Security in Pervasive Computing, Boppard, Germany, Mar. 2003.
-
(2003)
Security in Pervasive Computing
-
-
Lee, R.1
Karig, D.2
McGregor, J.3
Shi, Z.4
-
11
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Washington DC, USA, Aug
-
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In Proc. of the 2001 USENIX Security Symposium, Washington DC, USA, Aug. 2001.
-
(2001)
Proc. of the 2001 USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
17
-
-
3543086916
-
Formalizing Sensitivity in Static Analysis for Intrusion Detection
-
May
-
H. Feng, J. Giffin, Y. Huang, S. Jha, W. Lee, and B. Miller. Formalizing Sensitivity in Static Analysis for Intrusion Detection. In Proc. of IEEE Symposium on Security and Privacy, May 2004.
-
(2004)
Proc. of IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
18
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Oct
-
E.G. Barrantes, D.H. Ackley, S. Forrest, T. Palmer, D. Stefanovic and D. Zoviet. Randomized instruction set emulation to disrupt binary code injection attacks. InProceedings of the 10th ACM Conference on Computer and Communication Security, Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.4
Stefanovic, D.5
Zoviet, D.6
|