-
1
-
-
33846237226
-
-
Schneider, F. B., S. M. Bellovin, M. Branstad, J. R. Catoe, S. D. Crocker, C. Kaufman, S. T. Kent, J. C. Knight, S. McGeady, R. R. Nelson, A. M. Schiffman, G. A. Spix, and D. Tygar, Trust in Cyberspace. National Academy Press, 1999, Committee on Information Systems Trustworthiness, National Research Council.
-
Schneider, F. B., S. M. Bellovin, M. Branstad, J. R. Catoe, S. D. Crocker, C. Kaufman, S. T. Kent, J. C. Knight, S. McGeady, R. R. Nelson, A. M. Schiffman, G. A. Spix, and D. Tygar, Trust in Cyberspace. National Academy Press, 1999, Committee on Information Systems Trustworthiness, National Research Council.
-
-
-
-
2
-
-
33846236798
-
-
Buffer Overflows and Remote Root Exploits, Personal Communications, October
-
S. Bellovin, "Buffer Overflows and Remote Root Exploits", Personal Communications, October, 1999.
-
(1999)
-
-
Bellovin, S.1
-
5
-
-
84949505015
-
ITS4: A Static Vulnerability Scanner for C and C++ Code
-
New Orleans, Louisiana, December
-
th Annual Computer Security Applications Conference, New Orleans, Louisiana, December, 2000, pp.257-268.
-
(2000)
th Annual Computer Security Applications Conference
, pp. 257-268
-
-
Viega, J.1
Bloch, J.T.2
Kohno, T.3
McGraw, G.4
-
6
-
-
85084164558
-
Statically Detecting Likely Buffer Overflow Vulnerabilities
-
Washington D. C
-
D. Larochelle, and D. Evans, "Statically Detecting Likely Buffer Overflow Vulnerabilities", In USENIX Security Symposium, Washington D. C., 2001.
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
7
-
-
85081874807
-
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
-
February
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken, "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities", Network and Distributed System Security Symposium, February 2000.
-
(2000)
Network and Distributed System Security Symposium
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
8
-
-
17644371841
-
Bcc: Run-time Checking for C programs
-
California, USA
-
S.C. Kendall, "Bcc: Run-time Checking for C programs", USENIX Toronto 1983 Summer Conference Proceedings, USENIX Association, El. Cerito, California, USA, 1983.
-
(1983)
USENIX Toronto 1983 Summer Conference Proceedings, USENIX Association, El. Cerito
-
-
Kendall, S.C.1
-
9
-
-
0026845567
-
Adding Run-time Checking to the Portable C Compiler
-
J. L. Steffen, "Adding Run-time Checking to the Portable C Compiler", Software - Practice and Experence, 22(4), 1992, pp.305-316.
-
(1992)
Software - Practice and Experence
, vol.22
, Issue.4
, pp. 305-316
-
-
Steffen, J.L.1
-
10
-
-
0012582509
-
Backwards-compatible Bounds Checking for Arrays and Pointers in C Programs
-
R. W. M. Jones, and P. H. J.Kelly. "Backwards-compatible Bounds Checking for Arrays and Pointers in C Programs", Automated and Algorithmic Debugging, 1997, pp.13-26.
-
(1997)
Automated and Algorithmic Debugging
, pp. 13-26
-
-
Jones, R.W.M.1
Kelly, P.H.J.2
-
12
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks
-
San Antonio, TX, January
-
th USENIX Security Conference, San Antonio, TX, January, 1998, pp.63-77.
-
(1998)
th USENIX Security Conference
, pp. 63-77
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
14
-
-
23144443275
-
TXL - A Language for Programming Language Tools and Applications
-
December
-
J.R. Cordy, "TXL - A Language for Programming Language Tools and Applications", Proc. LDTA 2004, ACM 4th International Workshop on Language Descriptions, Tools and Applications, Electronic Notes in Theorectical Computer Science 110, December 2004, pp. 3-31.
-
(2004)
Proc. LDTA 2004, ACM 4th International Workshop on Language Descriptions, Tools and Applications, Electronic Notes in Theorectical Computer Science
, vol.110
, pp. 3-31
-
-
Cordy, J.R.1
-
15
-
-
33846260092
-
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, Invited talk at System Administration and Network Security (SANS) 2000.
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade", Invited talk at System Administration and Network Security (SANS) 2000.
-
-
-
-
16
-
-
1542592249
-
Smashing Stack for Fun and Profit
-
A. One, "Smashing Stack for Fun and Profit". www.insecure.org/stf/smashstack.txt.
-
-
-
One, A.1
-
17
-
-
4344593013
-
Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns
-
J. Pincus, and B. Baker, "Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns", IEEE Security & Privacy, Vol. 2, No. 4, 2004, pp.20-27.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
18
-
-
84951164021
-
HSML: Design Directed Source Code Hot Spots
-
Toronto, May
-
J.R. Cordy, K.A. Schneider, T.R. Dean, and A.J. Malton, "HSML: Design Directed Source Code Hot Spots", Proc. IWPC 2001 - IEEE 9th International Workshop on Program Comprehension, Toronto, May 2001, pp. 145-154.
-
(2001)
Proc. IWPC 2001 - IEEE 9th International Workshop on Program Comprehension
, pp. 145-154
-
-
Cordy, J.R.1
Schneider, K.A.2
Dean, T.R.3
Malton, A.J.4
-
19
-
-
0036783479
-
Source Transformation in Software Engineering Using the TXL Transformation System, Special Issue on Source code Analysis and Manipulation
-
J.R.Cordy, T. Dean, A. Malton, and K. Schneider, "Source Transformation in Software Engineering Using the TXL Transformation System", Special Issue on Source code Analysis and Manipulation. Journal of Information and Software Technology, 44(13), pp.827-837.
-
Journal of Information and Software Technology
, vol.44
, Issue.13
, pp. 827-837
-
-
Cordy, J.R.1
Dean, T.2
Malton, A.3
Schneider, K.4
-
20
-
-
33846197838
-
-
U.K. Government, Communications-Electronics Security Group, Network Defence Team, 2004
-
U.K. Government, Communications-Electronics Security Group, Network Defence Team, 2004
-
-
-
-
21
-
-
0242302679
-
Agile Parsing in TXL
-
October
-
T.R. Dean, J.R. Cordy, A.J. Malton, and K.A. Schneider, "Agile Parsing in TXL", Journal of Automated Software Engineering 10, 4, October 2003, pp.311-336.
-
(2003)
Journal of Automated Software Engineering
, vol.10
, Issue.4
, pp. 311-336
-
-
Dean, T.R.1
Cordy, J.R.2
Malton, A.J.3
Schneider, K.A.4
-
22
-
-
84944558150
-
Using Program Transformation to Secure C Programs Against Buffer Overflows
-
British Columbia, Canada, November
-
th Working Conference on Reverse Engineering, British Columbia, Canada, November, 2003, pp.323-332.
-
(2003)
th Working Conference on Reverse Engineering
, pp. 323-332
-
-
Dahn, C.1
Mancoridis, S.2
-
23
-
-
33846191032
-
Syntax-based Vulnerability Testing of Frame-based Network Protocols
-
Fredericton, Canada, October
-
O. Tal, S. Knight, and T. R. Dean, "Syntax-based Vulnerability Testing of Frame-based Network Protocols", Proc. 2nd Annual Conference on Privacy, Security and Trust, Fredericton, Canada, October 2004, pp.155-160.
-
(2004)
Proc. 2nd Annual Conference on Privacy, Security and Trust
, pp. 155-160
-
-
Tal, O.1
Knight, S.2
Dean, T.R.3
-
24
-
-
18144364355
-
Imposing Order on Program Statements and its implication to AV Scanners
-
Delft, Netherlands, November
-
th Working Conference on Reverse Engineering, Delft, Netherlands, November, 2004, pp. 161-170.
-
(2004)
th Working Conference on Reverse Engineering
, pp. 161-170
-
-
Lakhotia, A.1
Mohhammed, M.2
-
25
-
-
18144431021
-
Virus Analysis: Techniques, Tools, and Research Issues Tutorial
-
Delft, Netherlands, November
-
th Working Conference on Reverse Engineering, Delft, Netherlands, November, 2004, pp.2.
-
(2004)
th Working Conference on Reverse Engineering
, pp. 2
-
-
Lakhotia, A.1
Pathak, P.2
-
26
-
-
18144367760
-
Updating Legacy Databases Through Wrappers: Data Consistency Management
-
Delft, Netherlands, November
-
th Working Conference on Reverse Engineering, Delft, Netherlands, November, 2004, pp.58-67.
-
(2004)
th Working Conference on Reverse Engineering
, pp. 58-67
-
-
Thiran, P.1
Houben, G.-J.2
Hainaut, J.-L.3
Benslimane, D.4
-
27
-
-
18144394348
-
Identifying Aspects Using Fan-in Analysis
-
Delft, Netherlands, November
-
th Working Conference on Reverse Engineering, Delft, Netherlands, November, 2004, pp.132-141.
-
(2004)
th Working Conference on Reverse Engineering
, pp. 132-141
-
-
Marin, M.1
van Deursen, A.2
Moonen, L.3
-
28
-
-
33846247812
-
-
http://lists.virus.org/dailydave-0311/msg00020.html.
-
-
-
-
29
-
-
24644436530
-
Checking Memory Safety with Blast
-
Proc Fundamental Approaches to Software Engineering, Edinburgh, Scotland, April
-
D. Beyer, T. H. Henzinger, R. Jhala, and R. Majumdar, "Checking Memory Safety with Blast", Proc Fundamental Approaches to Software Engineering, LNCS 3442, Edinburgh, Scotland, April, 2005, pp. 2-18.
-
(2005)
LNCS
, vol.3442
, pp. 2-18
-
-
Beyer, D.1
Henzinger, T.H.2
Jhala, R.3
Majumdar, R.4
-
30
-
-
18744377808
-
CCured: Type-safe Retrofitting of Legacy Code
-
Lang, Portland, January
-
G. C. Necula, S. McPeak, and W. Weimer, "CCured: Type-safe Retrofitting of Legacy Code", Proc Principles of Program. Lang., Portland, January, 2002, pp. 49-61.
-
(2002)
Proc Principles of Program
, pp. 49-61
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
|