-
1
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
Yokohama, Japan, June, IEEE Computer Society
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating Memory Corruption Attacks via Pointer Taintedness Detection. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), pages 378-387, Yokohama, Japan, June 2005. IEEE Computer Society.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks (DSN)
, pp. 378-387
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
2
-
-
85084161775
-
FormatGuard: Automatic Protection from printf Format String Vulnerabilities
-
Washington, DC, USA, Aug, USENIX
-
C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, and J. Lokier. FormatGuard: Automatic Protection from printf Format String Vulnerabilities. In Proceedings of the Tenth Usenix Security Symposium, Washington, DC, USA, Aug. 2001. USENIX.
-
(2001)
Proceedings of the Tenth Usenix Security Symposium
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
3
-
-
31744434551
-
An expressive aspect language for system applications with Arachne
-
Chicago, IL, USA, Mar, ACM Press
-
R. Douence, T. Fritz, N. Loriant, J.-M. Menaud, M. Ségura- Devillechaise, and M. Südholt. An expressive aspect language for system applications with Arachne. In Proceedings of the Fourth International Conference on Aspect-Oriented Software Development (AOSD), pages 27-38, Chicago, IL, USA, Mar. 2005. ACM Press.
-
(2005)
Proceedings of the Fourth International Conference on Aspect-Oriented Software Development (AOSD)
, pp. 27-38
-
-
Douence, R.1
Fritz, T.2
Loriant, N.3
Menaud, J.-M.4
Ségura- Devillechaise, M.5
Südholt, M.6
-
5
-
-
33847274246
-
-
R. W. M. Jones and P. H. J. Kelly. Backward-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automated and Algorithmic Debugging (AADEBUG), pages 13-26, Linköping, Sweden, May 1997.
-
R. W. M. Jones and P. H. J. Kelly. Backward-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automated and Algorithmic Debugging (AADEBUG), pages 13-26, Linköping, Sweden, May 1997.
-
-
-
-
6
-
-
33847320183
-
-
D. Kegel, dkftpbench. http://www.kegel.com/dkftpbench/.
-
D. Kegel, dkftpbench. http://www.kegel.com/dkftpbench/.
-
-
-
-
7
-
-
33847306025
-
Software Security Patches - Audit, Deployment and Hot Update
-
Chicago, IL, USA, Mar
-
N. Loriant, M. Ségura-Devillechaise, and J.-M. Menaud. Software Security Patches - Audit, Deployment and Hot Update. In Proceedings of the Fourth AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), pages 25-29, Chicago, IL, USA, Mar. 2005.
-
(2005)
Proceedings of the Fourth AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS)
, pp. 25-29
-
-
Loriant, N.1
Ségura-Devillechaise, M.2
Menaud, J.-M.3
-
8
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
Dec
-
Nergal. The advanced return-into-lib(c) exploits: PaX case study. Phrack, 11(58), Dec 2001.
-
(2001)
Phrack
, vol.11
, Issue.58
-
-
Nergal1
-
9
-
-
33847272647
-
-
PaX Project, Mar
-
PaX Project. Address space layout randomization, Mar 2003. http://pageexec.virtualave.net/docs/aslr.txt.
-
(2003)
Address space layout randomization
-
-
-
10
-
-
0003673089
-
Monster in a box
-
Dec
-
D. Pescovitz. Monster in a box. Wired, 8(12), Dec. 2000.
-
(2000)
Wired
, vol.8
, Issue.12
-
-
Pescovitz, D.1
-
11
-
-
84906487819
-
Enchancing Server Availability and Security through Failure-Oblivious Computing
-
San Francisco, CA, Dec, USENIX
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee Jr. Enchancing Server Availability and Security through Failure-Oblivious Computing. In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI), pages 303-316, San Francisco, CA, Dec. 2004. USENIX.
-
(2004)
Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 303-316
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee Jr., W.S.6
-
12
-
-
4344627335
-
The spread of the witty worm
-
July/Aug
-
C. Shannon and D. Moore. The spread of the witty worm. IEEE Security & Privacy, 2(4):46-50, July/Aug. 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
13
-
-
33847295754
-
-
Solar Designer. Getting around non-executable stack (and fix). Bugtraq Mailing List, Aug 1997.
-
Solar Designer. Getting around non-executable stack (and fix). Bugtraq Mailing List, Aug 1997.
-
-
-
-
14
-
-
84888844330
-
-
Sun Microsystems Inc
-
Sun Microsystems Inc. The Java HotSpot™ Technology. http://Java.sun.com/products/hotspot/.
-
The Java HotSpot™ Technology
-
-
|