-
1
-
-
0032681509
-
A core calculus of dependency
-
ACM Press
-
M. Abadi, A. Banerjee, N. Heintze, and J. G. Riecke. A core calculus of dependency. In Proc. 26th Annual ACM Symposium on Principles of Programming Languages (POPL'99), pages 147-160. ACM Press, 1999.
-
(1999)
Proc. 26th Annual ACM Symposium on Principles of Programming Languages (POPL'99)
, pp. 147-160
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.G.4
-
2
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Proc. 21th Annual International Cryptology Conference CRYPTO'01, of, Springer-Verlag
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Proc. 21th Annual International Cryptology Conference (CRYPTO'01), volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
3
-
-
16644362894
-
Randomized instruction set emulation
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovic. Randomized instruction set emulation. ACM Transactions on Information and System Security, pages 3-40, 2005.
-
(2005)
ACM Transactions on Information and System Security
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
4
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
ACM Press
-
E. G. Barrantes, D. H. Ackley, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proc. 10th ACM Conference on Computer and Communications Security (CCS'03), pages 281-289. ACM Press, 2003.
-
(2003)
Proc. 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Stefanovic, D.4
Zovi, D.D.5
-
5
-
-
33947680249
-
DieHard: Probabilistic memory safety for unsafe languages
-
05-65, University of Massachusetts Amherst
-
E. D. Berger and B. G. Zorn. DieHard: Probabilistic memory safety for unsafe languages. Department of Computer Science Technical Report 05-65, University of Massachusetts Amherst, 2005.
-
(2005)
Department of Computer Science Technical Report
-
-
Berger, E.D.1
Zorn, B.G.2
-
6
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proc. 12th USENIX Security Symposium, pages 105-120, 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
7
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
02-197, School of Computer Science, Carnegie Mellon University
-
M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS 02-197, School of Computer Science, Carnegie Mellon University, 2002.
-
(2002)
Technical Report CMU-CS
-
-
Chew, M.1
Song, D.2
-
9
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Expo (DISCEX), 2000.
-
(2000)
DARPA Information Survivability Conference and Expo (DISCEX)
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
12
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In Proc. USENIX Annual Technical Conference, pages 275-288, 2002.
-
(2002)
Proc. USENIX Annual Technical Conference
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
16
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, 2(4):20-27, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
17
-
-
33947699918
-
Independence from obfuscation: A semantic framework for diversity
-
Technical Report 2006-2016, Computer Science Department, Cornell University
-
R. Pucella and F. B. Schneider. Independence from obfuscation: A semantic framework for diversity. Technical Report 2006-2016, Computer Science Department, Cornell University, 2006.
-
(2006)
-
-
Pucella, R.1
Schneider, F.B.2
-
18
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM Press
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proc. 11th ACM Conference on Computer and Communications Security (CCS'04), pages 298-307. ACM Press, 2004.
-
(2004)
Proc. 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
|