-
1
-
-
0041350423
-
Design and Implementation of a Distributed Virtual Machine for Networked Computers
-
Kiawah Island, South Carolina, December
-
Emin Gün Sirer, etc, Design and Implementation of a Distributed Virtual Machine for Networked Computers. In Proceedings of the Seventeenth Symposium on Operating Systems Principles, pages 202-216, Kiawah Island, South Carolina, December 1999.
-
(1999)
Proceedings of the Seventeenth Symposium on Operating Systems Principles
, pp. 202-216
-
-
Gün Sirer, E.1
etc2
-
2
-
-
2642520196
-
A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks
-
San Antonio, TX, June
-
M. Prasad and T. Chiueh, A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks, Proceedings of Usenix Annual Technical Conference, San Antonio, TX, June 2003
-
(2003)
Proceedings of Usenix Annual Technical Conference
-
-
Prasad, M.1
Chiueh, T.2
-
4
-
-
0000596666
-
Purify: A tool for detecting memory leaks and access errors in C and C++ programs
-
Berkeley, CA, January
-
R. Hastings and B. Joyce, Purify: A tool for detecting memory leaks and access errors in C and C++ programs, Proceedings of the Winter 1992USENIX Conference, Berkeley, CA, January 1992, pp 125-138.
-
(1992)
Proceedings of the Winter 1992USENIX Conference
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
5
-
-
0012889295
-
A Language-Based Approach to Security
-
F. B. Schneider, etc, A Language-Based Approach to Security, Informatics, 2001, pp. 86-101.
-
(2001)
Informatics
, pp. 86-101
-
-
Schneider, F.B.1
etc2
-
6
-
-
0033724116
-
IRM Enforcement of Java Stack Inspection
-
Oakland, California, May
-
U. Erlingsson, F. B. Schneider, IRM Enforcement of Java Stack Inspection, IEEE Symposium on Security and Privacy, Oakland, California, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Erlingsson, U.1
Schneider, F.B.2
-
7
-
-
33947617555
-
Inside Java 2 platform Security architecture, API design, and Implementation
-
Li Gong, Inside Java 2 platform Security architecture, API design, and Implementation, Addison-Wesley Longman Publishing Co., Inc., 1999.
-
(1999)
Addison-Wesley Longman Publishing Co., Inc
-
-
Gong, L.1
-
8
-
-
84940110094
-
Flexible Policy-Directed Code Safety
-
Oakland, California, May 9-12
-
D. Evans and A. Twyman, Flexible Policy-Directed Code Safety, 1999 IEEE Symposium on Security and Privacy, Oakland, California, May 9-12, 1999.
-
(1999)
1999 IEEE Symposium on Security and Privacy
-
-
Evans, D.1
Twyman, A.2
-
9
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
Ontario, Canada, September
-
Ú. Erlingsson and F. B. Schneider, SASI enforcement of security policies: A retrospective, Proceedings of the New Security Paradigms Workshop, Ontario, Canada, September 1999, pp87-95.
-
(1999)
Proceedings of the New Security Paradigms Workshop
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
10
-
-
2942536699
-
-
Y. Song and B. D. Fleisch, Rico: A Security Proxy for Mobile Code, Journal of Computers and Security Elsevier Advanced Technology, Elsevier Press, 23, Issue 4, 2004, pp. 338-351
-
Y. Song and B. D. Fleisch, Rico: A Security Proxy for Mobile Code, Journal of Computers and Security Elsevier Advanced Technology, Elsevier Press, Volume 23, Issue 4, 2004, pp. 338-351
-
-
-
-
13
-
-
33947622377
-
-
IRCache Project
-
IRCache Project: http://www.ircache.net/
-
-
-
-
15
-
-
0004316595
-
Measuring Proxy Performance with the Wisconsin Proxy Benchmark
-
Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin-Madison, April
-
J. Almeida and P. Cao. Measuring Proxy Performance with the Wisconsin Proxy Benchmark, Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin-Madison, April 1998.
-
(1998)
-
-
Almeida, J.1
Cao, P.2
-
16
-
-
33947672141
-
-
Web Polygraph: http://www.web-Polygraph.org
-
Polygraph
-
-
Web1
-
18
-
-
33947685143
-
-
CERT security report #237777, http://www.kb.cert.org/vuls/id/237777.
-
CERT security report #237777, http://www.kb.cert.org/vuls/id/237777.
-
-
-
-
19
-
-
33947697455
-
-
CERT security report #544392, http://www.kb.cert.org/vuls/id/544392.
-
CERT security report #544392, http://www.kb.cert.org/vuls/id/544392.
-
-
-
-
20
-
-
33947679024
-
-
AppletTrap: www.trendmicro.com.au/product/isap/
-
AppletTrap
-
-
-
21
-
-
33947624473
-
-
Finjan Software Documentation
-
Finjan Software Documentation: http://www.finjan.com
-
-
-
|