-
1
-
-
34247262574
-
-
A. Dekok, PScan. Striker-On-Line. www. striker. Ottawa. on.ca/~aland/pscan/, Oct28, 2003.
-
A. Dekok, PScan. Striker-On-Line. www. striker. Ottawa. on.ca/~aland/pscan/, Oct28, 2003.
-
-
-
-
2
-
-
77954669340
-
BLAST User's Manual
-
May 16
-
"BLAST User's Manual", May 16, 2004. http://www-cad.eecs. berkeley.edu/~tah/blast/
-
(2004)
-
-
-
3
-
-
85009448253
-
PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities
-
August
-
C. Cowan, S. Seattle, J. Johansen, and P. Wagle, "PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities", In Proceedings of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Seattle, S.2
Johansen, J.3
Wagle, P.4
-
4
-
-
85084160959
-
RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities
-
Washington, DC, August
-
C. Cowan, S. Beattie, C. Wright, G. Kroah-Hartman, "RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities", In Proceedings of the 10th USENIX Security Symposium, Washington, DC, August, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Wright, C.3
Kroah-Hartman, G.4
-
5
-
-
34247272955
-
-
Crispin Cowan, Perry Wagle an Calton Pu, Steve Beattie, and Jonathan Walpole. Buffer Overflows: attacks and defenses for the vulnerability of the decade, In Proc. of the DARPA Information Survivability Conference and Expo, 1999.
-
Crispin Cowan, Perry Wagle an Calton Pu, Steve Beattie, and Jonathan Walpole. Buffer "Overflows: attacks and defenses for the vulnerability of the decade", In Proc. of the DARPA Information Survivability Conference and Expo, 1999.
-
-
-
-
6
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
San Antonio, TX, January
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks", In 7th USENIX Security Conference, pages 63-77, San Antonio, TX, January 1998.
-
(1998)
7th USENIX Security Conference
, pp. 63-77
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
7
-
-
85081874807
-
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
-
San Diego, CA, Feb. 3-4
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken, "A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities", In Proceedings of the 2000 Network and Distributed Security Symposium, San Diego, CA, Feb. 3-4, 2000.
-
(2000)
Proceedings of the 2000 Network and Distributed Security Symposium
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
8
-
-
34247191941
-
-
Oct. 28
-
D. Wheeler, Flawfinder. www.dwheeler.com/flawfinder/, Oct. 28, 2003.
-
(2003)
Flawfinder
-
-
Wheeler, D.1
-
10
-
-
0004239103
-
-
4th Edition. McGraw-Hill, Berkeley, CA
-
H. Schildt, C: The Complete Reference, 4th Edition. McGraw-Hill, Berkeley, CA, 2000, 309-382.
-
(2000)
C: The Complete Reference
, pp. 309-382
-
-
Schildt, H.1
-
11
-
-
34247247708
-
-
Hao Chen, David Wagner and David Schultz at Computer Science Division, UC Berkeley, MOPS User's Manual
-
Hao Chen, David Wagner and David Schultz at Computer Science Division, UC Berkeley, "MOPS User's Manual"
-
-
-
-
14
-
-
34247181993
-
-
Howard. M. and LeBlanc, D. Writing, Secure Code. Microsoft Press, Redmond, WA, 2002, 63-88.
-
Howard. M. and LeBlanc, D. Writing, Secure Code. Microsoft Press, Redmond, WA, 2002, 63-88.
-
-
-
-
15
-
-
77953090379
-
Methods for the prevention, detection and removal of software security vulnerabilities
-
Jay-Evan J. Tevis, John A. Hamilton, "Methods for the prevention, detection and removal of software security vulnerabilities", ACM Southeast Regional Conference 2004, 197-202.
-
ACM Southeast Regional Conference 2004
, pp. 197-202
-
-
Tevis, J.J.1
Hamilton, J.A.2
-
16
-
-
34247275747
-
-
John Viega, J.T. Bloch, Tadayoshi Kohno, Gary McGraw Reliable Software Technologies, ITS4: A Static Vulnerability Scanner for C and C++ Code, http://www.rstcorp.com.
-
John Viega, J.T. Bloch, Tadayoshi Kohno, Gary McGraw Reliable Software Technologies, "ITS4: A Static Vulnerability Scanner for C and C++ Code", http://www.rstcorp.com.
-
-
-
-
17
-
-
0003925663
-
-
Addison-Wesley, Boston, MA
-
J. Viega, and G. McGraw, Building Secure Software, Addison-Wesley, Boston, MA, 2002, 127-133.
-
(2002)
Building Secure Software
, pp. 127-133
-
-
Viega, J.1
McGraw, G.2
-
18
-
-
34247245705
-
-
Sams Publishing, Indianapolis, IN
-
K. Wall, M. Watson, and M. Whitis, Linux Programming Unleashed. Sams Publishing, Indianapolis, IN, 1999, 642-661.
-
(1999)
Linux Programming Unleashed
, pp. 642-661
-
-
Wall, K.1
Watson, M.2
Whitis, M.3
-
19
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
Spring
-
M. Bishop and M. Digler, "Checking for Race Conditions in File Accesses", Computing Systems, 9(2): 131-152, Spring 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Digler, M.2
-
20
-
-
48849110167
-
-
Secure Software, Secure Software Inc, Oct. 28
-
Secure Software, Rough Auditing Tool for Security (RATS), Secure Software Inc. www.securesoftware.com, Oct. 28, 2003.
-
(2003)
Rough Auditing Tool for Security (RATS)
-
-
-
21
-
-
0036041563
-
Lazy Abstraction
-
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar and Gregoire Sutre, "Lazy Abstraction", In ACM SIGPLAN-SIGACT Conference on Principles of Programming Languages, pages 58-70, 2002.
-
(2002)
ACM SIGPLAN-SIGACT Conference on Principles of Programming Languages
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
22
-
-
35248827669
-
Software Verification with Blast
-
Proceedings of the 10th SPIN Workshop on Model Checking Software SPIN, Springer-Verlag
-
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar, and Gregoire Sutre, "Software Verification with Blast", Proceedings of the 10th SPIN Workshop on Model Checking Software (SPIN), Lecture Notes in Computer Science 2648, Springer-Verlag, pages 235-239, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2648
, pp. 235-239
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
|