-
1
-
-
33749181800
-
-
CERT Coordination Center, Online, Available
-
CERT Coordination Center, Washington, DC, "Vulnerability notes database," (2006). [Online], Available: http://nvd.nist.gov/statistics.cfm
-
(2006)
Vulnerability notes database
-
-
Washington, D.C.1
-
2
-
-
84860084941
-
-
Online, Available
-
NIST, Washington, DC, "ICAT statistics," [Online]. Available: http://icat.nist.gov/icat.cfm?function=statistics
-
ICAT statistics
-
-
NIST, W.D.C.1
-
3
-
-
4444331720
-
Security as a new dimension in embedded system design
-
P. Kocher, R. B. Lee, G. McGraw, A. Raghunathan, and S. Ravi, "Security as a new dimension in embedded system design," in Proc. ACM/ IEEE Design Autom. Conf., 2004. pp. 753-760.
-
(2004)
Proc. ACM/ IEEE Design Autom. Conf
, pp. 753-760
-
-
Kocher, P.1
Lee, R.B.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
5
-
-
85084162336
-
Secure execution via program shepherding
-
V. Kiriansky, D. Bruening, and S. P. Amarasinghe, "Secure execution via program shepherding," in Proc. USENIX Security Symp., 2002, pp. 191-206.
-
(2002)
Proc. USENIX Security Symp
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
6
-
-
27644598154
-
Secure embedded processing through hardware-assisted run-time monitoring
-
D. Arora, S. Ravi, A. Raghunathan, and N. K. Jha, "Secure embedded processing through hardware-assisted run-time monitoring," in Proc. Design, Autom. Test Eur., 2005, pp. 178-183.
-
(2005)
Proc. Design, Autom. Test Eur
, pp. 178-183
-
-
Arora, D.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
10
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan et al., "Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. USENIX Security Symp., 1998, pp. 63-77.
-
(1998)
Proc. USENIX Security Symp
, pp. 63-77
-
-
Cowan, C.1
-
11
-
-
84881146783
-
Non-executable user stack
-
Online, Available
-
"Non-executable user stack," [Online]. Available: http://www.openwall.com/linux
-
-
-
-
12
-
-
0035195201
-
Detecting heap buffer overflow through fault containment wrappers
-
C. Fetzer and Z. Xiao, "Detecting heap buffer overflow through fault containment wrappers," in Proc. Symp. Reliable. Distributed Syst., 2001, pp. 80-89.
-
(2001)
Proc. Symp. Reliable. Distributed Syst
, pp. 80-89
-
-
Fetzer, C.1
Xiao, Z.2
-
13
-
-
85084159869
-
TIED, libsafeplus: Tools for runtime buffer overflow protection
-
K. Avijit, P. Gupta, and D. Gupta, "TIED, libsafeplus: Tools for runtime buffer overflow protection," in Proc. USENIX Security Symp., 2004, pp. 45-56.
-
(2004)
Proc. USENIX Security Symp
, pp. 45-56
-
-
Avijit, K.1
Gupta, P.2
Gupta, D.3
-
14
-
-
85094678188
-
Run-time detection of heap-based overflows
-
W. Robertson, C. Kruegel, D. Mutz, and F. Valeur, "Run-time detection of heap-based overflows," in Proc. USENIX Large Installation Syst. Administration Conf., 2003, pp. 51-60.
-
(2003)
Proc. USENIX Large Installation Syst. Administration Conf
, pp. 51-60
-
-
Robertson, W.1
Kruegel, C.2
Mutz, D.3
Valeur, F.4
-
15
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
R. Hastings and B. Joyce, "Purify: Fast detection of memory leaks and access errors," in Proc. Winter USENIX Conf., 1992, pp. 125-136.
-
(1992)
Proc. Winter USENIX Conf
, pp. 125-136
-
-
Hastings, R.1
Joyce, B.2
-
16
-
-
34249796579
-
-
Valgrind Project, Online, Available
-
Valgrind Project, "Valgrind," (2007). [Online]. Available: http://valgrind.kde.org/index.html
-
(2007)
Valgrind
-
-
-
18
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang, "Cyclone: A safe dialect of C," in Proc. USENIX Annu. Techn. Conf., 2002, pp. 275-288.
-
(2002)
Proc. USENIX Annu. Techn. Conf
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
19
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
G. C. Necula, S. McPeak, and W. Weimer, "CCured: Type-safe retrofitting of legacy code," in Proc. Symp. Principles Program. Languages, 2002, pp. 128-139.
-
(2002)
Proc. Symp. Principles Program. Languages
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
21
-
-
84944192977
-
Debugging via run-time type checking
-
A. Loginov, S. H. Yong, S. Horwitz, and T. W. Reps, "Debugging via run-time type checking," in Proc. Int. Conf. Fundamental Approaches Softw. Eng., 2001, pp. 217-232.
-
(2001)
Proc. Int. Conf. Fundamental Approaches Softw. Eng
, pp. 217-232
-
-
Loginov, A.1
Yong, S.H.2
Horwitz, S.3
Reps, T.W.4
-
24
-
-
0027963879
-
Efficient detection of all pointer and array access errors
-
T. M. Austin, S. E. Breach, and G. S. Sohi, "Efficient detection of all pointer and array access errors," in Proc. SIGPLAN Conf. Program. Language Design Implementation, 1994, pp. 290-301.
-
(1994)
Proc. SIGPLAN Conf. Program. Language Design Implementation
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
25
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. A. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. C. Mitchell, and M. Horowitz, "Architectural support for copy and tamper resistant software," in Proc. Int. Conf. Arch. Support for Progmm. Languages Operat. Syst., 2000, pp. 168-177.
-
(2000)
Proc. Int. Conf. Arch. Support for Progmm. Languages Operat. Syst
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.A.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.C.6
Horowitz, M.7
-
26
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architecture for tamper-evident and tamper-resistant processing," in Proc. Int. Conf. Supercomput., 2003, pp. 160-171.
-
(2003)
Proc. Int. Conf. Supercomput
, pp. 160-171
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
van Dijk, M.4
Devadas, S.5
-
27
-
-
85084162921
-
Privtrans: Automatically partitioning programs for privilege separation
-
D. Brumley and D. Song, "Privtrans: Automatically partitioning programs for privilege separation," in Proc. USENIX Security Symp., 2004, pp. 57-72.
-
(2004)
Proc. USENIX Security Symp
, pp. 57-72
-
-
Brumley, D.1
Song, D.2
-
28
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. Lee, and S. Devadas, "Secure program execution via dynamic information flow tracking," in Proc. Int. Conf. Arch. Support for Progmm. Languages Operat. Syst., 2004, pp. 85-96.
-
(2004)
Proc. Int. Conf. Arch. Support for Progmm. Languages Operat. Syst
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
29
-
-
0031339427
-
MediaBench: A tool for evaluating and synthesizing multimedia and communicatons systems
-
C. Lee, M. Potkonjak, and W. H. Mangione-Smith. "MediaBench: A tool for evaluating and synthesizing multimedia and communicatons systems," in Proc. Int. Symp. Microarch., 1997, pp. 330-335.
-
(1997)
Proc. Int. Symp. Microarch
, pp. 330-335
-
-
Lee, C.1
Potkonjak, M.2
Mangione-Smith, W.H.3
-
30
-
-
84962779213
-
Mibench: A free, commercially representative embedded benchmark suite
-
M. R. Guthaus, J. S. Ringenberg, D. Ernst, T. M. Austin, T. Mudge, and R. B. Brown, "Mibench: A free, commercially representative embedded benchmark suite," in Proc. Annu. Workshop Workload Characterization, 2001. pp. 3-14.
-
(2001)
Proc. Annu. Workshop Workload Characterization
, pp. 3-14
-
-
Guthaus, M.R.1
Ringenberg, J.S.2
Ernst, D.3
Austin, T.M.4
Mudge, T.5
Brown, R.B.6
-
31
-
-
34249818085
-
-
D. Burger and T. M. Austin, 'The SimpleScalar tool set, Comput. Sci. Dept., Univ. Wisconsin-Madison, Tech. Rep. 2-0, 1997.
-
D. Burger and T. M. Austin, 'The SimpleScalar tool set," Comput. Sci. Dept., Univ. Wisconsin-Madison, Tech. Rep. 2-0, 1997.
-
-
-
-
32
-
-
84861271517
-
-
Online, Available
-
Phrack, "Once upon a free()." [Online], Available: http://www.phrack.org/archives/57/p57-0x09
-
Once upon a free()
-
-
Phrack1
-
33
-
-
85084163372
-
Stackghost: Hardware facilitated stack protection
-
M. Frantzen and M. Shuey, "Stackghost: Hardware facilitated stack protection," in Proc. 10th USENIX Security Symp., 2001, pp. 55-66.
-
(2001)
Proc. 10th USENIX Security Symp
, pp. 55-66
-
-
Frantzen, M.1
Shuey, M.2
-
35
-
-
0030149507
-
CACTI: An enhanced cache access and cycle time model
-
May
-
S. J. E. Wilton and N. P. Jouppi, "CACTI: An enhanced cache access and cycle time model," IEEE J. Solid State Circuits, vol. 31, no. 5, pp. 677-688, May 1996.
-
(1996)
IEEE J. Solid State Circuits
, vol.31
, Issue.5
, pp. 677-688
-
-
Wilton, S.J.E.1
Jouppi, N.P.2
|