-
1
-
-
85062418620
-
Non-Control-Data Attacks Are Realistic Threats
-
August
-
Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravi Iyer. "Non-Control-Data Attacks Are Realistic Threats". In Proceedings of USENIX Security Symposium, August 2005.
-
(2005)
Proceedings of USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.5
-
2
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
June
-
Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravi Iyer. "Defeating Memory Corruption Attacks via Pointer Taintedness Detection". In Proceedings of IEEE International Conference on Dependable Systems and Networks (DSN), June, 2005.
-
(2005)
Proceedings of IEEE International Conference on Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.5
-
7
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
Jonathan Pincus and Brandon Baker. "Beyond stack smashing: Recent advances in exploiting buffer overruns". IEEE Security and Privacy, 2004.
-
(2004)
IEEE Security and Privacy
-
-
Pincus, J.1
Baker, B.2
-
9
-
-
34547147664
-
-
D. Burger and T. M. Austin. The Simplescalar Tool Set Version 2.0. Technical Report, Computer Science Department, University of Wisconsin-Madison, 1997
-
D. Burger and T. M. Austin. "The Simplescalar Tool Set Version 2.0". Technical Report, Computer Science Department, University of Wisconsin-Madison, 1997.
-
-
-
-
10
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Brighton, UK, October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham, "Vigilante: End-to-End Containment of Internet Worms", 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
11
-
-
33750325871
-
Argos: An Emulator for Fingerprinting Zero-Day Attacks
-
Leuven, Belgium, April
-
Georgios Portokalidis, Asia, Slowinska and Herbert Bos. "Argos: an Emulator for Fingerprinting Zero-Day Attacks". In proceedings of ACM SIGOPS EUROSYS 2006, Leuven, Belgium, April 2006.
-
(2006)
proceedings of ACM SIGOPS EUROSYS
-
-
Portokalidis, G.1
Asia, S.2
Bos, H.3
-
12
-
-
34748845128
-
Practical Taint-based Protection using Demand Emulation
-
Leuven, Belgium, April
-
Alex Ho, Michael Fetterman, Christopher Clark, Andrew Warfield and Steven Hand. "Practical Taint-based Protection using Demand Emulation". In proceedings of ACM SIGOPS EUROSYS 2006, Leuven, Belgium, April 2006.
-
(2006)
proceedings of ACM SIGOPS EUROSYS
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
13
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
January
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, A. Grier, S. Beattie, P. Wagle, and Q. Zhang. "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks". In Proceedings in the 7th USENIX Security Symposium, January 1998.
-
(1998)
Proceedings in the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Grier, A.7
Beattie, S.8
Wagle, P.9
Zhang, Q.10
-
15
-
-
34547228965
-
-
SSH CRC-32 Compensation Attack Detector Vulnerability. http://www.securityfocus.com/bid/2347
-
SSH CRC-32 Compensation Attack Detector Vulnerability. http://www.securityfocus.com/bid/2347
-
-
-
-
16
-
-
85094678188
-
Run-time Detection of Heap-based Overflows
-
In the, October, San Diego, CA USA
-
W. Robertson, C. Kruegel, D. Mutz, F. Valeur. "Run-time Detection of Heap-based Overflows". In the Proceedings of the 17th USENIX Large Installation Systems Administration Conference (LISA). October 2003, San Diego, CA USA.
-
(2003)
Proceedings of the 17th USENIX Large Installation Systems Administration Conference (LISA)
-
-
Robertson, W.1
Kruegel, C.2
Mutz, D.3
Valeur, F.4
-
18
-
-
77955972329
-
Deconstructing Hardware Architectures for Security
-
Boston, MA, June
-
Michael Dalton, Hari Kannan, Christos Kozyrakis, "Deconstructing Hardware Architectures for Security". 5th Annual Workshop on Duplicating, Deconstructing, and Debunking (WDDD) at ISCA, Boston, MA, June 2006.
-
(2006)
5th Annual Workshop on Duplicating, Deconstructing, and Debunking (WDDD) at ISCA
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
|