-
1
-
-
34548020919
-
-
Dyninst. www.dyninst.org.
-
Dyninst
-
-
-
2
-
-
34548027679
-
-
PaX. http://pax.grsecurity.net/.
-
PaX. http
-
-
-
3
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In 12th USENIX Security Symposium, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
4
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Baltimore, MD
-
S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In 14th USENIX Security Symposium, Baltimore, MD, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
DuVarney, D.C.3
-
5
-
-
0024606852
-
Fault tolerance under UNIX
-
Feb
-
A. Borg, W. Blau, W. Graetsch, F. Herrmann, and W. Oberle. Fault tolerance under UNIX. ACM TOCS, 7(1), Feb 1989.
-
(1989)
ACM TOCS
, vol.7
, Issue.1
-
-
Borg, A.1
Blau, W.2
Graetsch, W.3
Herrmann, F.4
Oberle, W.5
-
6
-
-
33751035317
-
Design space and analysis of worm defense strategies
-
March
-
D. Brumley, L.-H. Liu, P. Poosankam, , and D. Song. Design space and analysis of worm defense strategies. In Proceedings of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2006), March 2006.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2006)
-
-
Brumley, D.1
Liu, L.-H.2
Poosankam, P.3
Song, D.4
-
7
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
8
-
-
34548040609
-
-
CERT
-
CERT. Blaster http://www.cert.org/advisories/CA-2003-20.html.
-
Blaster
-
-
-
9
-
-
34548028152
-
-
CERT
-
CERT. CodeRed http://www.cert.org/advisories/CA-2001-19.html.
-
CodeRed
-
-
-
10
-
-
34548019639
-
-
CERT
-
CERT. Slammer http://www.cert.org/advisories/CA-2003-04.html.
-
Slammer
-
-
-
11
-
-
34548049185
-
-
CERT/CC. CERT/CC statistics 1988-2005. http://www.cert.org/stats/ cert_stats.html.
-
CERT/CC. CERT/CC statistics 1988-2005. http://www.cert.org/stats/ cert_stats.html.
-
-
-
-
12
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Technical report, Carnegie Mellon University
-
M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical report, Carnegie Mellon University, 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
13
-
-
0038716438
-
CCured in the real world
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer. CCured in the real world. In PLDI, 2003.
-
(2003)
PLDI
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
14
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In SOSP'05, 2005.
-
(2005)
SOSP'05
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
15
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In the 7th USENIX Security Symposium, 1998.
-
(1998)
the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
16
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In CCS '05, 2005.
-
(2005)
CCS '05
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
17
-
-
34247170052
-
Backwards-compatible array bounds checking for c with very low overhe ad
-
D. Dhurjati and V. Adve. Backwards-compatible array bounds checking for c with very low overhe ad. In ICSE, 2006.
-
(2006)
ICSE
-
-
Dhurjati, D.1
Adve, V.2
-
18
-
-
11844249640
-
Revirt: Enabling intrusion analysis through virtualmachine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtualmachine logging and replay. In OSDI'02, 2002.
-
(2002)
OSDI'02
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
20
-
-
34548043893
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Forrest, A. Somayaji, and D. H. Ackley. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In HotOS, 1997.
-
(1997)
HotOS
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
23
-
-
0034486891
-
The mathematics of infectious diseases
-
H. W. Hethcote. The mathematics of infectious diseases. SIAM Rev., 42(4):599-653, 2000.
-
(2000)
SIAM Rev
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
24
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.-A. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In the 13th Usenix Security Symposium, 2004.
-
(2004)
the 13th Usenix Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
25
-
-
85077373727
-
Debugging operating systems with time-traveling virtual machines
-
S. T. King, G. W. Dunlap, and P. M. Chen. Debugging operating systems with time-traveling virtual machines. In USENIX, 2005.
-
(2005)
USENIX
-
-
King, S.T.1
Dunlap, G.W.2
Chen, P.M.3
-
26
-
-
33645791274
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
C. Kreibich and J. Crowcroft. Honeycomb: creating intrusion detection signatures using honeypots. SIGCOMM Comput. Commun. Rev., 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev
-
-
Kreibich, C.1
Crowcroft, J.2
-
28
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Z. Liang and R. Sekar. Fast and automated generation of attack signatures: a basis for building self-protecting servers. In CCS '05, 2005.
-
(2005)
CCS '05
-
-
Liang, Z.1
Sekar, R.2
-
29
-
-
34548037822
-
Free transactions with Rio Vista
-
D. E. Lowell and P. M. Chen. Free transactions with Rio Vista. In SOSP, 1997.
-
(1997)
SOSP
-
-
Lowell, D.E.1
Chen, P.M.2
-
30
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In PLDI, 2005.
-
(2005)
PLDI
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
31
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
G. C. Necula, S. McPeak, and W. Weimer. CCured: Type-safe retrofitting of legacy code. In POPL, 2002.
-
(2002)
POPL
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
32
-
-
34548048541
-
-
N. Nethercote and J. Seward. Valgrind: A program supervision framework. In RV, 2003.
-
N. Nethercote and J. Seward. Valgrind: A program supervision framework. In RV, 2003.
-
-
-
-
33
-
-
84882740544
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
J. Newsome, D. Brumley, and D. Song. Vulnerability-specific execution filtering for exploit prevention on commodity software. In NDSS, 2006.
-
(2006)
NDSS
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
-
34
-
-
33846893358
-
Paragraph: Thwarting signature learning by training maliciously
-
Sept
-
J. Newsome, B. Karp, and D. Song. Paragraph: Thwarting signature learning by training maliciously. In RAID, Sept. 2006.
-
(2006)
RAID
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
36
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
37
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
May
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
38
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting general security attacks
-
Dec, To appear
-
F. Qin, H. Chen, Z. Li, Y. Zhou, H. seop Kim, and Y. Wu. LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In MICRO, Dec 2006. To appear.
-
(2006)
MICRO
-
-
Qin, F.1
Chen, H.2
Li, Z.3
Zhou, Y.4
seop Kim, H.5
Wu, Y.6
-
39
-
-
28444490333
-
Safemem: Exploiting ECC-Memory for detecting memory leaks and memo ry corruption during production runs
-
F. Qin, S. Lu, and Y. Zhou. Safemem: Exploiting ECC-Memory for detecting memory leaks and memo ry corruption during production runs. In HPCA, 2005.
-
(2005)
HPCA
-
-
Qin, F.1
Lu, S.2
Zhou, Y.3
-
40
-
-
84885578759
-
Rx: Treating bugs as allergies - A safe method to survive software failures
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies - A safe method to survive software failures. In SOSP, 2005.
-
(2005)
SOSP
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
42
-
-
14844328033
-
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS, 2004.
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS, 2004.
-
-
-
-
45
-
-
33845453072
-
Dira: Automatic detection, identification and repair of control-hijacking attacks
-
A. Smirnov and T. cker Chiueh. Dira: Automatic detection, identification and repair of control-hijacking attacks. In NDSS, 2005.
-
(2005)
NDSS
-
-
Smirnov, A.1
cker Chiueh, T.2
-
46
-
-
79959917961
-
Flashback: A lightweight extension for rollback and deterministic replay for software debugging
-
S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In USENIX, 2004.
-
(2004)
USENIX
-
-
Srinivasan, S.M.1
Kandula, S.2
Andrews, C.R.3
Zhou, Y.4
-
49
-
-
0036926058
-
Libsafe: Transparent system-wide protection against buffer overflow attacks
-
T. K. Tsai and N. Singh. Libsafe: Transparent system-wide protection against buffer overflow attacks. In DSN, page 541, 2002.
-
(2002)
DSN
, pp. 541
-
-
Tsai, T.K.1
Singh, N.2
-
50
-
-
85053144389
-
-
US-CERT. Common vulnerabilities and exposures. [51] W. Vogels, D. Dumitriu, A. Agrawal, T. Chia, and K. Guo. Scalability of the Microsoft Cluster Service. In USENIX Windows NT Symposium, Aug 1998.
-
US-CERT. Common vulnerabilities and exposures. [51] W. Vogels, D. Dumitriu, A. Agrawal, T. Chia, and K. Guo. Scalability of the Microsoft Cluster Service. In USENIX Windows NT Symposium, Aug 1998.
-
-
-
-
51
-
-
0002394571
-
The design and architecture of the Microsoft Cluster Service
-
Jun
-
W. Vogels, D. Dumitriu, K. Birman, R. Gamache, M. Massa, R. Short, J. Vert, J. Barrera, and J. Gray. The design and architecture of the Microsoft Cluster Service. In FTCS, Jun 1998.
-
(1998)
FTCS
-
-
Vogels, W.1
Dumitriu, D.2
Birman, K.3
Gamache, R.4
Massa, M.5
Short, R.6
Vert, J.7
Barrera, J.8
Gray, J.9
-
52
-
-
0020157396
-
Programmers use slices when debugging
-
M. Weiser. Programmers use slices when debugging. Commun. ACM, 25(7):446-452, 1982.
-
(1982)
Commun. ACM
, vol.25
, Issue.7
, pp. 446-452
-
-
Weiser, M.1
-
53
-
-
34247546866
-
A comparison of publicly available tools for dynamic buffer overflow prevention
-
J. Wilander and M. Kamkar. A comparison of publicly available tools for dynamic buffer overflow prevention. In NDSS, 2003.
-
(2003)
NDSS
-
-
Wilander, J.1
Kamkar, M.2
-
54
-
-
27644552867
-
Transparent runtime randomization for security
-
Technical report, Center for Reliable and Higher Performance Computing, University of Illinois, May
-
J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. Technical report, Center for Reliable and Higher Performance Computing, University of Illinois, May 2003.
-
(2003)
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
55
-
-
33745803872
-
Automatic diagnosis and response to memory corruption vulnerabilities
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities. In CCS '05, 2005.
-
(2005)
CCS '05
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
-
56
-
-
0038262825
-
Precise dynamic slicing algorithms
-
X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In ICSE, 2003.
-
(2003)
ICSE
-
-
Zhang, X.1
Gupta, R.2
Zhang, Y.3
-
57
-
-
21644447484
-
AccMon: Automatically detecting memory-related bugs via program counter-based invariants
-
P. Zhou, W. Liu, F. Long, S. Lu, F. Qin, Y. Zhou, S. Midkiff, and J. Torrellas. AccMon: Automatically detecting memory-related bugs via program counter-based invariants. In MICRO, 2004.
-
(2004)
MICRO
-
-
Zhou, P.1
Liu, W.2
Long, F.3
Lu, S.4
Qin, F.5
Zhou, Y.6
Midkiff, S.7
Torrellas, J.8
|