-
2
-
-
34748889791
-
-
Mozilla Foundation
-
Mozilla Foundation. Mozilla Module Owners. http://www.mozilla.org/owners. html
-
Mozilla Module Owners
-
-
-
4
-
-
84870639765
-
-
Microsoft Internet Explorer 6
-
Secunia. Vulnerability Report - Microsoft Internet Explorer 6. http://secunia.com/product/11/
-
Vulnerability Report
-
-
Secunia1
-
5
-
-
84870639765
-
-
Mozilla Firefox 1.x
-
Secunia. Vulnerability Report - Mozilla Firefox 1.x. http://secunia.com/ product/4227/
-
Vulnerability Report
-
-
Secunia1
-
6
-
-
84870639765
-
-
X11 Windowing System (X11) 6.x
-
Secunia. Vulnerability Report - X11 Windowing System (X11) 6.x. http://secunia.com/product/3913/
-
Vulnerability Report
-
-
Secunia1
-
7
-
-
84870639765
-
-
Linux Kernel 2.4.x
-
Secunia. Vulnerability Report - Linux Kernel 2.4.x. http://secunia.com/ product/763/
-
Vulnerability Report
-
-
Secunia1
-
10
-
-
34748823429
-
-
Trusted Computing Group
-
Trusted Computing Group. TCG Main Specification v1.1b, https://www.trustedcomputinggroup.org/
-
TCG Main Specification v1.1b
-
-
-
12
-
-
21644433634
-
Xen and the Art of Virtualization
-
NY, Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A.Warfield. Xen and the Art of Virtualization. In Proc. 19th ACM Symposium on Operating Systems Principles (SOSP 2003), NY, Oct. 2003.
-
(2003)
Proc. 19th ACM Symposium on Operating Systems Principles (SOSP 2003)
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
13
-
-
0020847373
-
An Empirical Study of a Complexity Family
-
November
-
V. Basili and D. Hutchens. An Empirical Study of a Complexity Family. In IEEE Transactions on Software Engineering, Volume 9, No. 6, November 1983, pp. 664-672.
-
(1983)
IEEE Transactions on Software Engineering
, vol.9
, Issue.6
, pp. 664-672
-
-
Basili, V.1
Hutchens, D.2
-
14
-
-
85084162921
-
Privtrans: Automatically Partitioning Programs for Privilege Separation
-
San Diego, USA. Aug 9-13
-
D. Brumley, D. X. Song. Privtrans: Automatically Partitioning Programs for Privilege Separation. In Proc. USENIX Security Symposium, San Diego, USA. Aug 9-13, 2004.
-
(2004)
Proc. USENIX Security Symposium
-
-
Brumley, D.1
Song, D.X.2
-
16
-
-
85044841595
-
Client-side defense against web-based identity theft
-
San Diego, February
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh and J. C. Mitchell, Client-side defense against web-based identity theft, In 11th Annual Network and Distributed System Security Symposium (NDSS '04), San Diego, February, 2004.
-
(2004)
11th Annual Network and Distributed System Security Symposium (NDSS '04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.C.5
-
20
-
-
0034245310
-
Quantitative Analysis of Faults and Failures in a Complex Software System
-
N. E. Fenton, N. Ohlsson., Quantitative Analysis of Faults and Failures in a Complex Software System. In IEEE Trans. Software Eng. 26(8): 797-814, 2000.
-
(2000)
IEEE Trans. Software Eng
, vol.26
, Issue.8
, pp. 797-814
-
-
Fenton, N.E.1
Ohlsson, N.2
-
24
-
-
33947691568
-
The Nizza Secure-System Architecture
-
San Jose, USA. Dec
-
H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert and M. Peter. The Nizza Secure-System Architecture. In IEEE CollaborateCom 2005. San Jose, USA. Dec 2005.
-
(2005)
IEEE CollaborateCom 2005
-
-
Härtig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
Peter, M.7
-
25
-
-
0031540885
-
The performance of μ-kernel-based systems
-
Oct
-
H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg, and J.Wolter. The performance of μ-kernel-based systems. In Proc. I6th ACM Symposium on Operating System Principles, pp 66-77, Oct. 1997.
-
(1997)
Proc. I6th ACM Symposium on Operating System Principles
, pp. 66-77
-
-
Härtig, H.1
Hohmuth, M.2
Liedtke, J.3
Schönberg, S.4
Wolter, J.5
-
26
-
-
34748856078
-
Mikro-SINA-Hands-on Experiences with the Nizza Security Architecture
-
Darmstadt, Germany, March
-
C. Helmuth, A. Warg, and N. Feske. Mikro-SINA-Hands-on Experiences with the Nizza Security Architecture. In Proceedings of the D.A.C.H Security 2005, Darmstadt, Germany, March 2005.
-
(2005)
Proceedings of the D.A.C.H Security 2005
-
-
Helmuth, C.1
Warg, A.2
Feske, N.3
-
27
-
-
34748875142
-
-
A. Herzberg and A. Gbara, TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks, Cryptology ePrint Archive, Report 2004/155. 2004.
-
A. Herzberg and A. Gbara, TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks, Cryptology ePrint Archive, Report 2004/155. 2004.
-
-
-
-
28
-
-
77951450625
-
Reducing TCB size by using untrusted components - small kernels versus virtual machine monitors
-
Leuven, Belgium
-
Hohmuth, M., M. Peter, H. Härtig, and J. Shapiro. "Reducing TCB size by using untrusted components - small kernels versus virtual machine monitors", in Proc. of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004.
-
(2004)
Proc. of the 11th ACM SIGOPS European Workshop
-
-
Hohmuth, M.1
Peter, M.2
Härtig, H.3
Shapiro, J.4
-
31
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
Bolton Landing, NY
-
D. Lie, C.A. Thekkath and M. Horowitz, Implementing an untrusted operating system on trusted hardware, In 19th ACM-SOSP,2003, Bolton Landing, NY.
-
19th ACM-SOSP,2003
-
-
Lie, D.1
Thekkath, C.A.2
Horowitz, M.3
-
33
-
-
0017291489
-
A Complexity Measure
-
Dec
-
T.J. McCabe, A Complexity Measure, IEEE Transactions on Software Engineering, SE-2 No, 4, pp. 308-320, Dec. 1976.
-
(1976)
IEEE Transactions on Software Engineering
, vol.SE-2
, Issue.4
, pp. 308-320
-
-
McCabe, T.J.1
-
34
-
-
47649085814
-
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software
-
Boston, Dec
-
X. Qie, R. Pang, L. L. Peterson, Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. In OSDI 2002, Boston, Dec. 2002.
-
(2002)
OSDI 2002
-
-
Qie, X.1
Pang, R.2
Peterson, L.L.3
-
37
-
-
84863469085
-
Stronger Password Authentication Using Browser Extensions
-
Baltimore, USA, Aug
-
B. Ross, C. Jackson, N. Miyake, D. Boneh and J. C. Mitchell, Stronger Password Authentication Using Browser Extensions. In 14th Usenix Security Symposium, Baltimore, USA, Aug. 2005.
-
(2005)
14th Usenix Security Symposium
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.C.5
-
38
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Sept
-
JH Saltzer and MD Schroeder, The Protection of Information in Computer Systems, Proc. of the IEEE, Vol.63, No.9, Sept. 1975, pp.1278-1308.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
39
-
-
85084162270
-
Design and Implementation of a TCG-based Integrity Measurement Architecture
-
August
-
R. Sailer, X. Zhang, T. Jaeger, and L. V. Doom. Design and Implementation of a TCG-based Integrity Measurement Architecture, In Proceedings of Thirteenth USENIX Security Symposium, pp 223-238, August 2004.
-
(2004)
Proceedings of Thirteenth USENIX Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Doom, L.V.4
-
40
-
-
34748818617
-
Software Complexity and Security
-
March
-
B. Sehneier. Software Complexity and Security. Crypto-Gram Newsletter. March 2000. http://www.schneier.com/crypto-gram-0003.html
-
(2000)
Crypto-Gram Newsletter
-
-
Sehneier, B.1
-
41
-
-
0001421170
-
EROS: A Fast Capability System
-
Charleston, SC, USA. Dec
-
J. S. Shapiro, J. M. Smith, and D. J. Farber. EROS: A Fast Capability System, In Proc. 17th ACMSymposium on Operating Systems Principles. Charleston, SC, USA. Dec. 1999.
-
(1999)
Proc. 17th ACMSymposium on Operating Systems Principles
-
-
Shapiro, J.S.1
Smith, J.M.2
Farber, D.J.3
-
42
-
-
85084163031
-
Design of the EROS Trusted Window System
-
San Diego CA
-
J. S. Shapiro, J. Vanderburgh, E. Northup, and D. Chizmadia, Design of the EROS Trusted Window System, In Proc. USENIX Security Symposium, San Diego CA, 2004
-
(2004)
Proc. USENIX Security Symposium
-
-
Shapiro, J.S.1
Vanderburgh, J.2
Northup, E.3
Chizmadia, D.4
-
43
-
-
0022044747
-
Identifying Error-prone Software -An Empirical Study
-
April
-
V. Y. Shen, T. Yu, S. M. Thebaut, and L. R. Paulsen, Identifying Error-prone Software -An Empirical Study, In IEEE TOSE, Vol. SE-11, pp. 317-323, April 1985.
-
(1985)
IEEE TOSE
, vol.SE-11
, pp. 317-323
-
-
Shen, V.Y.1
Yu, T.2
Thebaut, S.M.3
Paulsen, L.R.4
-
45
-
-
85084160641
-
The Flask Security Architecture: System Support for Diverse Security Policies
-
Aug
-
R. Spencer, S.Smalley, P. Loscocco, M. Hibler, D.Andersen and J. Lepreau. The Flask Security Architecture: System Support for Diverse Security Policies. In Procedings of the 8th USENIX Security Symposium, Aug. 1999.
-
(1999)
Procedings of the 8th USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
49
-
-
85084164351
-
-
Wright, C., C. Cowan, S. Smalley, J. Morris, G. Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In the Proceedings of the 2002 Usenix Security Symposium, Aug 2002, San Francisco.
-
Wright, C., C. Cowan, S. Smalley, J. Morris, G. Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In the Proceedings of the 2002 Usenix Security Symposium, Aug 2002, San Francisco.
-
-
-
|