-
3
-
-
34748887025
-
A Unified Approach for Preventing Attacks Exploiting a Range of Software Vulnerabilities
-
SECLAB-05-05, Department of Computer Science, Stony Brook University, August
-
Wei Xu, Sandeep Bhatkar, and R. Sekar. A Unified Approach for Preventing Attacks Exploiting a Range of Software Vulnerabilities. Technical Report Technical Report SECLAB-05-05, Department of Computer Science, Stony Brook University, August 2005.
-
(2005)
Technical Report Technical Report
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
4
-
-
33845428560
-
Secure Program Execution via Dynamic Information Flow Tracking
-
G. Edward Suh, Jae W. Lee, David Zhang, and Srinivas Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI), pages 85-96, 2004.
-
(2004)
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-XI)
, pp. 85-96
-
-
Edward Suh, G.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
6
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
June
-
Shuo Chen, Jun Xu, Nithin Nakka, Abigniew Kalbarczyk, and Ravi Iyer. Defeating Memory Corruption Attacks via Pointer Taintedness Detection. In Proceedings of IEEE International Conference on Dependable Systems and Networks (DSN-2005), June 2005.
-
(2005)
Proceedings of IEEE International Conference on Dependable Systems and Networks (DSN-2005)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, A.4
Iyer, R.5
-
8
-
-
34748923392
-
Perl Advisor: Taint so Easy, Is It?
-
August
-
Randal L. Schwartz. Perl Advisor: Taint so Easy, Is It? Unix Review, August 2000.
-
(2000)
Unix Review
-
-
Schwartz, R.L.1
-
11
-
-
84871349041
-
Automatically Hardening Web Applications Using Precise Tainting
-
May
-
Ann Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeffrey Shirley, and David Evans. Automatically Hardening Web Applications Using Precise Tainting. In Proceedings of the 20th IFIP International Information Security Conference (SEC2005), May 2005.
-
(2005)
Proceedings of the 20th IFIP International Information Security Conference (SEC2005)
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
12
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
August
-
Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proceedings of the 13th USENIX Security Symposium, pages 321-336, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 321-336
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
13
-
-
84885575254
-
Scalability, Fidelity and Containment in the Potemkin Virtual Honey farm
-
October
-
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex Snoeren, Geoff Voelker, and Stefan Savage. Scalability, Fidelity and Containment in the Potemkin Virtual Honey farm. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.6
Voelker, G.7
Savage, S.8
-
14
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
October
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
16
-
-
34748851768
-
-
Pax project
-
Pax project, http://pax.pgsecurity.com/.
-
-
-
-
17
-
-
0031538389
-
Disco: Running Commodity Operating Systems on Scalable Multiprocessors
-
October
-
Edouard Bugnion, Scott Devine, Kinshuk Govil, and Mendel Rosenblum. Disco: Running Commodity Operating Systems on Scalable Multiprocessors. In Proceedings of the 16th ACM Symposium on Operating Systems Principles, pages 143-156, October 1997.
-
(1997)
Proceedings of the 16th ACM Symposium on Operating Systems Principles
, pp. 143-156
-
-
Bugnion, E.1
Devine, S.2
Govil, K.3
Rosenblum, M.4
-
20
-
-
34748897627
-
-
Paul Starzetz. Quick Analysiss [sic] of the recent crc32 ssh(d) bug. Email to bugtraq@securityfocus.com, February 2001.
-
Paul Starzetz. Quick Analysiss [sic] of the recent crc32 ssh(d) bug. Email to bugtraq@securityfocus.com, February 2001.
-
-
-
-
21
-
-
21644433634
-
Xen and the Art of Virtualization
-
October
-
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 164-177, October 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
24
-
-
0020847118
-
System/370 Extended Architecture: Facilities for Virtual Machines
-
November
-
P. H. Gum. System/370 Extended Architecture: Facilities for Virtual Machines. IBM Journal of Research and Development, 27(6):530-544, November 1983.
-
(1983)
IBM Journal of Research and Development
, vol.27
, Issue.6
, pp. 530-544
-
-
Gum, P.H.1
-
26
-
-
85059766484
-
Live Migration of Virtual Machines
-
May
-
Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, and Andrew Warfield. Live Migration of Virtual Machines. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation, May 2005.
-
(2005)
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Gorm Hansen, J.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
|