-
2
-
-
85084161234
-
Mapbox: Using parameterized behavior classes to confine applications
-
August
-
A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the 9th USENIX Security Symposium, pages 1-17, August 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 1-17
-
-
Acharya, A.1
Raje, M.2
-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
6
-
-
85084162426
-
Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies
-
January
-
V. Anupam and A. Mayer. Security of Web Browser Scripting Languages: Vulnerabilities, Attacks, and Remedies. In Proceedings of the 7th USENIX Security Symposium, pages 187-200, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 187-200
-
-
Anupam, V.1
Mayer, A.2
-
8
-
-
18744376889
-
Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks
-
October
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovic, and D. D. Zovi. Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pages 281-289, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
10
-
-
84862209017
-
Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits
-
August
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: an Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
11
-
-
85009448253
-
PointGuard: Protecting Pointers from Buffer Overflow Vulnerabilities
-
August
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting Pointers From Buffer Overflow Vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, pages 91-104, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 91-104
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
12
-
-
1542697134
-
SubDomain: Parsimonious Security for Server Appliances
-
March
-
C. Cowan, S. Beattie, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Security for Server Appliances. In Proceedings of the 14th USENIX System Administration Conference (LISA 2000), March 2000.
-
(2000)
Proceedings of the 14th USENIX System Administration Conference (LISA 2000)
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
14
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan.
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, Jan. 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
18
-
-
84940106242
-
Hardening COTS Software with Generic Software Wrappers
-
Oakland, CA, May
-
T. Fraser, L. Badger, and M. Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
20
-
-
0003246945
-
SLIC: An Extensibility System for Commodity Operating Systems
-
June
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson. SLIC: An Extensibility System for Commodity Operating Systems. In Proceedings of the 1998 USENIX Annual Technical Conference, pages 39-52, June 1998.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
29
-
-
0038524497
-
-
January
-
M. Conover and w00w00 Security Team. w00w00 on heap overflows. http://www.w00w00.org/files/articles/heaptut.txt, January 1999.
-
(1999)
W00w00 on Heap Overflows
-
-
Conover, M.1
-
34
-
-
85084164620
-
Detecting Format String Vulnerabilities with Type Qualifiers
-
August
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting Format String Vulnerabilities with Type Qualifiers. In Proceedings of the 10th USENIX Security Symposium, pages 201-216, August 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
35
-
-
85081874807
-
A First Step towards Automated Detection of Buffer Overrun Vulnerabilities
-
February
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS), pages 3-17, February 2000.
-
(2000)
Proceedings of the ISOC Symposium on Network and Distributed System Security (SNDSS)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
36
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
July
-
K. M. Walker, D. F. Stem, L. Badger, K. A. Oosendorp, M. J. Petkac, and D. L. Sherman. Confining root programs with domain and type enforcement. In Proceedings of the USENIX Security Symposium, pages 21-36, July 1996.
-
(1996)
Proceedings of the USENIX Security Symposium
, pp. 21-36
-
-
Walker, K.M.1
Stem, D.F.2
Badger, L.3
Oosendorp, K.A.4
Petkac, M.J.5
Sherman, D.L.6
|