-
1
-
-
84867854789
-
Remus: A security-enhanced operating system
-
M. Bernaschi, E. Gabrielli, and L. V. Mancini. Remus: a security-enhanced operating system. ACM Transactions on Information and System Security (TISSEC), 5(1):36-61, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.1
, pp. 36-61
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
2
-
-
0002582136
-
Buffer overflows: Attacks and defences for the vulnerability of the decade
-
Jan.
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and I. Walpole. Buffer overflows: attacks and defences for the vulnerability of the decade. In Proceedings IEEE DARPA Information Survivability Conference and Expo, Jan. 2000.
-
(2000)
Proceedings IEEE DARPA Information Survivability Conference and Expo
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, I.5
-
3
-
-
0039926997
-
A compiler for analyzing cryptographic protocols using noninterference
-
A. Durante, R. Focardi, and R. Gorrieri. A compiler for analyzing cryptographic protocols using noninterference. ACM Transactions on Software Engineering and Methodology (TOSEM), 9(4):488-528, 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.9
, Issue.4
, pp. 488-528
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
4
-
-
35048902864
-
CVS at work: A report on new failures upon some cryptographic protocols
-
A. Durante, R. Focardi, and R. Gorrieri. CVS at work: A report on new failures upon some cryptographic protocols. Lecture Notes in Computer Science, 2052:287-299, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2052
, pp. 287-299
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
5
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. Software Engineering, 23(9):550-571, 1997.
-
(1997)
Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
Berkeley, USA, June 15-19 USENIX Association
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson. SLIC: An extensibility system for commodity operating systems. In Proceedings of the USENIX 1998 Annual Technical Conference, pages 39-52, Berkeley, USA, June 15-19 1998. USENIX Association.
-
(1998)
Proceedings of the USENIX 1998 Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
9
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
10
-
-
35248877202
-
-
IETF Internet Draft
-
IETF Internet Draft, http://www.ietf.org/rfc.html.
-
-
-
-
11
-
-
35248895879
-
-
http://www.faqs.org/rfcs/rfc1939.html
-
-
-
-
12
-
-
0029267472
-
State Transition Analysis: A Rule-Based Intrusion Detection System
-
March
-
K. Ilgun, R.A. Kemmerer, and P.A. Porras. State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3):181-199, March 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
14
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
IEEE Computer Society Press, Los Alamitos, CA
-
R. P. Lippmann. Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In Proceedings DARPA Information Survivability Conference and Exposition (DISCEX). IEEE Computer Society Press, Los Alamitos, CA, 2000.
-
(2000)
Proceedings DARPA Information Survivability Conference and Exposition (DISCEX)
-
-
Lippmann, R.P.1
-
16
-
-
35248869331
-
-
Security Enhanced Linux
-
Security Enhanced Linux, http://www.nsa.gov/selinux.
-
-
-
-
17
-
-
0034829697
-
A fast automation-based method for detecting anomalous program behavior
-
Oackland CA, May
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automation-based method for detecting anomalous program behavior. In IEEE Symposium on Security and Privacy, pages 144-155, Oackland CA, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
18
-
-
85084163313
-
Synthesizing fast intrusion prevention/detection systems from high-level specifications
-
Washington DC, USA, August
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion prevention/detection systems from high-level specifications. In Proceedings of the 8th USENIX Security Symposium, pages 63-78, Washington DC, USA, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 63-78
-
-
Sekar, R.1
Uppuluri, P.2
-
23
-
-
85084161648
-
Confining root programs with domain and type enforcement (DTE)
-
San Jose, California, USA, July
-
K. M. Walker, D. F. Sterne, M. L. Badger, M. J. Petkac, D. L. Shermann, and K. Oostendorp. Confining root programs with domain and type enforcement (DTE). In Proceeding of the 6th USENIX UNIX Security Symposium, San Jose, California, USA, July 1996.
-
(1996)
Proceeding of the 6th USENIX UNIX Security Symposium
-
-
Walker, K.M.1
Sterne, D.F.2
Badger, M.L.3
Petkac, M.J.4
Shermann, D.L.5
Oostendorp, K.6
|