-
1
-
-
0041488497
-
-
CERT Coordination Center
-
CERT Coordination Center. Overview of attack trends. http://www.cert.org/ archive/pdf/attack_trends.pdf, 2002.
-
(2002)
Overview of attack trends
-
-
-
2
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Ikintedness Detection
-
Yokohama, Japan, June
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating Memory Corruption Attacks via Pointer Ikintedness Detection. In the Proceedings of the International Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June 2005.
-
(2005)
the Proceedings of the International Conference on Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
3
-
-
85062418620
-
Non-Control-Data Attacks Are Realistic Threats
-
Baltimore, MD, Aug
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-Control-Data Attacks Are Realistic Threats. In the Proceedings of the 14th USENIX Securiry Symposium, Baltimore, MD, Aug. 2005.
-
(2005)
the Proceedings of the 14th USENIX Securiry Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
4
-
-
85084160792
-
Understanding Data Lifetime via Whole system Simulation
-
Aug
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole system Simulation. In the Proceedings of the 13th USENIX Security Conference, Aug. 2004.
-
(2004)
the Proceedings of the 13th USENIX Security Conference
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
5
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Brighton, UK, Oct
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In the Proceedings of the 20th ACM Symposium on Operating Systems Principles, Brighton, UK, Oct. 2005.
-
(2005)
the Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
7
-
-
35348826542
-
-
Cross-Compiled Linux From Scratch. http://cross-lfs.org.
-
Cross-Compiled Linux From Scratch. http://cross-lfs.org.
-
-
-
-
8
-
-
77955972329
-
Deconstructing Hardware Architectures for Security
-
Boston, MA, June
-
M. Dalton, H. Kannan, and C. Kozyrakis. Deconstructing Hardware Architectures for Security. In the 5th Annual Workshop on Duplicating, Deconstructing, and Debunking, Boston, MA, June 2006.
-
(2006)
the 5th Annual Workshop on Duplicating, Deconstructing, and Debunking
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
9
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. ACM Communications, 20(7), 1977.
-
(1977)
ACM Communications
, vol.20
, Issue.7
-
-
Denning, D.E.1
Denning, P.J.2
-
10
-
-
85180406262
-
Ostia: A Delegating Architecture for Secure System Call Interposition
-
San Diego, CA, Feb
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A Delegating Architecture for Secure System Call Interposition. In the Proceedings of the 11th Network and Distributed Systems Security Symposium, San Diego, CA, Feb. 2004.
-
(2004)
the Proceedings of the 11th Network and Distributed Systems Security Symposium
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
11
-
-
84858360357
-
-
Imperva Inc, is it Out There: Zeroing in on the vulnerabilities of application security
-
Imperva Inc., How Safe is it Out There: Zeroing in on the vulnerabilities of application security, http://www.impervaom/company/news/2004-feb-02.html, 2004.
-
(2004)
How Safe
-
-
-
13
-
-
35348845024
-
SecuriFly: Runtime Protection and Recovery from. Web Application Vulnerabilities
-
Technical report, Stanford University, Sept
-
B. Livshits, M. Martin, and M. S. Lam. SecuriFly: Runtime Protection and Recovery from. Web Application Vulnerabilities. Technical report, Stanford University, Sept. 2006.
-
(2006)
-
-
Livshits, B.1
Martin, M.2
Lam, M.S.3
-
14
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
San Diego, CA, Feb
-
J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In the Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.
-
(2005)
the Proceedings of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.X.2
-
15
-
-
84871349041
-
Automatically Hardening Web Applications using Precise Tainting
-
Chiba, Japan, May
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically Hardening Web Applications using Precise Tainting. In Proceedings of the 20th IFIP Intl. Information Security Conference, Chiba, Japan, May 2005.
-
(2005)
Proceedings of the 20th IFIP Intl. Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
19
-
-
33645766952
-
-
President's Information Technology Advisory Committee PITAC, Feb
-
President's Information Technology Advisory Committee (PITAC). CyberSecurity: A Crisis of Prioritization. http://www.nitrd.gov/pitac/reports/ 20050301\_cybersecurity/cybersecurity.pdf, Feb. 2005.
-
(2005)
CyberSecurity: A Crisis of Prioritization
-
-
-
21
-
-
40349087553
-
LIFT A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
-
Orlando, FL, Dec
-
F. Qin, C. Wang, Z. Li, H. seop Kim, Y. Zhou, and Y Wu. LIFT A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In the Proceedings of the 39th the Intl. Symposium on Microarchitecture, Orlando, FL, Dec. 2006.
-
(2006)
the Proceedings of the 39th the Intl. Symposium on Microarchitecture
-
-
Qin, F.1
Wang, C.2
Li, Z.3
seop Kim, H.4
Zhou, Y.5
Wu, Y.6
-
22
-
-
33748870010
-
InfoShield: A Security Architecture for Protecting Information Usage in Memory
-
Austin, TX, Feb
-
W. Shi, H.-H. Lee, G. Gu, L. Falk, T. Mudge, and M. Ghosh. InfoShield: A Security Architecture for Protecting Information Usage in Memory. In Proceedings of the 12th Intl. Symposium on High-Performance Computer Architecture, Austin, TX, Feb. 2006.
-
(2006)
Proceedings of the 12th Intl. Symposium on High-Performance Computer Architecture
-
-
Shi, W.1
Lee, H.-H.2
Gu, G.3
Falk, L.4
Mudge, T.5
Ghosh, M.6
-
24
-
-
12844267418
-
Secure Program Execution via Dynamic Information Flow Tracking
-
Boston, MA, Oct
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In the Proceedings of the 11th Intl. Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, Oct. 2004.
-
(2004)
the Proceedings of the 11th Intl. Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
26
-
-
35348843266
-
-
Symantec Internet Security Threat Report, X: Trends for January 06 - June 06, Sept. 2006.
-
Symantec Internet Security Threat Report, Volume X: Trends for January 06 - June 06, Sept. 2006.
-
-
-
-
27
-
-
21644475650
-
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
-
Portland, OR, Dec
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In the Proceedings of the 37th Intl. Symposium on Microarchitecture, Portland, OR, Dec. 2004.
-
(2004)
the Proceedings of the 37th Intl. Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
28
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach, to defeat a wide range of attacks
-
Vancouver, Canada, Aug
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach, to defeat a wide range of attacks. In the Proceedings of the 15th USENIX Security Conference, Vancouver, Canada, Aug. 2006.
-
(2006)
the Proceedings of the 15th USENIX Security Conference
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|