-
1
-
-
36049003614
-
-
M. Abadi, M. Budiu, U. Erlingsson and J. Ligatti, Control_flow Integrity, in ACM CSS05, Nov, 2005.
-
M. Abadi, M. Budiu, U. Erlingsson and J. Ligatti, "Control_flow Integrity", in ACM CSS05, Nov, 2005.
-
-
-
-
2
-
-
0003465202
-
Univ. of Wisconsin CS Dept. Technical Report, No. 1342
-
June
-
T. Austin and D. Burger, "The SimpleScalar Tool Set". Univ. of Wisconsin CS Dept. Technical Report, No. 1342, June 1997.
-
(1997)
-
-
Austin, T.1
Burger, D.2
-
5
-
-
0014814325
-
Space/Time Tradeoffs in Hash Coding with Allowable Errors, in
-
B. Bloom, "Space/Time Tradeoffs in Hash Coding with Allowable Errors", in Communications of the ACM 13:7, 1970
-
(1970)
Communications of the ACM
, vol.13
, pp. 7
-
-
Bloom, B.1
-
6
-
-
0030149507
-
CACTI: An enhanced cache access and cycle time model
-
May
-
S. Wilton, N. Jouppi, "CACTI: An enhanced cache access and cycle time model", IEEE JSSC, Vol. 31(5) May, 1996.
-
(1996)
IEEE JSSC
, vol.31
, Issue.5
-
-
Wilton, S.1
Jouppi, N.2
-
8
-
-
85062418620
-
Non-Control-Data Attacks Are Realistic Threats
-
Aug
-
S. Chen, J. Xu, Emre C. Sezer, P. Gauriar, and R. Iyer. "Non-Control-Data Attacks Are Realistic Threats", in Proceedings of USENIX Security Symposium, Aug. 2005.
-
(2005)
Proceedings of USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.5
-
9
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
June
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, R. Iyer. "Defeating Memory Corruption Attacks via Pointer Taintedness Detection". In Proceedings of Inte'l Conf. on Dependable Systems and Networks (DSN), June, 2005.
-
(2005)
Proceedings of Inte'l Conf. on Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.5
-
10
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Jan
-
th USENIX Security Symposium, Jan 1998.
-
(1998)
th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walphole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
70349100099
-
Anomaly Detection Using Call Stack Information
-
May
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, W. Gong, "Anomaly Detection Using Call Stack Information", IEEE Symposium on Security and Privacy, May, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
13
-
-
0029716418
-
A Sense of Self for Unix Processes
-
S. Forrest, S. Hofmeyr, A. Somayajo, T. Longstaff, "A Sense of Self for Unix Processes", IEEE Symp.on Security and Privacy, 1996.
-
(1996)
IEEE Symp.on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.2
Somayajo, A.3
Longstaff, T.4
-
15
-
-
14844297052
-
Gray-Box Extraction of Execution Graphs for Anomaly Detection
-
D. Gao, M. Reiter, D. Song, "Gray-Box Extraction of Execution Graphs for Anomaly Detection", in the ACM CCS conf, 2004.
-
(2004)
the ACM CCS conf
-
-
Gao, D.1
Reiter, M.2
Song, D.3
-
18
-
-
33947731872
-
Microarchitectural Protection Against Buffer Overflow Attack
-
July
-
Y. Park, Z. Zhang, G. Lee, "Microarchitectural Protection Against Buffer Overflow Attack", IEEE Micro, July, 2006.
-
(2006)
IEEE Micro
-
-
Park, Y.1
Zhang, Z.2
Lee, G.3
-
20
-
-
0034829697
-
A fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
R. Sekar, M. Bendre, P. Bollineni, D. Dhurjati, "A fast Automaton-Based Method for Detecting Anomalous Program Behaviors", In Proc. of IEEE Symp. on Security & Privacy, 2001.
-
(2001)
Proc. of IEEE Symp. on Security & Privacy
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
26
-
-
0038011184
-
Mimicry Attack on Host-based Intrusion detection system
-
Nov
-
D. Wagner and P. Soto, "Mimicry Attack on Host-based Intrusion detection system", In ACM CSS 02, Nov. 2002.
-
(2002)
ACM CSS 02
-
-
Wagner, D.1
Soto, P.2
-
28
-
-
0027836605
-
Alternative Implementations of Two-Level Adaptive Training Branch Prediction
-
T. Yeh and Y. Patt, "Alternative Implementations of Two-Level Adaptive Training Branch Prediction", in Proc. of the 19th ISCA, 1992.
-
(1992)
Proc. of the 19th ISCA
-
-
Yeh, T.1
Patt, Y.2
-
29
-
-
29144462647
-
Anomalous Path Detection with Hardware Support
-
T. Zhang, X. Zhuang, W. Lee, S. Pande, "Anomalous Path Detection with Hardware Support," in Proc. of CASES, 2005.
-
(2005)
Proc. of CASES
-
-
Zhang, T.1
Zhuang, X.2
Lee, W.3
Pande, S.4
|