-
1
-
-
0041350423
-
Design and Implementation of a Distributed Virtual Machine for Networked Computers
-
Dec
-
E.G. Sirer et al., "Design and Implementation of a Distributed Virtual Machine for Networked Computers," Proc. 17th Symp. Operating Systems Principles, pp. 202-216, Dec. 1999.
-
(1999)
Proc. 17th Symp. Operating Systems Principles
, pp. 202-216
-
-
Sirer, E.G.1
-
2
-
-
2642520196
-
A Binary Rewriting Defense against Stack-Based Buffer Overflow Attacks
-
June
-
M. Prasad and T. Chiueh, "A Binary Rewriting Defense against Stack-Based Buffer Overflow Attacks," Proc. Usenix Ann. Technical Conf., June 2003.
-
(2003)
Proc. Usenix Ann. Technical Conf
-
-
Prasad, M.1
Chiueh, T.2
-
4
-
-
0000596666
-
Purify: A Tool for Detecting Memory Leaks and Access Errors in C and C++ Programs
-
Jan
-
R. Hastings and B. Joyce, "Purify: A Tool for Detecting Memory Leaks and Access Errors in C and C++ Programs," Proc. Winter Usenix Conf. pp. 125-138, Jan. 1992.
-
(1992)
Proc. Winter Usenix Conf
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
5
-
-
0012889295
-
A Language-Based Approach to Security
-
F.B. Schneider et al., "A Language-Based Approach to Security," Informatics, pp. 86-101, 2001.
-
(2001)
Informatics
, pp. 86-101
-
-
Schneider, F.B.1
-
10
-
-
2942536699
-
Rico: A Security Proxy for Mobile Code
-
Y. Song and B.D. Fleisch, "Rico: A Security Proxy for Mobile Code," Computers & Security, vol. 23, no. 4, pp. 338-351, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 338-351
-
-
Song, Y.1
Fleisch, B.D.2
-
12
-
-
36349009527
-
Libsafe: Protecting Critical Elements of Stacks
-
Avaya Inc, Feb
-
A. Baratloo, N. Singh, and T. Tsai, "Libsafe: Protecting Critical Elements of Stacks," White Paper 3-21-01, Avaya Labs, Avaya Inc., Feb. 2001.
-
(2001)
White Paper 3-21-01, Avaya Labs
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
16
-
-
85084160243
-
Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Jan
-
C. Cowan et al., "Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh Usenix Security Symp., pp. 63-78, Jan. 1998.
-
(1998)
Proc. Seventh Usenix Security Symp
, pp. 63-78
-
-
Cowan, C.1
-
17
-
-
0000162467
-
Compiler Techniques for Code Compaction
-
S. Debray, W. Evans, R. Muth, and B.D. Sutter, "Compiler Techniques for Code Compaction," ACM Trans. Programming Languages and Systems, vol. 22, no. 2, pp. 378-415, 2000.
-
(2000)
ACM Trans. Programming Languages and Systems
, vol.22
, Issue.2
, pp. 378-415
-
-
Debray, S.1
Evans, W.2
Muth, R.3
Sutter, B.D.4
-
18
-
-
0033905645
-
-
C. Cifuentes and M. Emmerik, UQBT: Adaptable Binary Translation at Low Cost, Computer, 33, no. 3, p,p. 60-66, Mar. 2000.
-
C. Cifuentes and M. Emmerik, "UQBT: Adaptable Binary Translation at Low Cost," Computer, vol. 33, no. 3, p,p. 60-66, Mar. 2000.
-
-
-
-
19
-
-
19944382870
-
Instrumentation and Optimization of Wm32/Intel Executables Using Etch
-
Aug
-
T. Romer et al., "Instrumentation and Optimization of Wm32/Intel Executables Using Etch," Proc. First Usenix Windows NT Workshop, Aug. 1997.
-
(1997)
Proc. First Usenix Windows NT Workshop
-
-
Romer, T.1
-
23
-
-
0034543798
-
An API for Runtime Code Patching
-
B. Buck and J.K. HIlingsworth, "An API for Runtime Code Patching," Int'l J. High Performance Computing Applications, vol. 14, no. 4, pp. 317-329, 2000.
-
(2000)
Int'l J. High Performance Computing Applications
, vol.14
, Issue.4
, pp. 317-329
-
-
Buck, B.1
HIlingsworth, J.K.2
-
24
-
-
0004316595
-
Measuring Proxy Performance with the Wisconsin Proxy Benchmark
-
Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin, Madison, Apr
-
J. Almeida and P. Cao, "Measuring Proxy Performance with the Wisconsin Proxy Benchmark," Technical Report 1373, Computer Sciences Dept, Univ. of Wisconsin, Madison, Apr. 1998.
-
(1998)
-
-
Almeida, J.1
Cao, P.2
-
25
-
-
36348947150
-
-
CERT Security Report #237777, http://www.kb.cert.org/vuls/id/237777, 2002.
-
CERT Security Report #237777, http://www.kb.cert.org/vuls/id/237777, 2002.
-
-
-
-
26
-
-
36348977200
-
-
CERT Security Report #447569, http://www.kb.cert.org/vuls/id/447569, 2005.
-
CERT Security Report #447569, http://www.kb.cert.org/vuls/id/447569, 2005.
-
-
-
-
29
-
-
36349016318
-
-
Web Polygraph, http://www.web-polygraph.org, 2006.
-
(2006)
Web Polygraph
-
-
-
30
-
-
36348962702
-
-
Apache Document, http://www.apache.org/, 2006.
-
(2006)
Apache Document
-
-
-
32
-
-
36348982427
-
-
IRCache Project
-
IRCache Project, http://www.ircache.net/, 2006.
-
(2006)
-
-
-
34
-
-
36349015110
-
-
Finjan Software Documentation
-
Finjan Software Documentation, http://www.finjan.com, 2006.
-
(2006)
-
-
-
35
-
-
36349009526
-
-
Access Control Documentation
-
Access Control Documentation, http://groups.northwestern.edu/exec/ htmldocs/NT_Security.html, 2006.
-
(2006)
-
-
|