-
1
-
-
85084161234
-
Mapbox: Using parameterized behavior classes to confine applications
-
A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In USENIX Security Symposium, 2000.
-
(2000)
USENIX Security Symposium
-
-
Acharya, A.1
Raje, M.2
-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Technical Report MTR-2547, 1, MITRE Corp, Bedford, MA
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
-
(1973)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
4
-
-
27644599042
-
Privtrans: Automatic privilege separation
-
San Diego
-
D. Brumley and D. Song. Privtrans: Automatic privilege separation. In USENIX Security Symposium, San Diego, 2004.
-
(2004)
USENIX Security Symposium
-
-
Brumley, D.1
Song, D.2
-
6
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Symposium on Operating Systems Design and Implementation (OSDI), 2000.
-
(2000)
Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
7
-
-
85180527583
-
Traps and pitfalls: Practical problems in in system call interposition based security tools
-
T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
-
9
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Washington, D.C, August
-
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
12
-
-
79953672829
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
San Diego
-
J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Network and Distributed System Security Symposium (NDSS), San Diego, 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
14
-
-
84878346861
-
Improving host security with system call policies
-
N. Provos. Improving host security with system call policies. In 12th USENIX Security Symposium, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Provos, N.1
-
15
-
-
85048404745
-
Preventing privilege escalation
-
Washington, D.C, August
-
N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In USENIX Security Symposium, Washington, D.C., August 2003.
-
(2003)
USENIX Security Symposium
-
-
Provos, N.1
Friedl, M.2
Honeyman, P.3
-
18
-
-
21644444136
-
Model carrying code: A practical approach for safe execution of untrusted applications
-
Bolton Landing, New York, October
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. DuVarney. Model carrying code: a practical approach for safe execution of untrusted applications. In ACM Symposium on Operating System Principles, Bolton Landing, New York, October 2003.
-
(2003)
ACM Symposium on Operating System Principles
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.C.5
-
19
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, D.C, August
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
20
-
-
0000990322
-
A survey of program slicing techniques
-
F. Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
-
(1995)
Journal of programming languages
, vol.3
, pp. 121-189
-
-
Tip, F.1
-
21
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
23
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|