-
1
-
-
39049106556
-
-
A. Conry-Murray. Product focus: Behavior-blocking stops unknown malicious code. http://www.networkmagazine.com/shared/article/showArticle.jhtml? articleld=8703363&classroom=, June 2002.
-
A. Conry-Murray. Product focus: Behavior-blocking stops unknown malicious code. http://www.networkmagazine.com/shared/article/showArticle.jhtml? articleld=8703363&classroom=, June 2002.
-
-
-
-
3
-
-
84885664275
-
Labels and event processes in the asbestosoperating system
-
October
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazires, F. Kaashoek, and R. Morris. Labels and event processes in the asbestosoperating system. In Proceedings of the 20th ACM Symposium on Operating Systems Principles, pages 17-30, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazires, D.7
Kaashoek, F.8
Morris, R.9
-
4
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing Journal, 17(2):143-147, May 1974.
-
(1974)
Computing Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
5
-
-
84885626052
-
-
GrammaTech, Inc
-
GrammaTech, Inc. Codesurfer. http://www.grammatech.com/products/ codesurfer/.
-
Codesurfer
-
-
-
7
-
-
33845596148
-
Automatic extraction of highly accurate application-specific sandboxing policy
-
Sophia Antipolis, French Riviera, France, September 15-17
-
L. C. Lam and T. Chiueh. Automatic extraction of highly accurate application-specific sandboxing policy. In Seventh International Symposium on Recent Advances in Intrusion Detection, Sophia Antipolis, French Riviera, France, September 15-17 2004.
-
(2004)
Seventh International Symposium on Recent Advances in Intrusion Detection
-
-
Lam, L.C.1
Chiueh, T.2
-
14
-
-
39049100925
-
-
Perl. Perlsec. http://perldoc.perl.org/perlsec.html.
-
Perlsec
-
-
-
16
-
-
3543056029
-
Flow Caml in a nutshell
-
G. Hutton, editor, Nottingham, United Kingdom, March
-
V. Simonet. Flow Caml in a nutshell. In G. Hutton, editor, Proceedings of the first APPSEM-II workshop, pages 152-165, Nottingham, United Kingdom, March 2003.
-
(2003)
Proceedings of the first APPSEM-II workshop
, pp. 152-165
-
-
Simonet, V.1
-
17
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
October
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85-96, October 2004.
-
(2004)
Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
18
-
-
39049122157
-
-
Tiny Software
-
Tiny Software. Tiny firewall 6. http://www.tinysoftware.com/home/ tiny2?s=7807136686411155049Al&&pg=content05&an=tf6_home.
-
Tiny firewall
, vol.6
-
-
-
19
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
August
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, pages 121-136, August 2006.
-
(2006)
15th USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
20
-
-
33745936911
-
A feather-weight virtual machine for windows applications
-
June
-
Y. Yu, F. Guo, S. Nanda, L. C. Lam, and T. Chiueh. A feather-weight virtual machine for windows applications. In Proceedings of the 2nd ACM/USENIX Conference on Virtual Execution Environments (VEE'06), June 2006.
-
(2006)
Proceedings of the 2nd ACM/USENIX Conference on Virtual Execution Environments (VEE'06)
-
-
Yu, Y.1
Guo, F.2
Nanda, S.3
Lam, L.C.4
Chiueh, T.5
|