-
2
-
-
48249101680
-
-
ARM Limited, Cited 14 Jan 2008
-
ARM Limited, ARM Technical Reference Manuals. http://www.arm.com/ documentation/ARMProcessor_Cores/Cited 14 Jan 2008
-
ARM Technical Reference Manuals
-
-
-
3
-
-
48249129248
-
Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness
-
United States Military Academy,West Point, New York, USA, pp
-
Bellettini C, Rrushi JL (2007) Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness. In: Proceedings of the 8th IEEE SMC Information Assurance Workshop, United States Military Academy,West Point, New York, USA, pp. 341-348
-
(2007)
Proceedings of the 8th IEEE SMC Information Assurance Workshop
, pp. 341-348
-
-
Bellettini, C.1
Rrushi, J.L.2
-
4
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
Japan
-
Chen Sh, Xu J, Nakka N, Kalbarczyk Z, Iyer RK (2005) Defeating Memory Corruption Attacks via Pointer Taintedness Detection. In: Proceedings of IEEE International Conference on Dependable Systems and Networks, Japan
-
(2005)
Proceedings of IEEE International Conference on Dependable Systems and Networks
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
5
-
-
0003344417
-
Partial commutation and traces, Handbook on Formal Languages
-
Diekert V, Mètivier Y (1997) Partial commutation and traces, Handbook on Formal Languages, 3rd volume, Springer: 457-533
-
(1997)
3rd volume, Springer
, pp. 457-533
-
-
Diekert, V.1
Mètivier, Y.2
-
6
-
-
70349100099
-
Anomaly Detection Using Call Stack Information
-
Oakland, California, USA
-
Feng H, Kolesnikov O.M., Fogla P., Lee W, Gong W (2003) Anomaly Detection Using Call Stack Information. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, USA
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
7
-
-
14844297052
-
Gray-box extraction of execution graphs for anomaly detection
-
Gao D, Reiter MK, Song D (2004) Gray-box extraction of execution graphs for anomaly detection. In: ACM CCS
-
(2004)
ACM CCS
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
8
-
-
48249136707
-
-
iDefense (2007) Livedata protocol server heap overflow vulnerability. http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523 Cited 14 Jan 2008
-
iDefense (2007) Livedata protocol server heap overflow vulnerability. http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=523 Cited 14 Jan 2008
-
-
-
-
9
-
-
26844434148
-
Structural properties of shuffle automata
-
Jedrzejowicz J (1999) Structural properties of shuffle automata. In: Grammars 2, number 1, 1999.
-
(1999)
Grammars
, vol.2
, Issue.1
-
-
Jedrzejowicz, J.1
-
10
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Baltimore, USA
-
Kruegel C, Kirda E, Mutz D, RobertsonW, Vigna G (2005) Automating mimicry attacks using static binary analysis. In: Proceedings of 14th Usenix Security Symposium, Baltimore, USA
-
(2005)
Proceedings of 14th Usenix Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
12
-
-
69249215749
-
-
Modbus Organization , Cited 14 Jan 2008
-
Modbus Organization (2004) MODBUS Application Protocol Specification V 1.1a. http://www.modbus.org/docs/Modbus_Application_protocol_V1_1a.pdf Cited 14 Jan 2008
-
(2004)
MODBUS Application Protocol Specification V 1.1a
-
-
-
14
-
-
0035354794
-
Playing inside the black box: Using dynamic instrumentation to create security holes
-
Letters
-
Miller BP, Christodorescu M, Iverson R, Kosar T, Mirgordskii A, Popovici F (2001) Playing inside the black box: Using dynamic instrumentation to create security holes. In: Parallel Processing Letters
-
(2001)
Parallel Processing
-
-
Miller, B.P.1
Christodorescu, M.2
Iverson, R.3
Kosar, T.4
Mirgordskii, A.5
Popovici, F.6
-
15
-
-
48249125553
-
-
Parampalli C, Sekar R, Johnson R (2007) A Practical Mimicry Attack Against Powerful System-Call Monitors. Technical Report SECLAB07-01, Secure Systems Laboratory, Stony Brook University, USA
-
Parampalli C, Sekar R, Johnson R (2007) A Practical Mimicry Attack Against Powerful System-Call Monitors. Technical Report SECLAB07-01, Secure Systems Laboratory, Stony Brook University, USA
-
-
-
-
18
-
-
34047144699
-
Common Vulnerabilities in Critical Infrastructure Control Systems
-
Albuquerque, NM
-
Stamp J, Dillinger J, Young W, DePoy J (2003) Common Vulnerabilities in Critical Infrastructure Control Systems. A Technical Report of Sandia National Laboratories, Albuquerque, NM
-
(2003)
A Technical Report of Sandia National Laboratories
-
-
Stamp, J.1
Dillinger, J.2
Young, W.3
DePoy, J.4
-
19
-
-
48249125127
-
-
US-CERT (2006) LiveData ICCP Server heap buffer overflow vulnerability. Vulnerability note VU#190617
-
US-CERT (2006) LiveData ICCP Server heap buffer overflow vulnerability. Vulnerability note VU#190617
-
-
-
-
20
-
-
48249139964
-
-
US-CERT (2007) Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles. Vulnerability note VU#926551
-
US-CERT (2007) Takebishi Electric DeviceXPlorer OPC Server fails to properly validate OPC server handles. Vulnerability note VU#926551
-
-
-
|