-
2
-
-
84871349041
-
Automatically Hardening Web Applications Using Precise Tainting
-
Nguyen-Tuong, A., Guarnieri, S., Greene, D., Shirley, J., Evans, D.: Automatically Hardening Web Applications Using Precise Tainting. In: 20th IFIP International Information Security Conference (2005)
-
(2005)
20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
3
-
-
17144416882
-
Dynamo: A transparent dynamic optimization system
-
Bala, V., Duesterwald, E., Banerjia, S.: Dynamo: a transparent dynamic optimization system. SIGPLAN Not. 35(5) (2000)
-
(2000)
SIGPLAN Not
, vol.35
, Issue.5
-
-
Bala, V.1
Duesterwald, E.2
Banerjia, S.3
-
6
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Technical Report MTR-2547, 1, MITRE Corp
-
Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, vol. 1, MITRE Corp. (1973)
-
(1973)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
8
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report. ESDTR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts
-
Biba, K.J.: Integrity considerations for secure computer systems. Technical Report. ESDTR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts (1977)
-
(1977)
-
-
Biba, K.J.1
-
9
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: Exe: automatically generating inputs of death. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security (2006)
-
(2006)
CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
10
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z., Iyer, R.K.: Defeating memory corruption attacks via pointer taintedness detection. In: IEEE International. Conference on Dependable Systems and Networks (DSN) (2005)
-
(2005)
IEEE International. Conference on Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
11
-
-
27544498541
-
Defeating Memory Corruption Attacks via Pointer Taintedness Detection
-
Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z., Iyer, R.K.: Defeating Memory Corruption Attacks via Pointer Taintedness Detection. In: DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005) (2005)
-
(2005)
DSN 2005: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
12
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Communications of the ACM 20(7) (1977)
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
-
-
Denning, D.E.1
Denning, P.J.2
-
13
-
-
84903607772
-
Dynamic spyware analysis
-
Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.: Dynamic spyware analysis. In: Usenix Tech Conference (2007)
-
(2007)
Usenix Tech Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
14
-
-
0016382977
-
Memoryless subsystems
-
Fenton, J.S.: Memoryless subsystems. Computing Journal 17(2) (1974)
-
(1974)
Computing Journal
, vol.17
, Issue.2
-
-
Fenton, J.S.1
-
17
-
-
33745304805
-
-
Luk, C., Colin, R., Mutli, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Janapa Reddi, V., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. SIGPLAN Not. 40(6) (2005)
-
Luk, C., Colin, R., Mutli, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Janapa Reddi, V., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. SIGPLAN Not. 40(6) (2005)
-
-
-
-
18
-
-
49949109140
-
-
McAfee. W32/hiv. virus information library (2000)
-
McAfee. W32/hiv. virus information library (2000)
-
-
-
-
19
-
-
49949117691
-
-
McAfee. W32/mydoom@mm. virus information library (2004)
-
McAfee. W32/mydoom@mm. virus information library (2004)
-
-
-
-
20
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: IEEE Symposium on Security and Privacy (1994)
-
(1994)
IEEE Symposium on Security and Privacy
-
-
McLean, J.1
-
21
-
-
49949114531
-
-
PhD thesis, Department, of Computer Science, Stevens Institute of Technology
-
Medel, R.: Typed Assembly Languages for Software Security. PhD thesis, Department, of Computer Science, Stevens Institute of Technology (2006)
-
(2006)
Typed Assembly Languages for Software Security
-
-
Medel, R.1
-
22
-
-
49949092544
-
-
Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for maiware detection. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, 4697. Springer, Heidelberg (2007)
-
Moser, A., Kruegel, C., Kirda, E.: Limits of static analysis for maiware detection. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, vol. 4697. Springer, Heidelberg (2007)
-
-
-
-
23
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
Myers, A.C.: JFlow: Practical mostly-static information flow control. In: ACM POPL, pp. 228-241 (1999)
-
(1999)
ACM POPL
, pp. 228-241
-
-
Myers, A.C.1
-
24
-
-
84886067644
-
BIRD: Binary interpretation using runtime disassembly
-
Nanda, S., Li, W., Lam, L., Chiueh, T.: BIRD: Binary interpretation using runtime disassembly. In: IEEE/ACM Conference on Code Generation and Optimization (CGO) (2006)
-
(2006)
IEEE/ACM Conference on Code Generation and Optimization (CGO)
-
-
Nanda, S.1
Li, W.2
Lam, L.3
Chiueh, T.4
-
28
-
-
33745661661
-
-
Pietraszek, T., Berghe, C.V.: Defending against injection attacks through context-sensitive suing evaluation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 124-145. Springer, Heidelberg (2006)
-
Pietraszek, T., Berghe, C.V.: Defending against injection attacks through context-sensitive suing evaluation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 124-145. Springer, Heidelberg (2006)
-
-
-
-
29
-
-
34748920692
-
Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. SIGOPS
-
Portokalidis, G., Slowinska, A., Bos, H.: Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. SIGOPS Oper. Syst. Rev. 40(4) (2006)
-
(2006)
Oper. Syst. Rev
, vol.40
, Issue.4
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
30
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting general security attacks
-
Qin, F., Wang, C., Li, Z., Kim, H., Zhou, Y., Wu, Y.: LIFT: A low-overhead practical information flow tracking system for detecting general security attacks. In: IEEE/ACM International Symposium, on Microarchitecture (2006)
-
(2006)
IEEE/ACM International Symposium, on Microarchitecture
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
31
-
-
49949115582
-
-
Wojtczuk, R.N.: The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 0x:0b(0x3o). Phile #0x04 of 0x0e (2001)
-
Wojtczuk, R.N.: The Advanced return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine 0x:0b(0x3o). Phile #0x04 of 0x0e (2001)
-
-
-
-
33
-
-
49949089498
-
-
Saxena, P., Sekar, R., Puranik, V.: A practical technique for integrity protection from untrusted plug-ins. Technical Report SECLAB08-01, Stony Brook University (2008)
-
Saxena, P., Sekar, R., Puranik, V.: A practical technique for integrity protection from untrusted plug-ins. Technical Report SECLAB08-01, Stony Brook University (2008)
-
-
-
-
34
-
-
37849037807
-
Characterizing bots' remote control behavior
-
Hammerli, B.M, Sommer, R, eds, DIMVA 2007, Springer, Heidelberg
-
Stinson, E., Mitchell, J.C.: Characterizing bots' remote control behavior. In: Hammerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 89-108. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4579
, pp. 89-108
-
-
Stinson, E.1
Mitchell, J.C.2
-
36
-
-
12844267418
-
Secure Program Execution via Dynamic Information Flow Tracking
-
Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure Program Execution via Dynamic Information Flow Tracking. In: ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems (2004)
-
(2004)
ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
37
-
-
49949087442
-
-
Szor, P.: The Art. of Computer Virus Research and Defense. Symantec Press (2005)
-
Szor, P.: The Art. of Computer Virus Research and Defense. Symantec Press (2005)
-
-
-
-
38
-
-
49949105867
-
-
TrendMicro. Bkdr.surila.g (w32/ratos). virus encyclopedia (2004)
-
TrendMicro. Bkdr.surila.g (w32/ratos). virus encyclopedia (2004)
-
-
-
-
40
-
-
84887309913
-
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
-
Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In: Proceeding of the Network and Distributed System Security Symposium (NDSS) (2007)
-
(2007)
Proceeding of the Network and Distributed System Security Symposium (NDSS)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
41
-
-
0001905093
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. Journal of Computer Security (JCS) 4(3) (1996)
-
(1996)
Journal of Computer Security (JCS)
, vol.4
, Issue.3
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
42
-
-
49949090309
-
-
Volpano, D.M.: Safety versus secrecy. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, 1694. Springer, Heidelberg (1999)
-
Volpano, D.M.: Safety versus secrecy. In: Cortesi, A., Filé, G. (eds.) SAS 1999. LNCS, vol. 1694. Springer, Heidelberg (1999)
-
-
-
-
43
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat, a wide range of attacks
-
Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: A practical approach to defeat, a wide range of attacks. In: USENIX Security Symposium (2006)
-
(2006)
USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
44
-
-
49949109537
-
-
Yin, H., Liang, Z., Song, D.: Hookfinder: Identifying and understanding maiware hooking behaviors. In: NDSS (2008)
-
Yin, H., Liang, Z., Song, D.: Hookfinder: Identifying and understanding maiware hooking behaviors. In: NDSS (2008)
-
-
-
-
45
-
-
77950788046
-
Panorama: Capturing system-wide information flow for maiware detection and analysis
-
Yin, H., Song, D., Manuel, E., Kruegel, C., Kirda, E.: Panorama: Capturing system-wide information flow for maiware detection and analysis. In: Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS 2007) (2007)
-
(2007)
Proceedings of the 14th ACM Conferences on Computer and Communication Security (CCS
-
-
Yin, H.1
Song, D.2
Manuel, E.3
Kruegel, C.4
Kirda, E.5
-
46
-
-
33745771350
-
A typed assembly language for confidentiality
-
Sestoft, P, ed, ESOP 2006 and ETAPS 2006, Springer, Heidelberg
-
Yu, D., Islam, N.: A typed assembly language for confidentiality. In: Sestoft, P. (ed.) ESOP 2006 and ETAPS 2006. LNCS, vol. 3924, pp. 162-179. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3924
, pp. 162-179
-
-
Yu, D.1
Islam, N.2
|