-
1
-
-
52649110353
-
-
Cybersecurity: A crisis of prioritization. Technical report, Presidents Information Technology Advisory Committee (PITAC), Feb. 2005.
-
Cybersecurity: A crisis of prioritization. Technical report, Presidents Information Technology Advisory Committee (PITAC), Feb. 2005.
-
-
-
-
2
-
-
24344436426
-
The Blaster Worm: Then and Now
-
M. Bailey, E. Cooke, D. Watson, F. Jahanian, and J. Nazario. The Blaster Worm: Then and Now. IEEE Security & Privacy, 3(4):26-31, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Nazario, J.5
-
3
-
-
34547335786
-
TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting
-
W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting. In Proc. ISCC, 2006.
-
(2006)
Proc. ISCC
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
5
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
J. Clause, W. Li, and A. Orso. Dytan: a generic dynamic taint analysis framework. In Proc. ISSTA, pages 196-206, 2007.
-
(2007)
Proc. ISSTA
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
6
-
-
33845391802
-
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. In. Proc. SOSP, pages 133-147, 2005.
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. In. Proc. SOSP, pages 133-147, 2005.
-
-
-
-
7
-
-
21644482450
-
Minos: Control Data Attack Prevention Orthogonal to Memory Model
-
J. Crandall and F. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. Proc. Micro, pages 221-232, 2004.
-
(2004)
Proc. Micro
, pp. 221-232
-
-
Crandall, J.1
Chong, F.2
-
8
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
M. Dalton, H. Kannan, and C. Kozyrakis. Raksha: a flexible information flow architecture for software security. In Proc. ISCA, pages 482-493, 2007.
-
(2007)
Proc. ISCA
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
9
-
-
0032123777
-
The IA-64 architecture at work
-
C. Dulong. The IA-64 architecture at work. Computer, 31(7):24-32, 1998.
-
(1998)
Computer
, vol.31
, Issue.7
, pp. 24-32
-
-
Dulong, C.1
-
10
-
-
0034272461
-
Introducing the IA-64 architecture
-
J. Huck, D. Morris, J. Ross, A. Knies, H. Mulder, and R. Zahir. Introducing the IA-64 architecture. Micro, IEEE, 20(5): 12-23, 2000.
-
(2000)
Micro, IEEE
, vol.20
, Issue.5
, pp. 12-23
-
-
Huck, J.1
Morris, D.2
Ross, J.3
Knies, A.4
Mulder, H.5
Zahir, R.6
-
11
-
-
52649177512
-
Method, and system for deferring exceptions generated during speculative execution,
-
Nov. 25, US Patent 5,692, 169
-
V. Kathail, R. Gupta, B. Rau, M. Schlansker, W. Worley Jr, and F. Amerson. Method, and system for deferring exceptions generated during speculative execution, Nov. 25 1997. US Patent 5,692, 169.
-
(1997)
-
-
Kathail, V.1
Gupta, R.2
Rau, B.3
Schlansker, M.4
Worley Jr, W.5
Amerson, F.6
-
12
-
-
39049160206
-
A general dynamic information flow tracking framework for security applications
-
L. C. Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In Proc. ACSAC, 2006.
-
(2006)
Proc. ACSAC
-
-
Lam, L.C.1
cker Chiueh, T.2
-
13
-
-
52649153312
-
Coverage Maximization Using Dynamic Taint Tracing
-
Technical Report 112, MIT Lincoln Laboratory
-
T. Leek, G. Baker, R. Brown, M. Zhivich, and R. Lippmann. Coverage Maximization Using Dynamic Taint Tracing. Technical Report 112, MIT Lincoln Laboratory, 2007.
-
(2007)
-
-
Leek, T.1
Baker, G.2
Brown, R.3
Zhivich, M.4
Lippmann, R.5
-
14
-
-
0038039851
-
A compiler framework for speculative analysis and optimizations
-
J. Lin, T. Chen, W. Hsu, P. Yew, R. Ju, T. Ngai, and S. Chan. A compiler framework for speculative analysis and optimizations. In Proc. PLDI, pages 289-299, 2003.
-
(2003)
Proc. PLDI
, pp. 289-299
-
-
Lin, J.1
Chen, T.2
Hsu, W.3
Yew, P.4
Ju, R.5
Ngai, T.6
Chan, S.7
-
15
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In Proc. PLDI, pages 190-200, 2005.
-
(2005)
Proc. PLDI
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
16
-
-
0027695220
-
Sentinel scheduling: A model for compiler-controlled speculative execution
-
S. Mahlke, W. Chen, R. Bringmann, R. Hank, W. Hwu, B. Rau, and M. Schlansker. Sentinel scheduling: a model for compiler-controlled speculative execution. TOCS, 11(4):376-408, 1993.
-
(1993)
TOCS
, vol.11
, Issue.4
, pp. 376-408
-
-
Mahlke, S.1
Chen, W.2
Bringmann, R.3
Hank, R.4
Hwu, W.5
Rau, B.6
Schlansker, M.7
-
17
-
-
16244362392
-
Detecting and Debugging Insecure Information. Flows
-
W. Masri, A. Podgurski, and D. Leon. Detecting and Debugging Insecure Information. Flows. In Proc. ISSRE, pages 198-209, 2004.
-
(2004)
Proc. ISSRE
, pp. 198-209
-
-
Masri, W.1
Podgurski, A.2
Leon, D.3
-
18
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. NDSS, 2005.
-
(2005)
Proc. NDSS
-
-
Newsome, J.1
Song, D.2
-
19
-
-
52649173515
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In Proc. ISC, 2005.
-
(2005)
Proc. ISC
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
20
-
-
77957797161
-
Parallelizing security checks on commodity hardware
-
E. B. Nightingale, D. Peek, P. M. Chen, and J. Flinn. Parallelizing security checks on commodity hardware. In Proc. ASPLOS, pages 308-318, 2008.
-
(2008)
Proc. ASPLOS
, pp. 308-318
-
-
Nightingale, E.B.1
Peek, D.2
Chen, P.M.3
Flinn, J.4
-
21
-
-
33745213901
-
Defending against injection attacks through context-sensitive string evaluation
-
T. Pietraszek and C. V. Berghe. Defending against injection attacks through context-sensitive string evaluation. In Proc. RAID, 2005.
-
(2005)
Proc. RAID
-
-
Pietraszek, T.1
Berghe, C.V.2
-
22
-
-
40349087553
-
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In Proc. Micro, pages US-MS, 2006.
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In Proc. Micro, pages US-MS, 2006.
-
-
-
-
23
-
-
38849110791
-
The essence of command injection attacks in web applications
-
Z. Su and G. Wassermann. The essence of command injection attacks in web applications. In Proc. POPL, 2006.
-
(2006)
Proc. POPL
-
-
Su, Z.1
Wassermann, G.2
-
24
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proc. ASPLOS, pages 85-96, 2004.
-
(2004)
Proc. ASPLOS
, pp. 85-96
-
-
Suh, G.1
Lee, J.2
Zhang, D.3
Devadas, S.4
-
25
-
-
21644475650
-
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
-
N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni, J. Blome, G. Reis, M. Vachharajani, and D. August. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In Proc. Micro, pages 243-254, 2004.
-
(2004)
Proc. Micro
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.6
Reis, G.7
Vachharajani, M.8
August, D.9
-
26
-
-
52649133112
-
FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation
-
G. Venkataramani, I. Doudalis, Y. Solihin, and M. Prvulovic. FlexiTaint: Programmable Architectural Support for Efficient Dynamic Taint Propagation. In Proc. HPCA, 2008.
-
(2008)
Proc. HPCA
-
-
Venkataramani, G.1
Doudalis, I.2
Solihin, Y.3
Prvulovic, M.4
-
27
-
-
85038810709
-
Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proc. Usenix Security, 2006.
-
(2006)
Proc. Usenix Security
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|