-
1
-
-
0023997325
-
Data Diversity: An Approach to Software Fault Tolerance
-
P. E. Amman and J. C. Knight. Data Diversity: an Approach to Software Fault Tolerance. IEEE Trans. On Computers, 37 (4), pp. 418-25, 1988.
-
(1988)
IEEE Trans. On Computers
, vol.37
, Issue.4
, pp. 418-425
-
-
Amman, P.E.1
Knight, J.C.2
-
4
-
-
0017792448
-
-
A. Avizienis and L. Chen. On the Implementation of N-version Programming for Software Fault-Tolerance During Program Execution. International Computer Software and Applications Conference. 1977
-
A. Avizienis and L. Chen. On the Implementation of N-version Programming for Software Fault-Tolerance During Program Execution. International Computer Software and Applications Conference. 1977.
-
-
-
-
6
-
-
18744376889
-
Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks
-
E. Barrantes, D. Ackley, S. Forrest, T. Palmer, D. Stefanovic, D. Zovi. Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks. ACM Computer and Communications Security. 2003.
-
(2003)
ACM Computer and Communications Security
-
-
Barrantes, E.1
Ackley, D.2
Forrest, S.3
Palmer, T.4
Stefanovic, D.5
Zovi, D.6
-
8
-
-
84954188728
-
Efficient Techniques for Comprehensive Protection from Memory Error Exploits
-
S. Bhatkar, D. DuVarney, and R. Sekar. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. Usenix Security. 2005.
-
(2005)
Usenix Security
-
-
Bhatkar, S.1
DuVarney, D.2
Sekar, R.3
-
11
-
-
0003052123
-
-
L. Chen and Algirdas Avizienis. N-Version Programming: A Fault Tolerance Approach to Reliability of Software Operation. Fault Tolerant Computing Symposium. 1978.
-
L. Chen and Algirdas Avizienis. N-Version Programming: A Fault Tolerance Approach to Reliability of Software Operation. Fault Tolerant Computing Symposium. 1978.
-
-
-
-
13
-
-
14944374640
-
Mitigating Buffer Overflows by Operating System Randomization
-
Tech Report CMU-CS-02-197. December
-
M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Tech Report CMU-CS-02-197. December 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
17
-
-
0141717668
-
Tabulating the Heavens: Computing the Nautical Alamanac in 18th-Century England
-
M. Croarken. Tabulating the Heavens: Computing the Nautical Alamanac in 18th-Century England. IEEE Annals of the History of Computing. 2003.
-
(2003)
IEEE Annals of the History of Computing
-
-
Croarken, M.1
-
18
-
-
53349156326
-
-
H. Etoh. GCC extension for protecting applications from stack-smashing attacks. IBM. 2004. http://www.trl.ibm.com/projects/security/ssp
-
H. Etoh. GCC extension for protecting applications from stack-smashing attacks. IBM. 2004. http://www.trl.ibm.com/projects/security/ssp
-
-
-
-
20
-
-
53349117729
-
Understanding and Countering Insider Threats in Software Development
-
ICS-TR-07-09
-
M. Franz. Understanding and Countering Insider Threats in Software Development. UC Irvine Technical Report ICS-TR-07-09. 2007.
-
(2007)
UC Irvine Technical Report
-
-
Franz, M.1
-
22
-
-
53349096727
-
Beyond Output Voting: Detecting Compromised Replicas using Behavioral Distance
-
D. Gao, M. K. Reiter, D. Song. Beyond Output Voting: Detecting Compromised Replicas using Behavioral Distance. Tech Report, CMU-CYLAB-06-019. 2006.
-
(2006)
Tech Report, CMU-CYLAB-06-019
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
25
-
-
33745944184
-
Secure and Practical Defense Against Code-injection Attacks Using Software Dynamic Translation
-
W. Hu, J. Hiser, D. Williams, A. Filipi, J. Davidson, D. Evans, J. Knight, A. Nguyen-Tuong, J. Rowanhill. Secure and Practical Defense Against Code-injection Attacks Using Software Dynamic Translation. Virtual Execution Environments. 2006.
-
(2006)
Virtual Execution Environments
-
-
Hu, W.1
Hiser, J.2
Williams, D.3
Filipi, A.4
Davidson, J.5
Evans, D.6
Knight, J.7
Nguyen-Tuong, A.8
Rowanhill, J.9
-
27
-
-
2642547091
-
Learning Unknown Attacks - A Start
-
J. Just, J. Reynolds, L. Clough, M. Danforth, K. Levitt, R. Maglich, J. Rowe. Learning Unknown Attacks - A Start. Recent Advances Intrusion Detection. 2002.
-
(2002)
Recent Advances Intrusion Detection
-
-
Just, J.1
Reynolds, J.2
Clough, L.3
Danforth, M.4
Levitt, K.5
Maglich, R.6
Rowe, J.7
-
29
-
-
0022581573
-
An Experimental Evaluation of the Assumption of Independence in Multi-version Programming
-
Jan
-
J. C. Knight and N. Leveson. An Experimental Evaluation of the Assumption of Independence in Multi-version Programming. IEEE Transactions on Software Engineering, Vol 12, No 1. Jan 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
-
-
Knight, J.C.1
Leveson, N.2
-
30
-
-
33745220279
-
Detection and Prevention of Stack Buffer Overflow Attacks
-
Nov
-
B. Kuperman, C. Brodley, H. Ozdoganoglu, T. Vijaykumar, A. Jalote. Detection and Prevention of Stack Buffer Overflow Attacks. Comm. of the ACM, Nov 2005.
-
(2005)
Comm. of the ACM
-
-
Kuperman, B.1
Brodley, C.2
Ozdoganoglu, H.3
Vijaykumar, T.4
Jalote, A.5
-
31
-
-
85084164558
-
Statically Detecting Likely Buffer Overflow Vulnerabilities
-
D. Larochelle and D. Evans. Statically Detecting Likely Buffer Overflow Vulnerabilities. USENIX Security. 2001.
-
(2001)
USENIX Security
-
-
Larochelle, D.1
Evans, D.2
-
33
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. Network and Distributed System Security. 2005.
-
(2005)
Network and Distributed System Security
-
-
Newsome, J.1
Song, D.2
-
35
-
-
22944446325
-
The Design and Implementation of an Intrusion Tolerant System
-
OASIS
-
J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich, K. Levitt. The Design and Implementation of an Intrusion Tolerant System. Foundations of Intrusion Tolerant Systems (OASIS). 2003.
-
(2003)
Foundations of Intrusion Tolerant Systems
-
-
Reynolds, J.1
Just, J.2
Lawson, E.3
Clough, L.4
Maglich, R.5
Levitt, K.6
-
36
-
-
33745773931
-
Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking
-
M. Ringenburg and D. Grossman. Preventing Format-String Attacks via Automatic and Efficient Dynamic Checking. ACM Comp. Comm. Security. 2005.
-
(2005)
ACM Comp. Comm. Security
-
-
Ringenburg, M.1
Grossman, D.2
-
37
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization
-
H. Snacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, D. Boneh. On the Effectiveness of Address-Space Randomization. ACM Computer and Communications Security. 2004.
-
(2004)
ACM Computer and Communications Security
-
-
Snacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
38
-
-
84906818067
-
Where's the FEEB?: The Effectiveness of Instruction Set Randomization
-
A. N. Sovarel, D. Evans, N. Paul. Where's the FEEB?: The Effectiveness of Instruction Set Randomization. USENIX Security 2005.
-
(2005)
USENIX Security
-
-
Sovarel, A.N.1
Evans, D.2
Paul, N.3
-
40
-
-
21644470294
-
Hardware and Binary Modification Support for Code Pointer Protection from Buffer Overflow
-
Dec
-
N. Tuck, B. Calder, and G. Varghese. Hardware and Binary Modification Support for Code Pointer Protection from Buffer Overflow. Intl. Symposium on Microarchitecture. Dec 2004.
-
(2004)
Intl. Symposium on Microarchitecture
-
-
Tuck, N.1
Calder, B.2
Varghese, G.3
-
41
-
-
53349176530
-
-
VeriTest Corporation
-
VeriTest Corporation. WebBench 5.0. http://www.veritest.com/ benchmarks/webbench
-
WebBench 5.0
-
-
-
43
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. USENIX Security. 2006.
-
(2006)
USENIX Security
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|