-
1
-
-
33646767376
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2005).
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
ABADI, M.1
BUDIU, M.2
ERLINGSSON, U.3
LIGATTI, J.4
-
8
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
COSTA, M., CROWCROFT, J., CASTRO, M., AND ROWSTRON, A. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
COSTA, M.1
CROWCROFT, J.2
CASTRO, M.3
ROWSTRON, A.4
-
9
-
-
85084160243
-
Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the USENIX Security Symposium (1998).
-
(1998)
Proceedings of the USENIX Security Symposium
-
-
COWAN, C.1
PU, C.2
MAIER, D.3
HINTON, H.4
WALPOLE, J.5
BAKKE, P.6
BEATTIE, S.7
GRIER, A.8
WAGLE, P.9
ZHANG, Q.10
-
10
-
-
34548717095
-
ShieldGen: Automated Data Patch Generation for Unknown Vulnerabilities with Informed Probing
-
(May)
-
CUI, W., PEINADO, M., WANG, H. J., AND LOCASTO, M. E. ShieldGen: Automated Data Patch Generation for Unknown Vulnerabilities with Informed Probing. In Proceedings of the IEEE Symposium on Security and Privacy (May 2007).
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
CUI, W.1
PEINADO, M.2
WANG, H. J.3
LOCASTO, M. E.4
-
12
-
-
70349100099
-
Anomaly Detection Using Call Stack Information
-
(May)
-
FENG, H. H., KOLESNIKOV, O., FOGLA, P., LEE, W., AND GONG, W. Anomaly Detection Using Call Stack Information. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003).
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
-
FENG, H. H.1
KOLESNIKOV, O.2
FOGLA, P.3
LEE, W.4
GONG, W.5
-
15
-
-
0032313923
-
Intrusion Detection System Using Sequences of System Calls
-
HOFMEYR, S. A., SOMAYAJI, A., AND FORREST, S. Intrusion Detection System Using Sequences of System Calls. Journal of Computer Security 6, 3 (1998), 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
HOFMEYR, S. A.1
SOMAYAJI, A.2
FORREST, S.3
-
16
-
-
85160700488
-
-
H TTP://S ER G.CS.D R EXEL.ED U/COSAK/IND EX.SH TM L.
-
H TTP://S ER G.CS.D R EXEL.ED U/COSAK/IND EX.SH TM L.
-
-
-
-
20
-
-
70450249215
-
-
Tech. Rep. CUCS-005-07, Columbia University, January
-
LOCASTO, M. E., CRETU, G. F., STAVROU, A., AND KEROMYTIS, A. D. A Model for Automatically Repairing Execution Integrity. Tech. Rep. CUCS-005-07, Columbia University, January 2007.
-
(2007)
A Model for Automatically Repairing Execution Integrity
-
-
LOCASTO, M. E.1
CRETU, G. F.2
STAVROU, A.3
KEROMYTIS, A. D.4
-
23
-
-
31944440969
-
Building Customized Program Analysis Tools with Dynamic Instrumentation
-
(June)
-
LUK, C.-K., COHN, R., MUTH, R., PATIL, H., KLAUSER, A., LOWNEY, G., WALLACE, S., REDDI, V. J., AND HAZEL-WOOD., K. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proceedings of Programming Language Design and Implementation (PLDI) (June 2005).
-
(2005)
Proceedings of Programming Language Design and Implementation (PLDI)
-
-
LUK, C.-K.1
COHN, R.2
MUTH, R.3
PATIL, H.4
KLAUSER, A.5
LOWNEY, G.6
WALLACE, S.7
REDDI, V. J.8
HAZEL-WOOD9
Pin, K.10
-
28
-
-
84885578759
-
Rx: Treating Bugs as Allergies - A Safe Method to Survive Software Failures
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating Bugs as Allergies - A Safe Method to Survive Software Failures. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
QIN, F.1
TUCEK, J.2
SUNDARESAN, J.3
ZHOU, Y.4
-
30
-
-
34548776474
-
Using Rescue Points to Navigate Software Recovery (Short Paper)
-
(May)
-
SIDIROGLOU, S., LAADAN, O., KEROMYTIS, A. D., AND NIEH, J. Using Rescue Points to Navigate Software Recovery (Short Paper). In Proceedings of the IEEE Symposium on Security and Privacy (May 2007).
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
SIDIROGLOU, S.1
LAADAN, O.2
KEROMYTIS, A. D.3
NIEH, J.4
-
31
-
-
84906497159
-
Building a Reactive Immune System for Software Services
-
(April)
-
SIDIROGLOU, S., LOCASTO, M. E., BOYD, S. W., AND KEROMYTIS, A. D. Building a Reactive Immune System for Software Services. In Proceedings of the USENIX Annual Technical Conference (April 2005), pp. 149-161.
-
(2005)
Proceedings of the USENIX Annual Technical Conference
, pp. 149-161
-
-
SIDIROGLOU, S.1
LOCASTO, M. E.2
BOYD, S. W.3
KEROMYTIS, A. D.4
-
35
-
-
41149086696
-
Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms
-
TUCEK, J., LU, S., HUANG, C., XANTHOS, S., ZHOU, Y., NEWSOME, J., BRUMLEY, D., AND SONG, D. Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms. In EuroSys (2007).
-
(2007)
EuroSys
-
-
TUCEK, J.1
LU, S.2
HUANG, C.3
XANTHOS, S.4
ZHOU, Y.5
NEWSOME, J.6
BRUMLEY, D.7
SONG, D.8
|