-
1
-
-
0030697765
-
Building Diverse Computer Systems
-
HotOS-VI, IEEE CS Press
-
S. Forrest, A. Somayaji, and D. Ackley, "Building Diverse Computer Systems," Proc. 6th Workshop Hot Topics in Operating Systems (HotOS-VI), IEEE CS Press, 1997, p. 67.
-
(1997)
Proc. 6th Workshop Hot Topics in Operating Systems
, pp. 67
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
2
-
-
0017792448
-
On the Implementation of N-Version Programming for Software Fault Tolerance During Execution
-
IEEE Press
-
A. Avizienis and L. Chen, "On the Implementation of N-Version Programming for Software Fault Tolerance During Execution," Proc. 1st IEEE Int'l Computer Science Applications Conf., IEEE Press, 1977, pp. 149-155.
-
(1977)
Proc. 1st IEEE Int'l Computer Science Applications Conf
, pp. 149-155
-
-
Avizienis, A.1
Chen, L.2
-
3
-
-
0023997325
-
Data Diversity: An Approach to Software Fault Tolerance
-
P.E. Ammann and J.C. Knight, "Data Diversity: An Approach to Software Fault Tolerance," IEEE Trans. Computer, vol. 37, no. 4, 1988, pp. 418-425.
-
(1988)
IEEE Trans. Computer
, vol.37
, Issue.4
, pp. 418-425
-
-
Ammann, P.E.1
Knight, J.C.2
-
8
-
-
85084162336
-
Secure Execution via Program Shepherding
-
Usenix Assoc
-
V. Kiriansky, D. Bruening, and S.P. Amarasinghe, "Secure Execution via Program Shepherding," Proc. 11th Usenix Security Symp., Usenix Assoc., 2002, pp. 191-206.
-
(2002)
Proc. 11th Usenix Security Symp
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
9
-
-
32344441314
-
StackGuard: Simple Stack Smash Protection for GCC
-
C. Cowan and P. Wagle, "StackGuard: Simple Stack Smash Protection for GCC," Proc. GCC Developers Summit, 2003; www.gccsummit.org/2003.
-
(2003)
Proc. GCC Developers Summit
-
-
Cowan, C.1
Wagle, P.2
-
10
-
-
0542409578
-
Can Viruses Ever Be Useful?
-
H. Thimbleby, "Can Viruses Ever Be Useful?" Computers and Security, vol. 10, no. 2, 1991, pp. 111-114.
-
(1991)
Computers and Security
, vol.10
, Issue.2
, pp. 111-114
-
-
Thimbleby, H.1
-
11
-
-
18744376889
-
Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks
-
ACM Press
-
E.G. Barrantes et al., "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks," Proc. 10th ACM Conf. Computer and Comm. Security (CCS 03), ACM Press, 2003, pp. 281-289.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS 03)
, pp. 281-289
-
-
Barrantes, E.G.1
-
12
-
-
14844317200
-
Countering Code-Injection Attacks with Instruction-Set Randomization
-
ACM Press
-
G.S. Kc, A.D. Keromytis, and V. Prevelakis, "Countering Code-Injection Attacks with Instruction-Set Randomization," Proc. 10th ACM Conf. Computer and Comm. Security (CCS 03), ACM Press, 2003, pp. 272-280.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS 03)
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
13
-
-
33745944184
-
Secure and Practical Defense against Code-Injection Attacks Using Software Dynamic Translation
-
ACM Press
-
W. Hu et al., "Secure and Practical Defense against Code-Injection Attacks Using Software Dynamic Translation," Proc. 2nd Int'l Conf Virtual Execution Environments, ACM Press, 2006, pp. 2-12.
-
(2006)
Proc. 2nd Int'l Conf Virtual Execution Environments
, pp. 2-12
-
-
Hu, W.1
-
14
-
-
4544257315
-
Link-Time Optimization of ARM Binaries
-
B. De Bus et al., "Link-Time Optimization of ARM Binaries," ACM SIGPLAN Notices, vol. 39, no. 7, 2004, pp. 211-220.
-
(2004)
ACM SIGPLAN Notices
, vol.39
, Issue.7
, pp. 211-220
-
-
De Bus, B.1
|