-
3
-
-
84868893793
-
-
Php-post. http://scripts.ringsworld.com/discussion-boards/phpp/.
-
Php-post
-
-
-
7
-
-
33646767376
-
-
M. Abadi, M. Budiu, Úlfar Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In CCS, Nov 2005.
-
M. Abadi, M. Budiu, Úlfar Erlingsson, and J. Ligatti. Control-flow integrity: Principles, implementations, and applications. In CCS, Nov 2005.
-
-
-
-
8
-
-
60649111839
-
-
C. Anley. Advanced sql injection. An NGS Software Insight Security Research (NISR) Publication, June
-
C. Anley. Advanced sql injection. An NGS Software Insight Security Research (NISR) Publication, June.
-
-
-
-
10
-
-
33745956039
-
Framework for instruction-level tracing and analysis of program executions
-
S. Bhansali, W.-K. Chen, S. de Jong, A. Edwards, R. Murray, M. Drinić, D. Mihočka, and J. Chau. Framework for instruction-level tracing and analysis of program executions. In VEE, pages 154-163, 2006.
-
(2006)
VEE
, pp. 154-163
-
-
Bhansali, S.1
Chen, W.-K.2
de Jong, S.3
Edwards, A.4
Murray, R.5
Drinić, M.6
Mihočka, D.7
Chau, J.8
-
11
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
12
-
-
35048885595
-
Creating vulnerability signatures using weakest preconditions
-
D. Brumley, H. Wang, S. Jha, and D. Song. Creating vulnerability signatures using weakest preconditions. In IEEE Computer Security Foundations Symposium, pages 311-325, 2007.
-
(2007)
IEEE Computer Security Foundations Symposium
, pp. 311-325
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
13
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
M. Castro, M. Costa, and T. Harris. Securing software by enforcing data-flow integrity. In OSDI, pages 147-160, 2006.
-
(2006)
OSDI
, pp. 147-160
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
14
-
-
27544450000
-
Checking array bound violation using segmentation hardware
-
L. chung Lam. Checking array bound violation using segmentation hardware. In DSN, pages 388-397, 2005.
-
(2005)
DSN
, pp. 388-397
-
-
chung Lam, L.1
-
15
-
-
39049160206
-
A general dynamic information flow tracking framework for security applications
-
L. chung Lam and T. cker Chiueh. A general dynamic information flow tracking framework for security applications. In ACSAC, 2006.
-
(2006)
ACSAC
-
-
chung Lam, L.1
cker Chiueh, T.2
-
16
-
-
41149160709
-
Bouncer: Securing software by blocking bad input
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado. Bouncer: securing software by blocking bad input. In SOSP, pages 117-130, 2007.
-
(2007)
SOSP
, pp. 117-130
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
17
-
-
33845391802
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. SIGOPS Oper. Syst. Rev., 39(5):133-147, 2005.
-
(2005)
SIGOPS Oper. Syst. Rev
, vol.39
, Issue.5
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
18
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security, 1998.
-
(1998)
USENIX Security
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
19
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In Computer and communications security, pages 235-248, 2005.
-
(2005)
Computer and communications security
, pp. 235-248
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
20
-
-
34548717095
-
Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing
-
W. Cui, M. Peinado, H. J. Wang, and M. E. Locasto. Shieldgen: Automatic data patch generation for unknown vulnerabilities with informed probing. In IEEE Symposium on Security and Privacy, pages 252-266, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 252-266
-
-
Cui, W.1
Peinado, M.2
Wang, H.J.3
Locasto, M.E.4
-
21
-
-
31844450371
-
Dart: Directed automated random testing
-
June
-
P. Godefroid, N. Klarlund, and K. Sen. Dart: directed automated random testing. In PLDI, pages 213-223, June 2005.
-
(2005)
PLDI
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
24
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.-A. Kim and B. Karp. Autograph: toward automated, distributed worm signature detection. In USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
26
-
-
0024089764
-
Dynamic program slicing
-
B. Korel and J. Laski. Dynamic program slicing. Inf. Process. Lett., 29(3):155-163, 1988.
-
(1988)
Inf. Process. Lett
, vol.29
, Issue.3
, pp. 155-163
-
-
Korel, B.1
Laski, J.2
-
28
-
-
33846294027
-
Automatic generation of buffer overflow signatures: An approach based on program behavior models
-
Z. Liang and R. Sekar. Automatic generation of buffer overflow signatures: An approach based on program behavior models. In ACSAC 2005.
-
ACSAC 2005
-
-
Liang, Z.1
Sekar, R.2
-
29
-
-
33745800070
-
-
Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
-
Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In CCS, 2005.
-
-
-
-
31
-
-
83755167276
-
Dynamic multi-process information flow tracking for web application security
-
S. Nanda, L. chung Lam, and T. cker Chiueh. Dynamic multi-process information flow tracking for web application security. In Middleware 2007.
-
Middleware 2007
-
-
Nanda, S.1
chung Lam, L.2
cker Chiueh, T.3
-
32
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically generating signatures for polymorphic worms. In IEEE Symposium on Security and Privacy, pages 226-241, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
34
-
-
2642520196
-
A binary rewriting defense against stack-based buffer overflow attacks
-
M. Prasad and T. cker Chiueh. A binary rewriting defense against stack-based buffer overflow attacks. In USENIX Annual Technical Conference, pages 211-224, 2003.
-
(2003)
USENIX Annual Technical Conference
, pp. 211-224
-
-
Prasad, M.1
cker Chiueh, T.2
-
35
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
Feb
-
O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, Feb 2004.
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.2
-
40
-
-
85050273691
-
Program slicing
-
Piscataway, NJ, USA, IEEE Press
-
M. Weiser. Program slicing. In ICSE '81: Proceedings of the 5th international conference on Software engineering, pages 439-449, Piscataway, NJ, USA, 1981. IEEE Press.
-
(1981)
ICSE '81: Proceedings of the 5th international conference on Software engineering
, pp. 439-449
-
-
Weiser, M.1
|