-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack 7 (1996)
-
(1996)
Phrack
, vol.7
-
-
Aleph One1
-
2
-
-
0004200684
-
Computer Security Technology Planning Study
-
Technical report, ESD-TR-73-51
-
Anderson, J. et al., Computer Security Technology Planning Study, Technical report, ESD-TR-73-51 (1972)
-
(1972)
-
-
Anderson, J.1
-
4
-
-
0030092390
-
Checking for Race Conditions in File Accesses
-
Bishop M., and Dilger M. Checking for Race Conditions in File Accesses. Computing Systems 2 (1996) 131-152
-
(1996)
Computing Systems
, vol.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
6
-
-
21644433634
-
Xen and the Art of Virtualization
-
Dragovic, B., K. Fraser, S. Hand, T. Harris, A. Ho, I. Pratt, A. Warfield, P. Barham and R. Neugebauer, Xen and the Art of Virtualization, in: Proceedings of the ACM Symposium on Operating Systems Principles, 2003
-
(2003)
Proceedings of the ACM Symposium on Operating Systems Principles
-
-
Dragovic, B.1
Fraser, K.2
Hand, S.3
Harris, T.4
Ho, A.5
Pratt, I.6
Warfield, A.7
Barham, P.8
Neugebauer, R.9
-
7
-
-
3543086916
-
Formalizing Sensitivity in Static Analysis for Intrusion Detection
-
Oakland, California
-
Feng, H.H., J.T. Giffin, Y. Huang, S. Jha, W. Lee and B.P. Miller, Formalizing Sensitivity in Static Analysis for Intrusion Detection, in: IEEE Symposium on Security and Privacy, Oakland, California, 2004
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
8
-
-
0038825045
-
Anomaly Detection Using Call Stack Information
-
Feng, H.H., O.M. Kolesnikov, P. Fogla, W. Lee and W. Gong, Anomaly Detection Using Call Stack Information, in: SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003), p. 62
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 62
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
10
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Forrest, S., S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, A Sense of Self for Unix Processes, in: Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy (1996), pp. 120-128
-
(1996)
Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
12
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
San Diego, California
-
Giffin, J., S. Jha and B. Miller, Efficient context-sensitive intrusion detection, in: 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California, 2004
-
(2004)
11th Annual Network and Distributed Systems Security Symposium (NDSS)
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
14
-
-
84926427148
-
Survey of virtual machine research
-
Goldberg R.P. Survey of virtual machine research. IEEE Computer 7 (1974) 34-45
-
(1974)
IEEE Computer
, vol.7
, pp. 34-45
-
-
Goldberg, R.P.1
-
16
-
-
85084162914
-
-
Jr., N.L.P., T. Fraser, J. Molina and W.A. Arbaugh, Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor, in: USENIX Security Symposium, 2004, pp. 179-194
-
Jr., N.L.P., T. Fraser, J. Molina and W.A. Arbaugh, Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor, in: USENIX Security Symposium, 2004, pp. 179-194
-
-
-
-
22
-
-
84868352987
-
Protecting against unexpected system calls
-
Linn, C.M., M. Rajagopalan, S. Baker, C. Collberg, S.K. Debray and J.H. Hartman, Protecting against unexpected system calls, in: SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium (2005), pp. 16-16
-
(2005)
SSYM'05: Proceedings of the 14th conference on USENIX Security Symposium
, pp. 16-16
-
-
Linn, C.M.1
Rajagopalan, M.2
Baker, S.3
Collberg, C.4
Debray, S.K.5
Hartman, J.H.6
-
24
-
-
0034829697
-
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
-
Sekar, R., M. Bendre, D. Dhurjati and P. Bollineni, A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors, in: SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy (2001), p. 144
-
(2001)
SP '01: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 144
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
|