-
1
-
-
33646767376
-
Control- flow integrity
-
Sept.
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control- Flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), pages 340-353, Sept. 2005.
-
(2005)
In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
0003897448
-
-
Unpublished Briefing, Dec.
-
J. Boyd. Patterns of Conflict. Unpublished Briefing, http: //www.d-n-i.net/boyd/pdf/poc.pdf, Dec. 1986.
-
(1986)
Patterns of Conflict
-
-
Boyd, J.1
-
4
-
-
35048885595
-
Creating vulnerability signatures using weakest preconditions
-
DOI 10.1109/CSF.2007.17, 4271657, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
D. Brumley, H. Wang, S. Jha, and D. Song. Creating Vulnerability Signatures Using Weakest Preconditions. In Proceedings of the 20th IEEE Computer Security Foundations Symposium, pages 311-325, July 2007. (Pubitemid 47554222)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 311-325
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
8
-
-
84885679117
-
Vigilante: End-to-end containment of internetWorms
-
Dec.
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-To-End Containment of InternetWorms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 133-147, Dec. 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005)
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
1442288535
-
Automatic detection and repair of errors in data structures
-
Oct.
-
B. Demsky and M. Rinard. Automatic Detection and Repair of Errors In Data Structures. In Proceedings of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2003), pages 78-95, Oct. 2003.
-
(2003)
Proceedings of the 18th Annual ACM SIGPLAN Conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2003)
, pp. 78-95
-
-
Demsky, B.1
Rinard, M.2
-
15
-
-
0025557712
-
Study of the reliability of UNIX utilities
-
DOI 10.1145/96267.96279
-
B. P. Miller, L. Fredriksen, and B. So. An Empirical Study of the Reliability of UNIX Utilities. Communications of the ACM, 33(12):32-44, Dec. 1990. (Pubitemid 21731525)
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller Barton, P.1
Fredriksen Lars2
So Bryan3
-
19
-
-
84978437417
-
The design and implementation of zap: A system for migrating computing environments
-
Dec.
-
S. Osman, D. Subhraveti, G. Su, and J. Nieh. The Design and Implementation of Zap: A System For Migrating Computing Environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 2002), pages 361-376, Dec. 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI 2002)
, pp. 361-376
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
21
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A System For Detecting Network Intruders In Real-Time. Computer Networks, 31(23-24):2435-2463, Dec. 1999. (Pubitemid 30869661)
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
22
-
-
33845429905
-
Rx: Treating bugs as allergies- A safe method to survive software failures
-
DOI 10.1145/1095809.1095833
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating Bugs As Allergies-A Safe Method To Survive Software Failures. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP 2005), pages 235-248, Oct. 2005. (Pubitemid 44892216)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 235-248
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
24
-
-
67249139196
-
Acceptability-oriented computing
-
Oct.
-
M. Rinard. Acceptability-Oriented Computing. In Companion of the 18th Annual ACM SIGPLAN Conference on Object- Oriented Programming, Systems, Languages, and Applications (OOPSLA 2003), pages 221-239, Oct. 2003.
-
(2003)
Companion of the 18th Annual ACM SIGPLAN Conference on Object- Oriented Programming, Systems, Languages, and Applications (OOPSLA 2003)
, pp. 221-239
-
-
Rinard, M.1
-
25
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Dec.
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI 2004), pages 303-316, Dec. 2004.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI 2004)
, pp. 303-316
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
William, J.6
Beebee, S.7
-
27
-
-
84906497159
-
Building a reactive immune system for software services
-
Apr.
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building A Reactive Immune System For Software Services. In Proceedings of the 2005 USENIX Annual Technical Conference (USENIX 2005), pages 149-161, Apr. 2005.
-
(2005)
Proceedings of the 2005 USENIX Annual Technical Conference (USENIX 2005)
, vol.2005
, pp. 149-161
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
28
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Oct.
-
Y. Song, M. E. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the Infeasibility of Modeling Polymorphic Shellcode. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pages 541-551, Oct. 2007.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
29
-
-
0026170711
-
Software defects and their impact on system availability--A study of field failures in operating systems
-
91 Fault-Tolerant Comput. Symp.
-
M. Sullivan and R. Chillarege. Software Defects and Their Impact on System Availability-A Study of Field Failures In Operating Systems. In Proceedings of the 21st International Symposium on Fault-Tolerant Computing (FTCS-21), pages 2-9, June 1991. (Pubitemid 21704526)
-
(1991)
Digest of Papers - FTCS (Fault-Tolerant Computing Symposium)
, pp. 2-9
-
-
Sullivan Mark1
Chillarege Ram2
-
31
-
-
34548043748
-
Sweeper: A lightweight end-to-end system for defending against fast worms
-
DOI 10.1145/1272996.1273010, Operating Systems Review - Proceedings of the 2007 EuroSys Conference
-
J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, Y. Zhou, and D. Song. Sweeper: A Lightweight End-To- End System For Defending Against Fast Worms. In Proceedings of the 2nd European Conference on Computer Systems (EuroSys 2007), pages 115-128, Mar. 2007. (Pubitemid 47281579)
-
(2007)
Operating Systems Review (ACM)
, pp. 115-128
-
-
Tucek, J.1
Lu, S.2
Huang, C.3
Xanthos, S.4
Zhou, Y.5
Newsome, J.6
Brumley, D.7
Song, D.8
-
32
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
DOI 10.1145/1030194.1015489, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
H. J.Wang, C. Guo, D. R. Simon, and A. Zugenmaier. Shield: Vulnerability-Driven Network Filters For Preventing Known Vulnerability Exploits. In Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 2004), pages 193-204, Aug. 2004. (Pubitemid 40954880)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
|