-
1
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
February
-
James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS '05), February 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS'05)
-
-
Newsome, J.1
Song, D.2
-
5
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
DOI 10.1109/SP.2006.41, 1623997, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha. Towards automatic generation of vulnerability-based signatures. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, 2006. (Pubitemid 44753708)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 2-16
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
6
-
-
52649112833
-
From speculation to security: Practical and efficient information flow tracking using speculative hardware
-
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen chung Yew, and Frederic T. Chong. From speculation to security: Practical and efficient information flow tracking using speculative hardware. Intl. Symposium on Computer Architecture (ISCA), 2008.
-
(2008)
Intl. Symposium on Computer Architecture (ISCA)
-
-
Chen, H.1
Wu, X.2
Yuan, L.3
Zang, B.4
Yew, P.C.5
Chong, F.T.6
-
7
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
DOI 10.1145/1273463.1273490, Proceedings of the 2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
-
James Clause, Wanchun Li, and Alessandro Orso. Dytan: a generic dynamic taint analysis framework. In Proceedings of the International Symposium on Software Testing and Analysis(ISSTA), 2007. (Pubitemid 47317593)
-
(2007)
2007 ACM International Symposium on Software Testing and Analysis, ISSTA'07
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
8
-
-
33845391802
-
Vigilante: End-to-end containment of Internet worms
-
DOI 10.1145/1095809.1095824
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham. Vigilante: end-to-end containment of internet worms. In Proceedings of the ACM Symposium on Operating Systems Principles(SOSP), 2005. (Pubitemid 44892209)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
Proceedings of the 37th Annual International Symposium on Microarchitecture, MICRO-37 2004
-
Jedidiah R. Crandall and Frederic T. Chong. Minos: Control Data Attack Prevention Orthogonal to Memory Model. In Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture( MICRO), 2004. (Pubitemid 40927700)
-
(2004)
Proceedings of the Annual International Symposium on Microarchitecture, MICRO
, pp. 221-232
-
-
Crandall, J.R.1
Chong, F.T.2
-
11
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
DOI 10.1145/1250662.1250722, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings
-
Michael Dalton, Hari Kannan, and Christos Kozyrakis. Raksha: A Flexible Information Flow Architecture for Software Security. In 34th Intl. Symposium on Computer Architecture (ISCA), June 2007. (Pubitemid 47582126)
-
(2007)
Proceedings - International Symposium on Computer Architecture
, pp. 482-493
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
12
-
-
0017517624
-
Certification of programs for secure information flow
-
Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Commun. ACM, 20(7), 1977.
-
(1977)
Commun. ACM
, vol.20
, pp. 7
-
-
Denning, D.E.1
Denning, P.J.2
-
13
-
-
35248862449
-
Electromagnetic Analysis: Concrete Results
-
Cryptographic Hardware and Embedded Systems - CHES 2001
-
Karine Gandolfi, Christophe Mourtel, and Francis Olivier. Electromagnetic Analysis: Concrete Results. In Cryptographic Hardware and Embedded Systems, volume 2162 of Lecture Notes in Computer Science, pages 251-261. Springer-Verlag, 2001. (Pubitemid 33329068)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2162
, pp. 251-261
-
-
Gandolfi, K.1
Mourtel, C.2
Olivier, F.3
-
14
-
-
84939573910
-
Differential power analysis
-
Springer-Verlag
-
Paul Kocher, Joshua Ja E, and Benjamin Jun. Differential power analysis. In Advances in Cryptology, pages 388-397. Springer- Verlag, 1999.
-
(1999)
Advances in Cryptology
, pp. 388-397
-
-
Kocher, P.1
Ja, J.E.2
Jun, B.3
-
16
-
-
39049160206
-
A general dynamic information flow tracking framework for security applications
-
DOI 10.1109/ACSAC.2006.6, 4041190, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
Lap Chung Lam and Tzi cker Chiueh. A general dynamic information flow tracking framework for security applications. In Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference, 2006. (Pubitemid 351232938)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 463-472
-
-
Lam, L.C.1
Chiueh, T.-C.2
-
17
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
Proceedings - 32nd International Symposium on Computer Architecture, ISCA 2005
-
Ruby B. Lee, Peter C. S. Kwan, John P. Mcgregor, Jeffrey Dwoskin, and Zhenghong Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), 2005. (Pubitemid 41543426)
-
(2005)
Proceedings - International Symposium on Computer Architecture
, pp. 2-13
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
18
-
-
77957774202
-
Understanding and visualizing full systems with data flow tomography
-
DOI 10.1145/1346281.1346308, ASPLOS XIII - Thirteenth International Conference on Architectural Support for Programming Languages and Operating Systems
-
Shashidhar Mysore, Bita Mazloom, Banit Agrawal, and Timothy Sherwood. Understanding and Visualizing Full Systems with Data Flow Tomography. In Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS), 2008. (Pubitemid 351585408)
-
(2008)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 211-221
-
-
Mysore, S.1
Mazloom, B.2
Agrawal, B.3
Sherwood, T.4
-
19
-
-
33745640963
-
Cache attacks and counter-measures: The case of AES
-
DOI 10.1007/11605805-1, Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
Dag Arne Osvik, Adi Shamir, and Eran Tromer. Cache attacks and countermeasures: the case of aes. In Topics in Cryptology - CTRSA 2006, The Cryptographers Track at the RSA Conference 2006, pages 1-20. Springer-Verlag, 2006. (Pubitemid 43971699)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3960
, pp. 1-20
-
-
Osvik, D.A.1
Shamir, A.2
Tromer, E.3
-
20
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
DOI 10.1109/MICRO.2006.29, 4041842, Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-39
-
Feng Qin, Cheng Wang, Zhenmin Li, Ho seop Kim, Yuanyuan Zhou, and Youfeng Wu. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting General Security Attacks. In Annual IEEE/ACM International Symposium on Microarchitecture, December 2006. (Pubitemid 351336992)
-
(2006)
Proceedings of the Annual International Symposium on Microarchitecture, MICRO
, pp. 135-146
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
21
-
-
57349118429
-
Parallelizing dynamic information flow tracking
-
Olatunji Ruwase, Phillip B. Gibbons, Todd C. Mowry, Vijaya Ramachandran, Shimin Chen, Michael Kozuch, and Michael Ryan. Parallelizing dynamic information flow tracking. In Proceedings of the twentieth annual Symposium on Parallelism in Algorithms and Architectures(SPAA), 2008.
-
(2008)
Proceedings of the twentieth annual Symposium on Parallelism in Algorithms and Architectures(SPAA)
-
-
Ruwase, O.1
Gibbons, P.B.2
Mowry, T.C.3
Ramachandran, V.4
Chen, S.5
Kozuch, M.6
Ryan, M.7
-
22
-
-
35648971620
-
Cell broadband engine processor vault security architecture
-
DOI 10.1147/rd.515.0521
-
K. Shimizu, H. P. Hofstee, and J. S. Liberty. Cell broadband engine processor vault security architecture. IBM J. Res. Dev., 51(5):521- 528, 2007. ISSN 0018-8646. (Pubitemid 350031352)
-
(2007)
IBM Journal of Research and Development
, vol.51
, Issue.5
, pp. 521-528
-
-
Shimizu, K.1
Hofstee, H.P.2
Liberty, J.S.3
-
23
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
11th International Conference on Architectural Support for Programming, Languages and Operating Systems, ASPLOS XI
-
G.E. Suh, J.W. Lee, D. Zhang, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In Proceedings of the 11th international conference on Architectural Support for Programming Languages and Operating Systems(ASPLOS), 2004. (Pubitemid 40163690)
-
(2004)
11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XI
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
24
-
-
37149044968
-
Aegis: A single-chip secure processor
-
DOI 10.1109/MDT.2007.179
-
G.E. Suh, C.W. O'Donnell, and S. Devadas. Aegis: A single-chip secure processor. Design and Test of Computers, IEEE, 24(6):570- 580, Nov.-Dec. 2007. ISSN 0740-7475. (Pubitemid 350253575)
-
(2007)
IEEE Design and Test of Computers
, vol.24
, Issue.6
, pp. 570-580
-
-
Suh, G.E.1
ODonnell, C.W.2
Devadas, S.3
-
25
-
-
21644475650
-
RIFLE: An architectural framework for user-centric information-flow security
-
Proceedings of the 37th Annual International Symposium on Microarchitecture, MICRO-37 2004
-
Neil Vachharajani, Matthew J. Bridges, Jonathan Chang, Ram Rangan, Guilherme Ottoni, Jason A. Blome, George A. Reis, Manish Vachharajani, and David I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO 37: Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture, 2004. (Pubitemid 40927702)
-
(2004)
Proceedings of the Annual International Symposium on Microarchitecture, MICRO
, pp. 243-254
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
27
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
San Diego, CA, February
-
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceeding of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2007.
-
(2007)
Proceeding of the Network and Distributed System Security Symposium (NDSS)
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
29
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Wei Xu, Sandeep Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, 2006.
-
15th USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|