-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(2), 1996.
-
(1996)
Phrack
, vol.7
, Issue.2
-
-
One, A.1
-
2
-
-
70349154324
-
-
Apache Software Foundation. ab-Apache HTTP Server Benchmarking Tool.
-
Apache Software Foundation. ab-Apache HTTP Server Benchmarking Tool.
-
-
-
-
4
-
-
0017792448
-
-
A. Avizienis and L. Chen. On the implementation of n-version programming for software fault tolerance during execution. In IEEE International Computer Software and Applications Conference COMPSAC, 77, pages 149-155, 1977
-
A. Avizienis and L. Chen. On the implementation of n-version programming for software fault tolerance during execution. In IEEE International Computer Software and Applications Conference (COMPSAC), volume 77, pages 149-155, 1977.
-
-
-
-
5
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E.G. Barrantes, D.H. Ackley, T.S. Palmer, D. Ste-fanovic, and D.D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pages 281-289, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Palmer, T.S.3
Ste-fanovic, D.4
Zovi, D.D.5
-
9
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Technical report, Department of Computer Science, Carnegie Mellon University
-
M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical report, Department of Computer Science, Carnegie Mellon University, 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
10
-
-
0027684663
-
Operating system protection through program evolution
-
October
-
F. Cohen. Operating system protection through program evolution. Computers and Security, 12(6):565-584, October 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
11
-
-
85084160243
-
Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, pages 63-78, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
84886393009
-
N-variant systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: A secretless framework for security through diversity. In Proceedings of the 15th USENIX Security Symposium, 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
13
-
-
70349134819
-
-
URL
-
Diet libc. URL http://www.fefe.de/dietlibc/.
-
Diet libc
-
-
-
18
-
-
84899595286
-
-
GNU. GNU Compiler, GCC, URL
-
GNU. GNU Compiler Collection (GCC). URL http://gcc.gnu.org.
-
Collection
-
-
-
20
-
-
0043199887
-
Characteristics of I/O traffic in personal computer and server workloads
-
W. Hsu and A.J. Smith. Characteristics of I/O traffic in personal computer and server workloads. IBM Systems Journal, 2003.
-
(2003)
IBM Systems Journal
-
-
Hsu, W.1
Smith, A.J.2
-
21
-
-
70349145920
-
-
Intel. Paul Otellini Keynote. Intel Developer Forum, September 2006.
-
Intel. Paul Otellini Keynote. Intel Developer Forum, September 2006.
-
-
-
-
25
-
-
33745220279
-
Detection and prevention of stack buffer overflow attacks
-
B. A. Kuperman, C. E. Brodley, H. Oz-doganoglu, T. N. Vijaykumar, and A. Jalote. Detection and prevention of stack buffer overflow attacks. Communications of the ACM, 48(11):50-56, 2005.
-
(2005)
Communications of the ACM
, vol.48
, Issue.11
, pp. 50-56
-
-
Kuperman, B.A.1
Brodley, C.E.2
Oz-doganoglu, H.3
Vijaykumar, T.N.4
Jalote, A.5
-
26
-
-
70349106066
-
-
A. Manion and J. Gennari. US-CERT Vulnerability Note VU#175500, October 2005. URL http://www.kb. cert.org/vuls/id/17550 0.
-
A. Manion and J. Gennari. US-CERT Vulnerability Note VU#175500, October 2005. URL http://www.kb. cert.org/vuls/id/17550 0.
-
-
-
-
27
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J.M. McCune, B.J. Parno, A. Perrig, M.K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the 3rd European Conference on Computer Systems (EuroSys), pages 315-328, 2008.
-
(2008)
Proceedings of the 3rd European Conference on Computer Systems (EuroSys)
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
28
-
-
0031371938
-
Doc, wyatt, and virgil: Prototyping storage jamming defenses
-
J. McDermott, R. Gelinas, and S. Ornstein. Doc, wyatt, and virgil: Prototyping storage jamming defenses. In 13th Annual Computer Security Applications Conference (AC-SAC), pages 265-273, 1997.
-
(1997)
13th Annual Computer Security Applications Conference (AC-SAC)
, pp. 265-273
-
-
McDermott, J.1
Gelinas, R.2
Ornstein, S.3
-
31
-
-
3042642332
-
The advanced return-into-lib(c) exploits: PaX case study
-
Nergal. The advanced return-into-lib(c) exploits: PaX case study. Phrack, 2001.
-
(2001)
Phrack
-
-
Nergal1
-
34
-
-
60749118885
-
A practical mimicry attack against powerful system-call monitors
-
C. Parampalli, R. Sekar, and R. Johnson. A practical mimicry attack against powerful system-call monitors. In ACM Symposium on Information, Computer & Communication Security (ASIACCS), pages 156-167, 2008.
-
(2008)
ACM Symposium on Information, Computer & Communication Security (ASIACCS)
, pp. 156-167
-
-
Parampalli, C.1
Sekar, R.2
Johnson, R.3
-
35
-
-
70349141060
-
-
URL http://pax. grsecurity.net
-
PaX. URL http://pax. grsecurity.net.
-
-
-
-
36
-
-
4344593013
-
Beyond stack smashing: Recent advances in exploiting buffer overruns
-
J. Pincus and B. Baker. Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy, pages 20-27, 2004.
-
(2004)
IEEE Security and Privacy
, pp. 20-27
-
-
Pincus, J.1
Baker, B.2
-
37
-
-
0346715418
-
Load balancing and unbalancing for power and performance in cluster-based systems
-
E. Pinheiro, R. Bianchini, E.V Carrera, and T. Heath. Load balancing and unbalancing for power and performance in cluster-based systems. In Workshop on Compilers and Operating Systems for Low Power, pages 182-195, 2001.
-
(2001)
Workshop on Compilers and Operating Systems for Low Power
, pp. 182-195
-
-
Pinheiro, E.1
Bianchini, R.2
Carrera, E.V.3
Heath, T.4
-
39
-
-
70349124701
-
-
rd. THCsnortbo 0.3 - Snort BackOrifice PING exploit, October 2005. URL http://milwOrm.com/exploits/1272.
-
rd. THCsnortbo 0.3 - Snort BackOrifice PING exploit, October 2005. URL http://milwOrm.com/exploits/1272.
-
-
-
-
41
-
-
53149125681
-
Multi-variant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities
-
March
-
B. Salamat, A. Gal, T. Jackson, K. Manivannan, G. Wagner, and M. Franz. Multi-variant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities. In Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems (CISIS'08), pages 843-848, March 2008.
-
(2008)
Proceedings of the International Conference on Complex, Intelligent and Software Intensive Systems (CISIS'08)
, pp. 843-848
-
-
Salamat, B.1
Gal, A.2
Jackson, T.3
Manivannan, K.4
Wagner, G.5
Franz, M.6
-
43
-
-
70349123861
-
-
Standard Performance Evaluation Corporation SPEC, URL
-
Standard Performance Evaluation Corporation (SPEC). URL http://www.spec.org.
-
-
-
-
44
-
-
70349090700
-
-
C. Taschner and A. Manion. US-CERT Vulnerability Note VU#196240, February 2007. URL http://www. kb.cert.org/vuls/id/19 62 4 0.
-
C. Taschner and A. Manion. US-CERT Vulnerability Note VU#196240, February 2007. URL http://www. kb.cert.org/vuls/id/19 62 4 0.
-
-
-
|