-
1
-
-
50249149602
-
Preventing memory error exploits with WIT
-
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT. In SP '08: 2008 IEEE Symposium on Security and Privacy, 2008.
-
(2008)
SP '08: 2008 IEEE Symposium on Security and Privacy
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
6
-
-
84902507067
-
Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics
-
S. Chen, K. Pattabiraman, Z. Kalbarczyk, and R. K. Iyer. Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics. In Proc. of IFIP SEC, 2004.
-
(2004)
Proc. of IFIP SEC
-
-
Chen, S.1
Pattabiraman, K.2
Kalbarczyk, Z.3
Iyer, R.K.4
-
7
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and I. Rav-ishankar. Defeating memory corruption attacks via pointer taintedness detection. In DSN '05: Proceedings of the 2005 International Conference on Dependable Systems and Networks, 2005.
-
(2005)
DSN '05: Proceedings of the 2005 International Conference on Dependable Systems and Networks
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Rav-ishankar, I.5
-
8
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In SSYM'05: 14th USENIX Security Symposium, 2005.
-
(2005)
SSYM'05: 14th USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
9
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In 20th ACM Symposium on Operating Systems Principles (SOSP), 2005.
-
(2005)
20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
10
-
-
85084160243
-
Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, Walpole J., P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stack-guard: Automatic adaptive detection and prevention of buffer-overflow attacks. In 7th USENIX Security Symposium, 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
12
-
-
77955972329
-
Deconstructing hardware architectures for security
-
M. Dalton, H. Kannan, and C. Kozyrakis. Deconstructing hardware architectures for security. In 5th Workshop on Duplicating, Deconstructing, and Debunking, 2006.
-
(2006)
5th Workshop on Duplicating, Deconstructing, and Debunking
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
15
-
-
0017517624
-
Certification of programs for secure information flow
-
D. Denning and P. Denning. Certification of programs for secure information flow. Commnic. ACM, 20(7), 1977.
-
(1977)
Commnic. ACM
, vol.20
, Issue.7
-
-
Denning, D.1
Denning, P.2
-
16
-
-
84903607772
-
Dynamic Spyware Analysis
-
M. Egele, Ch. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic Spyware Analysis. In ATC'07: 2007 USENIX Annual Technical Conference, 2007.
-
(2007)
ATC'07: 2007 USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
17
-
-
77958184237
-
Towards a practical, verified kernel
-
K. Elphinstone, G. Klein, P. Derrin, T. Roscoe, and G. Heiser. Towards a practical, verified kernel. In HOTOS'07:11th USENIX workshop onHottopics inoperating systems, 2007.
-
(2007)
HOTOS'07:11th USENIX workshop onHottopics inoperating systems
-
-
Elphinstone, K.1
Klein, G.2
Derrin, P.3
Roscoe, T.4
Heiser, G.5
-
19
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection using demand emulation. In EuroSys '06: 1st European Conference on Computer Systems, 2006.
-
(2006)
EuroSys '06: 1st European Conference on Computer Systems
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
20
-
-
85084164164
-
Cyclone: A safe dialect of C
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX 2002 Annual Technical Conference, 2002.
-
(2002)
USENIX 2002 Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
21
-
-
40349114761
-
Base address recognition with data flow tracking for injection attack detection
-
S. Katsunuma, H. Kurita, R. Shioya, K. Shimizu, H. Me, M. Goshima, and S. Sakai. Base address recognition with data flow tracking for injection attack detection. In PRDC '06: 12th Pacific Rim International Symposium on Dependable Computing, 2006.
-
(2006)
PRDC '06: 12th Pacific Rim International Symposium on Dependable Computing
-
-
Katsunuma, S.1
Kurita, H.2
Shioya, R.3
Shimizu, K.4
Me, H.5
Goshima, M.6
Sakai, S.7
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
12th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
26
-
-
84878346861
-
Improving host security with system call policies
-
Niels Provos. Improving host security with system call policies. In 12th USENIX Security Symposium, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Provos, N.1
-
27
-
-
70349138535
-
Sinowal trojan steals data from around 500,000 cards and accounts
-
Oct
-
Dan Raywood. Sinowal trojan steals data from around 500,000 cards and accounts. SC Magazine, Oct 2008.
-
(2008)
SC Magazine
-
-
Raywood, D.1
-
28
-
-
48649093823
-
The age of data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
-
A. Slowinska and H. Bos. The age of data: pinpointing guilty bytes in polymorphic buffer overflows on heap or stack. In ACSA'C07, 2007.
-
(2007)
ACSA
, Issue.C07
-
-
Slowinska, A.1
Bos, H.2
-
29
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
E. Suh, J. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. SIGARCH Comput. Archit. News, 32(5):85-96, 2004.
-
(2004)
SIGARCH Comput. Archit. News
, vol.32
, Issue.5
, pp. 85-96
-
-
Suh, E.1
Lee, J.2
Zhang, D.3
Devadas, S.4
-
31
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
33
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In CCS '07: Proc. of the 14th ACM conference on Computer and communications security, 2007.
-
(2007)
CCS '07: Proc. of the 14th ACM conference on Computer and communications security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|