-
1
-
-
33646767376
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2005.
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
3
-
-
70349231856
-
-
T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X
-
T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X.
-
-
-
-
4
-
-
70349244291
-
-
T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X. RECON 2008, 2008. Montreal, Quebec.
-
T. Beauchamp and D. Weston. Re:Trace Applied Reverse Engineering on OS X. RECON 2008, 2008. Montreal, Quebec.
-
-
-
-
6
-
-
33749561840
-
Virtual Machines, Virtual Security
-
October
-
S. M. Bellovin. Virtual Machines, Virtual Security. Communications of the ACM, 49(10), October 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.10
-
-
Bellovin, S.M.1
-
7
-
-
0003407933
-
-
Addison-Wesley Professional, 2 edition
-
F. Brooks. The Mythical Man Month. Addison-Wesley Professional, 2 edition, 1995.
-
(1995)
The Mythical Man Month
-
-
Brooks, F.1
-
10
-
-
85077019413
-
Dynamic instrumentation of production systems
-
B. Cantrill, M. W. Shapiro, and A. H. Leventhal. Dynamic instrumentation of production systems. In USENIX Annual Technical Conference, General Track, pages 15-28, 2004.
-
(2004)
USENIX Annual Technical Conference, General Track
, pp. 15-28
-
-
Cantrill, B.1
Shapiro, M.W.2
Leventhal, A.H.3
-
11
-
-
70349256823
-
Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors
-
RC24500 W0802-069, February
-
P. A. Karger and D. R. Safford. Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors. In IBM Research Technical Report RC24500 (W0802-069), February 2008.
-
(2008)
IBM Research Technical Report
-
-
Karger, P.A.1
Safford, D.R.2
-
14
-
-
31944440969
-
Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation
-
June
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation. In Proceedings of Programming Language Design and Implementation (PLDI), June 2005.
-
(2005)
Proceedings of Programming Language Design and Implementation (PLDI)
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
15
-
-
70349239872
-
The Cerberus ELF Interface
-
mayhem. The Cerberus ELF Interface. Phrack, 2003.
-
(2003)
Phrack
-
-
mayhem1
-
19
-
-
34547423144
-
-
V. Prasad, W. Cohen, F. C. Eigler, M. Hunt, J. Keniston, and B. Chen. Locating system problems using dynamic instrumentation. 2005.
-
(2005)
Locating system problems using dynamic instrumentation
-
-
Prasad, V.1
Cohen, W.2
Eigler, F.C.3
Hunt, M.4
Keniston, J.5
Chen, B.6
-
21
-
-
77952326921
-
-
E. C. Sezer, P. Ning, C. Kil, and J. Xu. MemSherlock: an Automated Debugger for Unknown Memory Corruption Vulnerabilities. In Proceedings of the 14th ACM conference on Computer and communications security (CCS 2007), pages 562?572, New York, NY, USA, 2007. ACM.
-
E. C. Sezer, P. Ning, C. Kil, and J. Xu. MemSherlock: an Automated Debugger for Unknown Memory Corruption Vulnerabilities. In Proceedings of the 14th ACM conference on Computer and communications security (CCS 2007), pages 562?572, New York, NY, USA, 2007. ACM.
-
-
-
-
22
-
-
70349234976
-
Embedded ELF Debugging : The middle head of Cerberus
-
T. E. shell crew. Embedded ELF Debugging : the middle head of Cerberus. Phrack, 2003.
-
(2003)
Phrack
-
-
shell crew, T.E.1
|