-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine 49(14), 1996. http://www.phrack.org/issues. html?issue=49.
-
(1996)
Phrack Magazine
, vol.49
, Issue.14
-
-
One, A.1
-
4
-
-
41549139189
-
Distributed authentication of program integrity verification in wireless sensor networks
-
K. Chang and K. Shin. Distributed authentication of program integrity verification in wireless sensor networks. ACM TISSEC, 11(3), 2008.
-
(2008)
ACM TISSEC
, vol.11
, Issue.3
-
-
Chang, K.1
Shin, K.2
-
5
-
-
78651073393
-
Efficient memory safety for tinyos
-
N. Cooprider, W. Archer, E. Eide, D. Gay, and J. Regehr. Efficient memory safety for tinyos. In SenSys, 2007.
-
(2007)
SenSys
-
-
Cooprider, N.1
Archer, W.2
Eide, E.3
Gay, D.4
Regehr, J.5
-
6
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
7
-
-
70349267311
-
-
Crossbow technology inc
-
Crossbow technology inc. Micaz.
-
Micaz
-
-
-
8
-
-
70349288894
-
Advances in OpenBSD
-
T. DeRaadt. Advances in OpenBSD. In CanSecWest, 2003.
-
(2003)
CanSecWest
-
-
DeRaadt, T.1
-
9
-
-
34247376029
-
Securing the deluge network programming system
-
P. Dutta, J. Hui, D. Chu, and D. Culler. Securing the deluge network programming system. IPSN, 2006.
-
(2006)
IPSN
-
-
Dutta, P.1
Hui, J.2
Chu, D.3
Culler, D.4
-
10
-
-
70349288893
-
Exploiting wireless sensor networks over 802.15.4
-
T. Goodspeed. Exploiting wireless sensor networks over 802.15.4. In ToorCon 9, San Diego, 2007.
-
(2007)
ToorCon 9, San Diego
-
-
Goodspeed, T.1
-
12
-
-
56749092203
-
Towards self-propagate mal-packets in sensor networks
-
ACM
-
Q. Gu and R. Noorani. Towards self-propagate mal-packets in sensor networks. In WiSec. ACM, 2008.
-
(2008)
WiSec
-
-
Gu, Q.1
Noorani, R.2
-
13
-
-
85077701725
-
Least we remember: Cold boot attacks on encryption keys
-
J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Least we remember: Cold boot attacks on encryption keys. In USENIX Security Symposium, 2008.
-
(2008)
USENIX Security Symposium
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
14
-
-
22744432612
-
The dynamic behavior of a data dissemination protocol for network programming at scale
-
ACM
-
J. W. Hui and D. Culler. The dynamic behavior of a data dissemination protocol for network programming at scale. In SenSys, ACM, 2004.
-
(2004)
SenSys
-
-
Hui, J.W.1
Culler, D.2
-
15
-
-
70349301159
-
-
IEEE. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003.
-
IEEE. Wireless medium access control and physical layer specifications for low-rate wireless personal area networks. IEEE Standard, 802.15.4-2003.
-
-
-
-
16
-
-
39049113465
-
Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
-
C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In ACSAC, 2006.
-
(2006)
ACSAC
-
-
Kil, C.1
Jun, J.2
Bookholt, C.3
Xu, J.4
Ning, P.5
-
17
-
-
35948980830
-
Exploring symmetric cryptography for secure network reprogramming
-
D. H. Kim, R. Gandhi, and P. Narasimhan. Exploring symmetric cryptography for secure network reprogramming. ICDCSW, 2007.
-
(2007)
ICDCSW
-
-
Kim, D.H.1
Gandhi, R.2
Narasimhan, P.3
-
18
-
-
70349279707
-
Authenticated in-network programming for wireless sensor networks
-
I. Krontiris and T. Dimitriou. Authenticated in-network programming for wireless sensor networks. In ADHOC-NOW, 2006.
-
(2006)
ADHOC-NOW
-
-
Krontiris, I.1
Dimitriou, T.2
-
19
-
-
33947642085
-
Sluice: Secure dissemination of code updates in sensor networks
-
P. Lanigan, R. Gandhi, and P. Narasimhan. Sluice: Secure dissemination of code updates in sensor networks. ICDCS, 2006.
-
(2006)
ICDCS
-
-
Lanigan, P.1
Gandhi, R.2
Narasimhan, P.3
-
20
-
-
33746690237
-
Transmission of ipv6 packets over ieee 802.15.4 networks (rfc 4944)
-
Technical report, IETF, September
-
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler. Transmission of ipv6 packets over ieee 802.15.4 networks (rfc 4944). Technical report, IETF, September 2007.
-
(2007)
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
-
21
-
-
70349276491
-
-
Riley, Jiang, and Xu. An architectural approach to preventing code injection attacks, dsn, 2007.
-
Riley, Jiang, and Xu. An architectural approach to preventing code injection attacks, dsn, 2007.
-
-
-
-
23
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
ACM
-
H. Shacham. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In CCS. ACM, 2007.
-
(2007)
CCS
-
-
Shacham, H.1
-
24
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In CCS. ACM, 2004.
-
(2004)
CCS
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
25
-
-
70349276490
-
-
Solar Designer, return-to-libc attack. Bugtraq mailing list, August 1997.
-
Solar Designer, return-to-libc attack. Bugtraq mailing list, August 1997.
-
-
-
-
27
-
-
70349278172
-
-
The PaX Team. Pax
-
The PaX Team. Pax, 2003. http://pax.grsecurity.net.
-
(2003)
-
-
-
28
-
-
33744909363
-
Avrora: Scalable sensor network simulation with precise timing
-
B. L. Titzer, D. K. Lee, and J. Palsberg. Avrora: scalable sensor network simulation with precise timing. In IPSN, 2005.
-
(2005)
IPSN
-
-
Titzer, B.L.1
Lee, D.K.2
Palsberg, J.3
-
29
-
-
70349270390
-
-
Ubisec&sens european project
-
Ubisec&sens european project. http://www.ist-ubisecsens.org/.
-
-
-
|