-
4
-
-
33646767376
-
Control-flow Integrity: Principles, implementations, and applications
-
Nov
-
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow Integrity: Principles, implementations, and applications. In ACM CCS, Nov. 2005.
-
(2005)
ACM CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
5
-
-
41149179063
-
Principles, techniques, and tools
-
and, Compilers
-
A. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, techniques, and tools. Prentice Hall, 1986.
-
(1986)
Prentice Hall
-
-
-
6
-
-
84885205652
-
Weakest-precondition of unstructured programs
-
Sept
-
M. Barnett and K. R. M. Leino. Weakest-precondition of unstructured programs. In PASTE, Sept. 2005.
-
(2005)
PASTE
-
-
Barnett, M.1
Leino, K.R.M.2
-
7
-
-
33746101822
-
DieHard: Probabilistic memory safety for unsafe languages
-
June
-
E. D. Berger and B. G. Zorn. DieHard: Probabilistic memory safety for unsafe languages. In PLDI, June 2006.
-
(2006)
PLDI
-
-
Berger, E.D.1
Zorn, B.G.2
-
8
-
-
33745956039
-
-
S. Bhansali, W.-K. Chen, S. de Jong, A. Edwards, R. Murray, M. Drinic, D. Mihocka, and J. Chau. Framework for instruction-level tracing and analysis of program executuions. In VEE, June 2006.
-
S. Bhansali, W.-K. Chen, S. de Jong, A. Edwards, R. Murray, M. Drinic, D. Mihocka, and J. Chau. Framework for instruction-level tracing and analysis of program executuions. In VEE, June 2006.
-
-
-
-
9
-
-
33751056900
-
Towards automatic generation of vulnerability signatures
-
May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability signatures. In IEEE Symposium on Security and Privacy, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
11
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. EXE: Automatically generating inputs of death. In ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
12
-
-
84991997276
-
Securing software by enforcing data-flow integrity
-
Nov
-
M. Castro, M. Costa, and T. Harris. Securing software by enforcing data-flow integrity. In OSDI, Nov. 2006.
-
(2006)
OSDI
-
-
Castro, M.1
Costa, M.2
Harris, T.3
-
13
-
-
27544498541
-
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In DSN, July 2005.
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In DSN, July 2005.
-
-
-
-
14
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
July
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic threats. In USENIX Security Symposium, July 2005.
-
(2005)
USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
16
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Oct
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In SOSP, Oct. 2005.
-
(2005)
SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
17
-
-
85084160243
-
Stackguard: Automatic detection and prevention of buffer-overrun attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Wadpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic detection and prevention of buffer-overrun attacks. In USENIX Security Symposium, Jan. 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Wadpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
18
-
-
33745788387
-
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
-
Nov
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. In ACM CCS, Nov. 2005.
-
(2005)
ACM CCS
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
20
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
Aug
-
E. W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Communications of the ACM, Aug. 1975.
-
(1975)
Communications of the ACM
-
-
Dijkstra, E.W.1
-
21
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
Sept
-
E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Computing Surveys, 34(3):375-408, Sept. 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.3
, pp. 375-408
-
-
Elnozahy, E.N.1
Alvisi, L.2
Wang, Y.-M.3
Johnson, D.B.4
-
22
-
-
34548273557
-
Compositional Dynamic Test Generation
-
Jan
-
P. Godefroid. Compositional Dynamic Test Generation. In POPL, Jan. 2007.
-
(2007)
POPL
-
-
Godefroid, P.1
-
23
-
-
31844450371
-
DART: Directed Automated Random Testing
-
P. Godefroid, N. Klarlund, and K. Sen. DART: Directed Automated Random Testing. In PLDI, 2005.
-
(2005)
PLDI
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
25
-
-
70449772364
-
-
J. O. Kephart and W. C. Arnold. Automatic extraction of computer virus signatures. In Virus Bulletin, Sept. 1994.
-
J. O. Kephart and W. C. Arnold. Automatic extraction of computer virus signatures. In Virus Bulletin, Sept. 1994.
-
-
-
-
26
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Aug
-
H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security Symposium, Aug. 2004.
-
(2004)
USENIX Security Symposium
-
-
Kim, H.1
Karp, B.2
-
27
-
-
0016971687
-
Symbolic execution and program testing
-
July
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, July 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
30
-
-
33646048960
-
Honeycomb - creating intrusion detection signatures using honeypots
-
Nov
-
C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets, Nov. 2003.
-
(2003)
HotNets
-
-
Kreibich, C.1
Crowcroft, J.2
-
31
-
-
33846294027
-
Automatic generation of buffer overflow signatures: An approach based on program behavior models
-
Dec
-
Z. Liang and R. Sekar. Automatic generation of buffer overflow signatures: An approach based on program behavior models. In ACSAC, Dec. 2005.
-
(2005)
ACSAC
-
-
Liang, Z.1
Sekar, R.2
-
32
-
-
33745800070
-
Fast and automated generation of attack signatures: A basis for building self-protecting servers
-
Nov
-
Z. Liang and R. Sekar. Fast and automated generation of attack signatures: A basis for building self-protecting servers. In ACM CCS, Nov. 2005.
-
(2005)
ACM CCS
-
-
Liang, Z.1
Sekar, R.2
-
34
-
-
0742276097
-
Inside the Slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. IEEE Security and Privacy, 1(4), July 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
35
-
-
34548010208
-
Vulnerability-specific execution filtering for exploit prevention on commodity software
-
Feb
-
J. Newsome, D. Brumley, and D. Song. Vulnerability-specific execution filtering for exploit prevention on commodity software. In NDSS, Feb. 2006.
-
(2006)
NDSS
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
-
37
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software
-
Feb
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
38
-
-
84885578759
-
Rx: Treating bugs as allergies - a safe method to survive software failures
-
Nov
-
F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. Rx: Treating bugs as allergies - a safe method to survive software failures. In SOSP, Nov. 2005.
-
(2005)
SOSP
-
-
Qin, F.1
Tucek, J.2
Sundaresan, J.3
Zhou, Y.4
-
39
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
Dec
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, Dec. 2004.
-
(2004)
OSDI
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, W.6
-
40
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
Feb
-
O. Ruwase and M. Lam. A practical dynamic buffer overflow detector. In NDSS, Feb. 2004.
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.2
-
41
-
-
32344447459
-
CUTE: A Concolic Unit Testing Engine for C
-
K. Sen, D. Marinov, and G. Agha. CUTE: A Concolic Unit Testing Engine for C. In ESEC/FSE, 2005.
-
(2005)
ESEC/FSE
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
43
-
-
70449830501
-
-
SPEC. Specweb99 benchmark. http://www.spec.org/osg/web99.
-
SPEC. Specweb99 benchmark. http://www.spec.org/osg/web99.
-
-
-
-
44
-
-
1642268792
-
Accurate buffer overflow detection via abstract payload execution
-
Oct
-
T. Toth and C. Kruegel. Accurate buffer overflow detection via abstract payload execution. In RAID, Oct. 2002.
-
(2002)
RAID
-
-
Toth, T.1
Kruegel, C.2
-
45
-
-
70449851527
-
-
TPC. TPC-C online transaction processing benchmark. 1999. http://www.tpc.org/tpcc.
-
TPC. TPC-C online transaction processing benchmark. 1999. http://www.tpc.org/tpcc.
-
-
-
-
46
-
-
41149086696
-
Sweeper: A lightweight end-to-end system for defending against fast worms
-
Mar
-
J. Tucek, J. Newsome, S. Lu, C. Huang, S. Xanthos, D. Brumley, Y. Zhou, and D. Song. Sweeper: A lightweight end-to-end system for defending against fast worms. In EuroSys, Mar. 2007.
-
(2007)
EuroSys
-
-
Tucek, J.1
Newsome, J.2
Lu, S.3
Huang, C.4
Xanthos, S.5
Brumley, D.6
Zhou, Y.7
Song, D.8
-
48
-
-
12844272133
-
Finding and preventing runtime error handling mistakes
-
Oct
-
W. Weimer and G. C. Necula. Finding and preventing runtime error handling mistakes. In OOPSLA, Oct. 2004.
-
(2004)
OOPSLA
-
-
Weimer, W.1
Necula, G.C.2
-
51
-
-
8344277509
-
Cost effective dynamic program slicing
-
June
-
X. Zhang and R. Gupta. Cost effective dynamic program slicing. In PLDI, June 2004.
-
(2004)
PLDI
-
-
Zhang, X.1
Gupta, R.2
|