-
1
-
-
33646767376
-
Control-Flow Integrity: Principles, Implementations, and Applications
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-Flow Integrity: Principles, Implementations, and Applications. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2005).
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
ABADI, M.1
BUDIU, M.2
ERLINGSSON, U.3
LIGATTI, J.4
-
4
-
-
33751056900
-
Towards Automatic Generation of Vulnerability-Based Signatures
-
BRUMLEY, D., NEWSOME, J., SONG, D., WANG, H., AND JHA, S. Towards Automatic Generation of Vulnerability-Based Signatures. In Proceedings of the IEEE Symposium on Security and Privacy (2006).
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
BRUMLEY, D.1
NEWSOME, J.2
SONG, D.3
WANG, H.4
JHA, S.5
-
5
-
-
84869675207
-
-
th ACM Conference on Computer and Communications Security (CCS) (2006).
-
th ACM Conference on Computer and Communications Security (CCS) (2006).
-
-
-
-
8
-
-
41149160709
-
Bouncer: Securing Software By Blocking Bad Input
-
COSTA, M., CASTRO, M., ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: Securing Software By Blocking Bad Input. In Proceedings of the ACM Symposium on Systems and Operating Systems Principles (SOSP) (2007).
-
(2007)
Proceedings of the ACM Symposium on Systems and Operating Systems Principles (SOSP)
-
-
COSTA, M.1
CASTRO, M.2
ZHOU, L.3
ZHANG, L.4
PEINADO, M.5
-
9
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
COSTA, M., CROWCROFT, J., CASTRO, M., AND ROWSTRON, A. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
COSTA, M.1
CROWCROFT, J.2
CASTRO, M.3
ROWSTRON, A.4
-
10
-
-
85084160243
-
Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. Stackguard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the USENIX Security Symposium (1998).
-
(1998)
Proceedings of the USENIX Security Symposium
-
-
COWAN, C.1
PU, C.2
MAIER, D.3
HINTON, H.4
WALPOLE, J.5
BAKKE, P.6
BEATTIE, S.7
GRIER, A.8
WAGLE, P.9
ZHANG, Q.10
-
12
-
-
34548717095
-
ShieldGen: Automated Data Patch Generation for Unknown Vulnerabilities with Informed Probing
-
May
-
CUI, W., PEINADO, M., WANG, H. J., AND LOCASTO, M. E. ShieldGen: Automated Data Patch Generation for Unknown Vulnerabilities with Informed Probing. In Proceedings of the IEEE Symposium on Security and Privacy (May 2007).
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
CUI, W.1
PEINADO, M.2
WANG, H.J.3
LOCASTO, M.E.4
-
14
-
-
70349100099
-
Anomaly Detection Using Call Stack Information
-
May
-
FENG, H. H., KOLESNIKOV, O., FOGLA, P., LEE, W., AND GONG, W. Anomaly Detection Using Call Stack Information. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003).
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
-
FENG, H.H.1
KOLESNIKOV, O.2
FOGLA, P.3
LEE, W.4
GONG, W.5
-
18
-
-
0032313923
-
Intrusion Detection System Using Sequences of System Calls
-
HOFMEYR, S. A., SOMAYAJI, A., AND FORREST, S. Intrusion Detection System Using Sequences of System Calls. Journal of Computer Security 6, 3 (1998), 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
HOFMEYR, S.A.1
SOMAYAJI, A.2
FORREST, S.3
-
21
-
-
70450249215
-
A Model for Automatically Repairing Execution Integrity
-
Tech. Rep. CUCS-005-07, Columbia University, January
-
LOCASTO, M. E., CRETU, G. F., STAVROU, A., AND KEROMYTIS, A. D. A Model for Automatically Repairing Execution Integrity. Tech. Rep. CUCS-005-07, Columbia University, January 2007.
-
(2007)
-
-
LOCASTO, M.E.1
CRETU, G.F.2
STAVROU, A.3
KEROMYTIS, A.D.4
-
22
-
-
59249094964
-
From STEM to SEAD: Speculative Execution for Automatic Defense
-
June
-
LOCASTO, M. E., STAVROU, A., CRETU, G. F., AND KEROMYTIS, A. D. From STEM to SEAD: Speculative Execution for Automatic Defense. In Proceedings of the USENIX Annual Technical Conference (June 2007), pp. 219-232.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
, pp. 219-232
-
-
LOCASTO, M.E.1
STAVROU, A.2
CRETU, G.F.3
KEROMYTIS, A.D.4
-
23
-
-
33745201000
-
Anomalous System Call Detection
-
February
-
MUTZ, D., VALEUR, F., VIGNA, G., AND KRUEGEL, C. Anomalous System Call Detection. ACM Transactions on Information and System Security 9, 1 (February 2006), 61-93.
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
MUTZ, D.1
VALEUR, F.2
VIGNA, G.3
KRUEGEL, C.4
-
26
-
-
84885578759
-
Treating Bugs as Allergies - A Safe Method to Survive Software Failures
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: Treating Bugs as Allergies - A Safe Method to Survive Software Failures. In Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP) (2005).
-
(2005)
Proceedings of the Symposium on Systems and Operating Systems Principles (SOSP)
-
-
QIN, F.1
TUCEK, J.2
SUNDARESAN, J.3
ZHOU, Y.R.4
-
28
-
-
84906497159
-
Building a Reactive Immune System for Software Services
-
April
-
SIDIROGLOU, S., LOCASTO, M. E., BOYD, S. W., AND KEROMYTIS, A. D. Building a Reactive Immune System for Software Services. In Proceedings of the USENIX Annual Technical Conference (April 2005), pp. 149-161.
-
(2005)
Proceedings of the USENIX Annual Technical Conference
, pp. 149-161
-
-
SIDIROGLOU, S.1
LOCASTO, M.E.2
BOYD, S.W.3
KEROMYTIS, A.D.4
-
30
-
-
41549098765
-
On the Infeasibility of Modeling Polymorphic Shellcode
-
SONG, Y., LOCASTO, M. E., STAVROU, A., KEROMYTIS, A. D., AND STOLFO, S. J. On the Infeasibility of Modeling Polymorphic Shellcode. In Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2007).
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
SONG, Y.1
LOCASTO, M.E.2
STAVROU, A.3
KEROMYTIS, A.D.4
STOLFO, S.J.5
-
33
-
-
27544510809
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
August
-
WANG, H. J., GUO, C., SIMON, D. R., AND ZUGENMAIER, A. Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits. In Proceedings of the ACM SIGCOMM (August 2004).
-
(2004)
Proceedings of the ACM SIGCOMM
-
-
WANG, H.J.1
GUO, C.2
SIMON, D.R.3
ZUGENMAIER, A.4
|