-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
The Mitre Corporation, Apr.
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153, The Mitre Corporation, Apr. 1977.
-
(1977)
Technical Report MTR-3153
-
-
Biba., K.J.1
-
3
-
-
84869673984
-
-
BitBlaze project. http://bitblaze.cs.berkeley.edu/.
-
BitBlaze Project
-
-
-
4
-
-
85077688456
-
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
-
Aug.
-
D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In Proceedings of USENIX Security Symposium, Aug. 2007.
-
(2007)
Proceedings of USENIX Security Symposium
-
-
Brumley, D.1
Caballero, J.2
Liang, Z.3
Newsome, J.4
Song., D.5
-
6
-
-
85084160792
-
Understanding data lifetime via whole system simulation
-
August
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding data lifetime via whole system simulation. In USENIX Security Symposium, August 2004.
-
(2004)
USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
10
-
-
84885679117
-
Vigilante: end-to-end containment of internet worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In 20th ACM Symposium on Operating System Principles (SOSP), 2005.
-
(2005)
20th ACM Symposium on Operating System Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham., P.7
-
15
-
-
70450259147
-
Adjusting likelihood ratio confidence intervals for parameters near boundaries applied to the binomial
-
Aug.
-
S. Dorai-Raj and S. Graves. Adjusting likelihood ratio confidence intervals for parameters near boundaries applied to the binomial. In Joint Statistical Meeting (JSM), Aug. 2006.
-
(2006)
Joint Statistical Meeting (JSM)
-
-
Dorai-Raj, S.1
Graves, S.2
-
16
-
-
84903607772
-
Dynamic spyware analysis
-
June
-
M. Egele, C. Kruegel, E. Kirda, H. Yin, and D. Song. Dynamic spyware analysis. In Proceedings of USENIX Annual Technical Conference, June 2007.
-
(2007)
Proceedings of USENIX Annual Technical Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song., D.5
-
21
-
-
57349116220
-
Lagrange multipliers and maximum information leakage in different observational models
-
June
-
P. Malacaria and H. Chen. Lagrange multipliers and maximum information leakage in different observational models. In Workshop on Programming Languages and Analysis for Security, pages 135-146, June 2008.
-
(2008)
Workshop on Programming Languages and Analysis for Security
, pp. 135-146
-
-
Malacaria, P.1
Chen, H.2
-
29
-
-
58449129985
-
BitBlaze: A new approach to computer security via binary analysis
-
Hyderabad, India, Dec. Keynote invited paper
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A new approach to computer security via binary analysis. In International Conference on Information Systems Security, pages 1-25, Hyderabad, India, Dec. 2008. Keynote invited paper.
-
(2008)
International Conference on Information Systems Security
, pp. 1-25
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
30
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct.
-
G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS XI, Oct. 2004.
-
(2004)
ASPLOS XI
-
-
Suh, G.E.1
Lee, J.2
Devadas., S.3
-
31
-
-
21644475650
-
RIFLE: An architectural framework for usercentric information-flow security
-
Dec.
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An architectural framework for usercentric information-flow security. In Proceedings of the 37th International Symposium on Microarchitecture, Dec. 2004.
-
(2004)
Proceedings of the 37th International Symposium on Microarchitecture
-
-
Vachharajani, N.1
Bridges, M.J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J.A.6
Reis, G.A.7
Vachharajani, M.8
August, D.I.9
-
33
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium, 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar., R.3
-
34
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Oct.
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing system-wide information flow for malware detection and analysis. In Proceedings of ACM Conference on Computer and Communication Security, Oct. 2007.
-
(2007)
Proceedings of ACM Conference on Computer and Communication Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|