-
1
-
-
85084161234
-
MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
-
A. Acharya and M. Raje. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. USENIX Security 2000.
-
(2000)
USENIX Security
-
-
Acharya, A.1
Raje, M.2
-
2
-
-
0036086884
-
Using Programmer-Written Compiler Extensions to Catch Security Holes
-
K. Ashcraft and D. Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. IEEE Security and Privacy 2002.
-
(2002)
IEEE Security and Privacy
-
-
Ashcraft, K.1
Engler, D.2
-
5
-
-
85084162921
-
Privtrans: Automatically partitioning Programs for Privilege Separation
-
D. Brumley and D. Song. Privtrans: Automatically partitioning Programs for Privilege Separation. USENIX Security 2004.
-
(2004)
USENIX Security
-
-
Brumley, D.1
Song, D.2
-
6
-
-
84988659301
-
Sendmail without the Superuser
-
M. E. Carson. Sendmail without the Superuser. USENIX Security 1993.
-
(1993)
USENIX Security
-
-
Carson, M. E.1
-
12
-
-
10044275460
-
SubDomain: Parsimonious Server Security
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious Server Security. LISA 2000.
-
(2000)
LISA
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
14
-
-
85180527583
-
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
-
T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. NDSS 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
-
18
-
-
33645594907
-
Measuring Relative Attack Surfaces
-
Taipei, December Also CMU-CS-03-169 Technical Report, August 2003
-
M. Howard, J. Pincus, and J. Wing. Measuring Relative Attack Surfaces. Proceedings of Workshop on Advanced Developments in Software and Systems Security, Taipei, December 2003. Also CMU-CS-03-169 Technical Report, August 2003.
-
(2003)
Proceedings of Workshop on Advanced Developments in Software and Systems Security
-
-
Howard, M.1
Pincus, J.2
Wing, J.3
-
22
-
-
85180410443
-
-
Microsoft
-
Microsoft. Retrieving the Properties of a Connection (VBScript). http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ics/ics/retrieving the properties_of_a_connection_vbscript_.asp.
-
Retrieving the Properties of a Connection (VBScript)
-
-
-
25
-
-
84878346861
-
Improving Host Security with System Call Policies
-
N. Provos. Improving Host Security with System Call Policies. USENIX Security 2003.
-
(2003)
USENIX Security
-
-
Provos, N.1
-
28
-
-
84870638842
-
-
Chapter 15: Mandatory Access Control
-
T. Rhodes. FreeBSD Handbook, Chapter 15: Mandatory Access Control, http://www.freebsd.org/doc/en US.ISO8859-1/books/handbook/mac.htmlciteseer.nj.nec.com/ganesh03peertopeer.html.
-
FreeBSD Handbook
-
-
Rhodes, T.1
-
29
-
-
38849103391
-
Measurement and Analysis of Spyware in a University Environment
-
S. Saroiu, S. D. Gribble, and H. M. Levy. Measurement and Analysis of Spyware in a University Environment. NSDI 2004.
-
(2004)
NSDI
-
-
Saroiu, S.1
Gribble, S. D.2
Levy, H. M.3
-
30
-
-
85180406262
-
Ostia: A Delegating Architecture for Secure System Call Interposition
-
M. R. Tal Garfinkel, Ben Pfaff. Ostia: A Delegating Architecture for Secure System Call Interposition. NDSS 2004.
-
(2004)
NDSS
-
-
Tal Garfinkel, M. R.1
Pfaff, Ben2
-
33
-
-
33750584355
-
Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management
-
Nov
-
Y.-M. Wang, R. Roussev, C. Verbowski, A. Johnson, M.W. Wu, Y. Huang, and S.-Y. Kuo. Gatekeeper: Monitoring Auto-Start Extensibility Points (ASEPs) for Spyware Management. In Proceedings of Usenix LISA, Nov. 2004.
-
(2004)
Proceedings of Usenix LISA
-
-
Wang, Y.-M.1
Roussev, R.2
Verbowski, C.3
Johnson, A.4
Wu, M.W.5
Huang, Y.6
Kuo, S.-Y.7
-
34
-
-
14844302134
-
MECA: an Extensible, Expressive System and Language for Statically Checking Security Properties
-
J. Yang, T. Kremenek, Y. Xie, and D. Engler. MECA: an Extensible, Expressive System and Language for Statically Checking Security Properties. ACM CCS 2003.
-
(2003)
ACM CCS
-
-
Yang, J.1
Kremenek, T.2
Xie, Y.3
Engler, D.4
|