-
1
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
Aug
-
ANAGNOSTAKIS, K., SIDIROGLOU, S., AKRITIDIS, P., XINIDIS, K., MARKATOS, E.,AND KEROMYTIS, A. D. Detecting targeted attacks using shadow honeypots. In USENIX Security (Aug. 2005).
-
(2005)
USENIX Security
-
-
ANAGNOSTAKIS, K.1
SIDIROGLOU, S.2
AKRITIDIS, P.3
XINIDIS, K.4
MARKATOS, E.5
KEROMYTIS, A.D.6
-
2
-
-
37148999612
-
Efficient detection of all pointer and array access errors
-
June
-
AUSTIN, T., BREACH, S., AND SOHI, G. Efficient detection of all pointer and array access errors. In PLDI (June 2004).
-
(2004)
PLDI
-
-
AUSTIN, T.1
BREACH, S.2
SOHI, G.3
-
3
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
Dec
-
BALIGA, A., GANAPATHY, V., AND IFTODE, L. Automatic inference and enforcement of kernel data structure invariants. In ACSAC (Dec. 2008), pp. 77-86.
-
(2008)
ACSAC
, pp. 77-86
-
-
BALIGA, A.1
GANAPATHY, V.2
IFTODE, L.3
-
4
-
-
33746101822
-
DieHard: Probabilistic memory safety for unsafe languages
-
June
-
BERGER, E., AND ZORN, B. DieHard: probabilistic memory safety for unsafe languages. In PLDI (June 2006).
-
(2006)
PLDI
-
-
BERGER, E.1
ZORN, B.2
-
5
-
-
31944438135
-
-
Ph.D, MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, Sep
-
BRUENING, D. Efficient, Transparent, and Comprehensive Runtime Code Manipulation. Ph.D., MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, Sep. 2004.
-
(2004)
Efficient, Transparent, and Comprehensive Runtime Code Manipulation
-
-
BRUENING, D.1
-
6
-
-
0035703918
-
Recursive restartability: Turning the reboot sledgehammer into a scalpel
-
Schloss Elmau, Germany, May
-
CANDEA, G., AND FOX, A. Recursive restartability: Turning the reboot sledgehammer into a scalpel. In HotOS (Schloss Elmau, Germany, May 2001).
-
(2001)
HotOS
-
-
CANDEA, G.1
FOX, A.2
-
7
-
-
0038716438
-
CCured in the real world
-
June
-
CONDIT, J., HARREN, M., MCPEAK, S., NECULA, G. C., AND WEIMER, W. CCured in the real world. In PLDI (June 2003).
-
(2003)
PLDI
-
-
CONDIT, J.1
HARREN, M.2
MCPEAK, S.3
NECULA, G.C.4
WEIMER, W.5
-
8
-
-
70450092967
-
-
COSTA, M., CASTRO, M., ANTONY, ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: securing software by blocking bad input. In SOSP (Oct. 2007).
-
COSTA, M., CASTRO, M., ANTONY, ZHOU, L., ZHANG, L., AND PEINADO, M. Bouncer: securing software by blocking bad input. In SOSP (Oct. 2007).
-
-
-
-
9
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
Oct
-
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: End-to-end containment of Internet worms. In SOSP (Oct. 2005).
-
(2005)
SOSP
-
-
COSTA, M.1
CROWCROFT, J.2
CASTRO, M.3
ROWSTRON, A.4
ZHOU, L.5
ZHANG, L.6
BARHAM, P.7
-
10
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
COWAN, C., PU, C., MAIER, D., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., ZHANG, Q., AND HINTON, H. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security (January 1998).
-
(1998)
USENIX Security
-
-
COWAN, C.1
PU, C.2
MAIER, D.3
WALPOLE, J.4
BAKKE, P.5
BEATTIE, S.6
GRIER, A.7
WAGLE, P.8
ZHANG, Q.9
HINTON, H.10
-
11
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
Dec
-
CRANDALL, J., AND CHONG, F. Minos: Control data attack prevention orthogonal to memory model. In MICRO (Dec. 2004).
-
(2004)
MICRO
-
-
CRANDALL, J.1
CHONG, F.2
-
12
-
-
72249114227
-
ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing
-
May
-
CUI, W., PEINADO, M., WANG, H. J., AND LOCASTO, M. E. ShieldGen: Automatic data patch generation for unknown vulnerabilities with informed probing. In IEEE S&P (May 2007).
-
(2007)
IEEE S&P
-
-
CUI, W.1
PEINADO, M.2
WANG, H.J.3
LOCASTO, M.E.4
-
13
-
-
34247373512
-
-
DEMSKY, B., ERNST, M. D., GUO, P. J., MCCAMANT, S., PERKINS, J. H., AND RINARD, M. Inference and enforcement of data structure consistency specifications. In ISSTA (July 2006).
-
DEMSKY, B., ERNST, M. D., GUO, P. J., MCCAMANT, S., PERKINS, J. H., AND RINARD, M. Inference and enforcement of data structure consistency specifications. In ISSTA (July 2006).
-
-
-
-
14
-
-
31744443403
-
Automatic detection and repair of errors in data structures
-
Oct
-
DEMSKY, B., AND RINARD, M. Automatic detection and repair of errors in data structures. In 18th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (Oct. 2003).
-
(2003)
18th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications
-
-
DEMSKY, B.1
RINARD, M.2
-
15
-
-
33244493764
-
Data structure repair using goal-directed reasoning
-
May
-
DEMSKY, B., AND RINARD, M. Data structure repair using goal-directed reasoning. In ICSE (May 2005).
-
(2005)
ICSE
-
-
DEMSKY, B.1
RINARD, M.2
-
16
-
-
0038256425
-
Dynamically discovering likely program invariants to support program evolution
-
Feb
-
ERNST, M. D., COCKRELL, J., GRISWOLD, W. G., AND NOTKIN, D. Dynamically discovering likely program invariants to support program evolution. IEEE TSE 27, 2 (Feb. 2001).
-
(2001)
IEEE TSE
, vol.27
, pp. 2
-
-
ERNST, M.D.1
COCKRELL, J.2
GRISWOLD, W.G.3
NOTKIN, D.4
-
17
-
-
35348872682
-
The Daikon system for dynamic detection of likely invariants
-
Dec
-
ERNST, M. D., PERKINS, J. H., GUO, P. J., MCCAMANT, S., PACHECO, C., TSCHANTZ, M. S., AND XIAO, C. The Daikon system for dynamic detection of likely invariants. Science of Computer Programming 69, 1-3 (Dec. 2007).
-
(2007)
Science of Computer Programming
, vol.69
, pp. 1-3
-
-
ERNST, M.D.1
PERKINS, J.H.2
GUO, P.J.3
MCCAMANT, S.4
PACHECO, C.5
TSCHANTZ, M.S.6
XIAO, C.7
-
18
-
-
72749113538
-
A genetic programming approach to automated software repair
-
July
-
FORREST, S., WEIMER, W., NGUYEN, T., AND GOUES, C. L. A genetic programming approach to automated software repair. In GECCO (July 2009).
-
(2009)
GECCO
-
-
FORREST, S.1
WEIMER, W.2
NGUYEN, T.3
GOUES, C.L.4
-
20
-
-
85084164164
-
-
JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX (June 2002).
-
JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX (June 2002).
-
-
-
-
21
-
-
0012582509
-
Backwards-compatible bounds checking for arrays and pointers in C programs
-
May
-
JONES, R., AND KELLY, P. Backwards-compatible bounds checking for arrays and pointers in C programs. In AADEBUG (May 1997).
-
(1997)
AADEBUG
-
-
JONES, R.1
KELLY, P.2
-
22
-
-
85076901048
-
Deadlock immunity: Enabling systems to defend against deadlocks
-
Dec
-
JULA, H., TRALAMAZZA, D., ZAMFIR, C., AND CANDEA, G. Deadlock immunity: Enabling systems to defend against deadlocks. In OSDI (Dec. 2008), pp. 295-308.
-
(2008)
OSDI
, pp. 295-308
-
-
JULA, H.1
TRALAMAZZA, D.2
ZAMFIR, C.3
CANDEA, G.4
-
23
-
-
17644371841
-
Run-time checking for C programs
-
KENDALL, S. C. Bcc: Run-time checking for C programs. In USENIX Summer (1983).
-
(1983)
USENIX Summer
-
-
KENDALL, S.C.B.1
-
25
-
-
34247092939
-
Improving adaptability via program steering
-
July
-
LIN, L., AND ERNST, M. D. Improving adaptability via program steering. In ISSTA (July 2004).
-
(2004)
ISSTA
-
-
LIN, L.1
ERNST, M.D.2
-
26
-
-
21644445842
-
The evolution of condor checkpointing
-
ACM Press/Addison-Wesley
-
LITZKOW, M., AND SOLOMON, M. The evolution of condor checkpointing. In Mobility: processes, computers, and agents (1999), ACM Press/Addison-Wesley.
-
(1999)
Mobility: Processes, computers, and agents
-
-
LITZKOW, M.1
SOLOMON, M.2
-
27
-
-
33750285193
-
Software self-healing using collaborative application communities
-
Feb
-
LOCASTO, M. E., SIDIROGLOU, S., AND KEROMYTIS, A. D. Software self-healing using collaborative application communities. In SNDSS (Feb. 2005).
-
(2005)
SNDSS
-
-
LOCASTO, M.E.1
SIDIROGLOU, S.2
KEROMYTIS, A.D.3
-
28
-
-
47349109259
-
Towards self-protecting enterprise applications
-
Nov
-
LORENZOLI, D., MARIANI, L., AND PEZZÈ, M. Towards self-protecting enterprise applications. In ISSRE (Nov. 2007), pp. 39-48.
-
(2007)
ISSRE
, pp. 39-48
-
-
LORENZOLI, D.1
MARIANI, L.2
PEZZÈ, M.3
-
29
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb
-
NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS (Feb. 2005).
-
(2005)
NDSS
-
-
NEWSOME, J.1
SONG, D.2
-
30
-
-
59449083597
-
Exterminator: Automatically correcting memory errors with high probability
-
Dec
-
NOVARK, G., BERGER, E., AND ZORN, B. Exterminator: Automatically correcting memory errors with high probability. Communications of the ACM 51, 12 (Dec. 2008).
-
(2008)
Communications of the ACM
, vol.51
, pp. 12
-
-
NOVARK, G.1
BERGER, E.2
ZORN, B.3
-
31
-
-
20344367789
-
-
PERKINS, J. H., AND ERNST, M. D. Efficient incremental algorithms for dynamic detection of likely invariants. In FSE (Nov. 2004).
-
PERKINS, J. H., AND ERNST, M. D. Efficient incremental algorithms for dynamic detection of likely invariants. In FSE (Nov. 2004).
-
-
-
-
32
-
-
33845429905
-
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: treating bugs as allergies-a safe method to survive software failures. SIGOPS Oper. Syst. Rev. 39, 5 (2005), 235-248.
-
QIN, F., TUCEK, J., SUNDARESAN, J., AND ZHOU, Y. Rx: treating bugs as allergies-a safe method to survive software failures. SIGOPS Oper. Syst. Rev. 39, 5 (2005), 235-248.
-
-
-
-
33
-
-
67249139196
-
Acceptability-oriented computing
-
Oct
-
RINARD, M. Acceptability-oriented computing. In OOPSLA Companion (Oct. 2003).
-
(2003)
OOPSLA Companion
-
-
RINARD, M.1
-
34
-
-
21644473822
-
-
RINARD, M., CADAR, C., DUMITRAN, D., ROY, D. M., AND LEU, T. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC (Dec. 2004).
-
RINARD, M., CADAR, C., DUMITRAN, D., ROY, D. M., AND LEU, T. A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In ACSAC (Dec. 2004).
-
-
-
-
35
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
December
-
RINARD, M., CADAR, C., DUMITRAN, D., ROY, D. M., LEU, T., AND WILLIAMS. BEEBEE, J. Enhancing server availability and security through failure-oblivious computing. In OSDI (December 2004).
-
(2004)
OSDI
-
-
RINARD, M.1
CADAR, C.2
DUMITRAN, D.3
ROY, D.M.4
LEU, T.5
WILLIAMS6
BEEBEE, J.7
-
37
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
February
-
RUWASE, O., AND LAM, M. S. A practical dynamic buffer overflow detector. In NDSS (February 2004).
-
(2004)
NDSS
-
-
RUWASE, O.1
LAM, M.S.2
-
38
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Oct
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-H., MODADUGU, N., AND BONEH, D. On the effectiveness of address-space randomization. In ACM CCS (Oct. 2004).
-
(2004)
ACM CCS
-
-
SHACHAM, H.1
PAGE, M.2
PFAFF, B.3
GOH, E.-H.4
MODADUGU, N.5
BONEH, D.6
-
39
-
-
84888577735
-
-
SIDIROGLOU, S., GIOVANIDIS, G., AND KEROMYTIS, A. D. A dynamic mechanism for recovering from buffer overflow attacks. In ISC (Sep. 2005).
-
SIDIROGLOU, S., GIOVANIDIS, G., AND KEROMYTIS, A. D. A dynamic mechanism for recovering from buffer overflow attacks. In ISC (Sep. 2005).
-
-
-
-
40
-
-
72249105542
-
Using rescue points to navigate software recovery
-
May
-
SIDIROGLOU, S., LAADAN, O., KEROMYTIS, A. D., AND NIEH, J. Using rescue points to navigate software recovery. In IEEE S&P (May 2007).
-
(2007)
IEEE S&P
-
-
SIDIROGLOU, S.1
LAADAN, O.2
KEROMYTIS, A.D.3
NIEH, J.4
-
41
-
-
67650079927
-
Assure: Automatic software self-healing using rescue points
-
SIDIROGLOU, S., LAADAN, O., PEREZ, C., VIENNOT, N., NIEH, J., AND KEROMYTIS, A. D. Assure: automatic software self-healing using rescue points. In ASPLOS '09 (2009).
-
(2009)
ASPLOS '09
-
-
SIDIROGLOU, S.1
LAADAN, O.2
PEREZ, C.3
VIENNOT, N.4
NIEH, J.5
KEROMYTIS, A.D.6
-
42
-
-
84906497159
-
-
SIDIROGLOU, S., LOCASTO, M. E., BOYD, S. W., AND KEROMYTIS, A. D. Building a reactive immune system for software services. In USENIX (Apr. 2005).
-
SIDIROGLOU, S., LOCASTO, M. E., BOYD, S. W., AND KEROMYTIS, A. D. Building a reactive immune system for software services. In USENIX (Apr. 2005).
-
-
-
-
43
-
-
84888523496
-
-
SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS (Feb. 2005).
-
SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS (Feb. 2005).
-
-
-
-
45
-
-
84888486900
-
-
Stackshield. www.angelfire.com/sk/stackshield.
-
Stackshield
-
-
-
46
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct
-
SUH, G., LEE, J., ZHANG, D., AND DEVADAS, S. Secure program execution via dynamic information flow tracking. In ASPLOS (Oct. 2004).
-
(2004)
ASPLOS
-
-
SUH, G.1
LEE, J.2
ZHANG, D.3
DEVADAS, S.4
-
47
-
-
84888546564
-
-
Symantech Internet security threat report, Sep. 2006
-
Symantech Internet security threat report. www.symantec.com, Sep. 2006.
-
-
-
-
48
-
-
41149086696
-
Sweeper: A lightweight end-to-end system for defending against fast worms
-
Mar
-
TUCEK, J., NEWSOME, J., LU, S., HUANG, C., XANTHOS, S., BRUMLEY, D., ZHOU, Y., AND SONG, D. Sweeper: A lightweight end-to-end system for defending against fast worms. In EuroSys (Mar. 2007).
-
(2007)
EuroSys
-
-
TUCEK, J.1
NEWSOME, J.2
LU, S.3
HUANG, C.4
XANTHOS, S.5
BRUMLEY, D.6
ZHOU, Y.7
SONG, D.8
-
49
-
-
1542376931
-
Protecting C programs from attacks via invalid pointer dereferences
-
YONG, S. H., AND HORWITZ, S. Protecting C programs from attacks via invalid pointer dereferences. In ESEC/FSE (2003).
-
(2003)
ESEC/FSE
-
-
YONG, S.H.1
HORWITZ, S.2
|