-
1
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, "Pin: Building customized program analysis tools with dynamic instrumentation, " Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI), pp. 190-200, 2005.
-
(2005)
Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation (PLDI)
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
2
-
-
35448955692
-
Valgrind: A framework for heavyweight dynamic binary instrumentation
-
N. Nethercote and J. Seward, "Valgrind: A framework for heavyweight dynamic binary instrumentation, " SIGPLAN Not., vol. 42, no. 2, pp. 89-100, 2007.
-
(2007)
SIGPLAN Not.
, vol.42
, Issue.2
, pp. 89-100
-
-
Nethercote, N.1
Seward, J.2
-
4
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin, C. Wang, Z. Li, H. Kim, Y. Zhou, and Y. Wu, "LIFT: A low-overhead practical information flow tracking system for detecting security attacks, " Proc. 39th Annual IEEE/ACM International Symposium on Microarchitecture, pp. 135-148, 2006.
-
(2006)
Proc. 39th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.4
Zhou, Y.5
Wu, Y.6
-
5
-
-
34548212308
-
Dytan: A generic dynamic taint analysis framework
-
J. Clause, W. Li, and A. Orso, "Dytan: A generic dynamic taint analysis framework, " Proc. International Symposium on Software Testing and Analysis, pp. 196-206, 2007.
-
(2007)
Proc. International Symposium on Software Testing and Analysis
, pp. 196-206
-
-
Clause, J.1
Li, W.2
Orso, A.3
-
6
-
-
34748920692
-
Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
-
G. Portokalidis, A. Slowinska, and H. Bos, "Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation, " Proc. 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys), pp. 15-27, 2006.
-
(2006)
Proc. 1st ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys)
, pp. 15-27
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
7
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: Capturing system-wide information flow for malware detection and analysis, " Proc. 14th ACM Conf. on Computer and Communications Security (CCS), pp. 116-127, 2007.
-
(2007)
Proc. 14th ACM Conf. on Computer and Communications Security (CCS)
, pp. 116-127
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
8
-
-
26844555602
-
Addressing the monoculture
-
G. Goth, "Addressing the monoculture, " IEEE Security & Privacy, vol. 1, no. 6, pp. 8-10, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 8-10
-
-
Goth, G.1
-
9
-
-
85180635118
-
Software selfhealing using collaborative application communities
-
M. Locasto, S. Sidiroglou, and A. D. Keromytis, "Software selfhealing using collaborative application communities, " Proc. 13th Symposium on Network and Distributed System Security (NDSS), pp. 95-106, 2006.
-
(2006)
Proc. 13th Symposium on Network and Distributed System Security (NDSS)
, pp. 95-106
-
-
Locasto, M.1
Sidiroglou, S.2
Keromytis, A.D.3
-
11
-
-
16344396406
-
Monitoring and early warning for internet worms
-
C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and early warning for internet worms, " Proc. 10th ACM Conf. on Computer and Communications Security (CCS), pp. 190-199, 2003.
-
(2003)
Proc. 10th ACM Conf. on Computer and Communications Security (CCS)
, pp. 190-199
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
12
-
-
85084162258
-
How to own the internet in your spare time
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the internet in your spare time, " Proc. 11th USENIX Security Symposium, pp. 149-167, 2002.
-
(2002)
Proc. 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
13
-
-
85027154511
-
-
http://scragz.com/tech/mozilla/test-rendering-time.php
-
-
-
-
14
-
-
85027137919
-
-
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2004-0940
-
-
-
-
15
-
-
85027144046
-
-
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2004-1373
-
-
-
-
16
-
-
85027126351
-
-
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2002-1816
-
-
-
-
17
-
-
85027196984
-
-
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4060
-
-
-
-
18
-
-
85027165066
-
-
http://www.securityfocus.com/bid/30034
-
-
-
-
19
-
-
85027145577
-
-
http://www.apache.org/
-
-
-
-
20
-
-
85027183942
-
-
http://www.hpl.hp.com/research/linux/httperf/
-
-
-
-
21
-
-
85027201261
-
-
http://www.isi.deterlab.net/
-
-
-
|