-
1
-
-
34247546866
-
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
-
J. Wilander, M. Kamkar. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. In Proceedings of the 10th Network and Distributed System Security Symposium, San Diego, CA, February 2003, pp. 149-162.
-
Proceedings of the 10th Network and Distributed System Security Symposium, San Diego, CA, February 2003
, pp. 149-162
-
-
Wilander, J.1
Kamkar, M.2
-
2
-
-
29144459134
-
-
Technical Report MIT-LCS-TR-912, Computer Science and Artificial Intelligence Laboratory, MIT
-
G.E. Suh, J. Lee, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. Technical Report MIT-LCS-TR-912, Computer Science and Artificial Intelligence Laboratory, MIT, 2003.
-
(2003)
Secure Program Execution Via Dynamic Information Flow Tracking
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
3
-
-
28244455964
-
Exploiting Streams in Instruction and Data Address Trace Compression
-
A. Milenkovic and M. Milenkovic. Exploiting Streams in Instruction and Data Address Trace Compression. In Proceedings of IEEE 6th Annual Workshop on Workload Characterization, Austin, TX, October 2003, pp. 99-107.
-
Proceedings of IEEE 6th Annual Workshop on Workload Characterization, Austin, TX, October 2003
, pp. 99-107
-
-
Milenkovic, A.1
Milenkovic, M.2
-
5
-
-
85081874807
-
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of Networking and Distributed System Security Symposium 2000, San Diego, CA, February 2000.
-
Proceedings of Networking and Distributed System Security Symposium 2000, San Diego, CA, February 2000
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
6
-
-
0036949385
-
Enabling Trusted Software Integrity
-
D. Kirovski, M. Drinic, and M. Potkonjak. Enabling Trusted Software Integrity. In Proceedings of ASPLOS, San Jose, CA, 2002, pp. 108-120.
-
Proceedings of ASPLOS, San Jose, CA, 2002
, pp. 108-120
-
-
Kirovski, D.1
Drinic, M.2
Potkonjak, M.3
-
7
-
-
84880174811
-
Detecting Intrusions Using System Calls: Alternative Data Models
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting Intrusions Using System Calls: Alternative Data Models. In IEEE Symposium on Security and Privacy, Oakland, CA, 1999, pp. 133-145.
-
IEEE Symposium on Security and Privacy, Oakland, CA, 1999
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
8
-
-
33845496940
-
An Improved Intrusion Detection Method Based on Process Profiling
-
November
-
I. Sato, Y. Okazaki, and S. Goto. An Improved Intrusion Detection Method Based on Process Profiling. IPSJ Journal, Vol.43, No.11, pp. 3316-3326, November 2002.
-
(2002)
IPSJ Journal
, vol.43
, Issue.11
, pp. 3316-3326
-
-
Sato, I.1
Okazaki, Y.2
Goto, S.3
-
9
-
-
0342772503
-
On Preventing Intrusions by Process Behavior Monitoring
-
R. Sekar, T. Bowen and M. Segal. On Preventing Intrusions by Process Behavior Monitoring. In Eighth USENIX Security Symposium, Washington, DC, Aug 1999, pp. 29-40.
-
Eighth USENIX Security Symposium, Washington, DC, Aug 1999
, pp. 29-40
-
-
Sekar, R.1
Bowen, T.2
Segal, M.3
-
12
-
-
12344316966
-
Architecture Support for Defending Against Buffer Overflow Attacks
-
J. Xu, Z. Kalbarczyk, S. Patel and R. K. Iyer. Architecture Support for Defending Against Buffer Overflow Attacks. In Proceedings of Workshop on Evaluating and Architecting System Dependability (EASY), San Jose, California, October 2002.
-
Proceedings of Workshop on Evaluating and Architecting System Dependability (EASY), San Jose, California, October 2002
-
-
Xu, J.1
Kalbarczyk, Z.2
Patel, S.3
Iyer, R.K.4
-
13
-
-
0036704573
-
Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection
-
August
-
C. Collberg and C. Thomborson. Watermarking, Tamper-Proofing, and Obfuscation - Tools for Software Protection. IEEE Transactions on software engineering, Vol. 28, No. 8, pp. 735-746, August 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.1
Thomborson, C.2
|