-
1
-
-
4544355928
-
-
LAAS-CNRS, Toulouse, and University of Newcastle upon Tyne Report MAFTIA deliverable D21
-
Adelsbach A., Cachin C., Creese S., Deswarte Y., Kursawe K., Laprie J.-C., Powell D., Randell B., Riodan J., Ryan P., Simmionds W., Stroud R.J., Verssimo P., Waidner M., and Wespi A. Conceptual Model and Architecture of MAFTIA (January 31, 2003), LAAS-CNRS, Toulouse, and University of Newcastle upon Tyne. http://www.laas.research.ec.org/maftia/deliverables/D21.pdf Report MAFTIA deliverable D21
-
(2003)
Conceptual Model and Architecture of MAFTIA
-
-
Adelsbach, A.1
Cachin, C.2
Creese, S.3
Deswarte, Y.4
Kursawe, K.5
Laprie, J.-C.6
Powell, D.7
Randell, B.8
Riodan, J.9
Ryan, P.10
Simmionds, W.11
Stroud, R.J.12
Verssimo, P.13
Waidner, M.14
Wespi, A.15
-
2
-
-
77956725041
-
-
Definition of security and reliability
-
Arce I. Woah, please back up for one second (October 31, 2000). http://online.securityfocus.com/archive/98/142495 Definition of security and reliability
-
(2000)
Woah, please back up for one second
-
-
Arce, I.1
-
6
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
Baratloo A., Singh N., and Tsai T. Transparent run-time defense against stack smashing attacks. 2000 USENIX Annual Technical Conference, San Diego, CA (June 18-23, 2000)
-
(2000)
2000 USENIX Annual Technical Conference, San Diego, CA
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
7
-
-
12144276864
-
Timing the application of security patches for optimal uptime
-
Beattie S.M., Cowan C., Arnold S., Wagle P., Wright C., and Shostack A. Timing the application of security patches for optimal uptime. USENIX 16th Systems Administration Conference (LISA), Philadelphia, PA (November 2002)
-
(2002)
USENIX 16th Systems Administration Conference (LISA), Philadelphia, PA
-
-
Beattie, S.M.1
Cowan, C.2
Arnold, S.3
Wagle, P.4
Wright, C.5
Shostack, A.6
-
8
-
-
0005908365
-
Distributed firewalls
-
Bellovin S.M. Distributed firewalls. ;login: 24 (November 1999)
-
(1999)
;login:
, vol.24
-
-
Bellovin, S.M.1
-
9
-
-
84942618976
-
GlobalGuard: Creating the IETF-IDWG Intrusion Alert Protocol (IAP)
-
Bester J., Walther A., Erlinger M., Buchheim T., Feinstein B., Mathews G., Pollock R., and Levitt K. GlobalGuard: Creating the IETF-IDWG Intrusion Alert Protocol (IAP). DARPA Information Survivability Conference Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference Expo (DISCEX II), Anaheim, CA
-
-
Bester, J.1
Walther, A.2
Erlinger, M.3
Buchheim, T.4
Feinstein, B.5
Mathews, G.6
Pollock, R.7
Levitt, K.8
-
10
-
-
3042667685
-
Address obfuscation: an approach to combat buffer overflows, format-string attacks, and more
-
Bhatkar S., DuVarney D.C., and Sekar R. Address obfuscation: an approach to combat buffer overflows, format-string attacks, and more. 12th USENIX Security Symposium, Washington, DC (August 2003)
-
(2003)
12th USENIX Security Symposium, Washington, DC
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
13
-
-
0034823003
-
A trend analysis of exploitations
-
http://www.cs.umd.edu/~waa/pubs/CS-TR-4200.pdf
-
Browne H.K., Arbaugh W.A., McHugh J., and Fithen W.L. A trend analysis of exploitations. Proceedings of the 2001 IEEE Security and Privacy Conference, Oakland, CA (May 2001) 214-229. http://www.cs.umd.edu/~waa/pubs/CS-TR-4200.pdf http://www.cs.umd.edu/~waa/pubs/CS-TR-4200.pdf
-
(2001)
Proceedings of the 2001 IEEE Security and Privacy Conference, Oakland, CA
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
20
-
-
20444493210
-
Defcon capture the flag: Defending vulnerable code from intense attack
-
Cowan C., Arnold S., Beattie S.M., and Wright C. Defcon capture the flag: Defending vulnerable code from intense attack. DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC (April 22-24, 2003)
-
(2003)
DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC
-
-
Cowan, C.1
Arnold, S.2
Beattie, S.M.3
Wright, C.4
-
21
-
-
85084161775
-
FormatGuard: automatic protection from printf format string vulnerabilities
-
Cowan C., Barringer M., Beattie S., Kroah-Hartman G., Frantzen M., and Lokier J. FormatGuard: automatic protection from printf format string vulnerabilities. USENIX Security Symposium, Washington, DC (August 2001)
-
(2001)
USENIX Security Symposium, Washington, DC
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
22
-
-
85009448253
-
PointGuard: protecting pointers from buffer overflow vulnerabilities
-
Cowan C., Beattie S., Johansen J., and Wagle P. PointGuard: protecting pointers from buffer overflow vulnerabilities. USENIX Security Symposium, Washington, DC (August 2003)
-
(2003)
USENIX Security Symposium, Washington, DC
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
23
-
-
1542697134
-
SubDomain: parsimonious server security
-
Cowan C., Beattie S., Pu C., Wagle P., and Gligor V. SubDomain: parsimonious server security. USENIX 14th Systems Administration Conference (LISA), New Orleans, LA (December 2000)
-
(2000)
USENIX 14th Systems Administration Conference (LISA), New Orleans, LA
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
24
-
-
85084160959
-
RaceGuard: kernel protection from temporary file race vulnerabilities
-
Cowan C., Beattie S., Wright C., and Kroah-Hartman G. RaceGuard: kernel protection from temporary file race vulnerabilities. USENIX Security Symposium, Washington, DC (August 2001)
-
(2001)
USENIX Security Symposium, Washington, DC
-
-
Cowan, C.1
Beattie, S.2
Wright, C.3
Kroah-Hartman, G.4
-
25
-
-
84858929364
-
The cracker patch choice: an analysis of post hoc security techniques
-
Cowan C., Hinton H., Pu C., and Walpole J. The cracker patch choice: an analysis of post hoc security techniques. Proceedings of the 19th National Information Systems Security Conference (NISSC 2000), Baltimore, MD (October 2000)
-
(2000)
Proceedings of the 19th National Information Systems Security Conference (NISSC 2000), Baltimore, MD
-
-
Cowan, C.1
Hinton, H.2
Pu, C.3
Walpole, J.4
-
26
-
-
84962210926
-
Death, taxes, and imperfect software: surviving the inevitable
-
Cowan C., Pu C., and Hinton H. Death, taxes, and imperfect software: surviving the inevitable. Proceedings of the New Security Paradigms Workshop, Charlottesville, VA (September 1998)
-
(1998)
Proceedings of the New Security Paradigms Workshop, Charlottesville, VA
-
-
Cowan, C.1
Pu, C.2
Hinton, H.3
-
27
-
-
85084160243
-
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan C., Pu C., Maier D., Hinton H., Bakke P., Beattie S., Grier A., Wagle P., and Zhang Q. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. 7th USENIX Security Conference, San Antonio, TX (January 1998) 63-77
-
(1998)
7th USENIX Security Conference, San Antonio, TX
, pp. 63-77
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
28
-
-
0002582136
-
Buffer overflows: attacks and defenses for the vulnerability of the decade
-
Also presented as an invited talk at SANS 2000, March 23-26, 2000, Orlando, FL, http://schafercorp-ballston.com/discex
-
Cowan C., Wagle P., Pu C., Beattie S., and Walpole J. Buffer overflows: attacks and defenses for the vulnerability of the decade. DARPA Information Survivability Conference and Expo (DISCEX) (January 2000). http://schafercorp-ballston.com/discex Also presented as an invited talk at SANS 2000, March 23-26, 2000, Orlando, FL, http://schafercorp-ballston.com/discex
-
(2000)
DARPA Information Survivability Conference and Expo (DISCEX)
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
31
-
-
0003449736
-
-
Software Engineering Institute
-
Ellison R.J., Fisher D.A., Linger R.C., Lipson H.F., Longstaff T., and Mead N.R. Survivable Network Systems: An Emerging Discipline, Report CMU/SEI-97-TR-013 (November 1997), Software Engineering Institute. http://www.cert.org/research/tr13/97tr013title.html
-
(1997)
Survivable Network Systems: An Emerging Discipline, Report CMU/SEI-97-TR-013
-
-
Ellison, R.J.1
Fisher, D.A.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.5
Mead, N.R.6
-
32
-
-
84964540406
-
Modeling system calls for intrusion detecting with dynamic window sizes
-
Eskin E., Lee W., and Stolfo S.J. Modeling system calls for intrusion detecting with dynamic window sizes. DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA
-
-
Eskin, E.1
Lee, W.2
Stolfo, S.J.3
-
34
-
-
84942256107
-
Statistical approaches to DDoS attack detection and response
-
Feinstein L., Schnackenberg D., Balupari R., and Kindred D. Statistical approaches to DDoS attack detection and response. DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC (April 22-24, 2003)
-
(2003)
DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
35
-
-
0029716418
-
A sense of self for UNIX processes
-
Forrest S., Hofmeyr S.A., Somayaji A., and Longstaff T.A. A sense of self for UNIX processes. Proceedings of the IEEE Symposium on Security Privacy, Oakland, CA (1996)
-
(1996)
Proceedings of the IEEE Symposium on Security Privacy, Oakland, CA
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
42
-
-
33749620140
-
The strategy of the Fighter Pilot
-
Hamonds K.H. The strategy of the Fighter Pilot. Fast Company 59 (June 2002)
-
(2002)
Fast Company
, vol.59
-
-
Hamonds, K.H.1
-
43
-
-
84964474583
-
Interception, wrapping and analysis framework for Win32 Scripts
-
Hollebeek T., and Berrier D. Interception, wrapping and analysis framework for Win32 Scripts. DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA
-
-
Hollebeek, T.1
Berrier, D.2
-
46
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Jim T., Morrisett G., Grossman D., Hicks M., Cheney J., and Wang Y. Cyclone: A safe dialect of C. Proceedings of USENIX Annual Technical Conference, Monteray, CA (June 2002)
-
(2002)
Proceedings of USENIX Annual Technical Conference, Monteray, CA
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
50
-
-
84964510395
-
Dynamic approaches to thwart adversary intelligence gathering
-
Kewley D., Fink R., Lowry J., and Dean M. Dynamic approaches to thwart adversary intelligence gathering. DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA
-
-
Kewley, D.1
Fink, R.2
Lowry, J.3
Dean, M.4
-
51
-
-
0242666599
-
Writing, supporting, and evaluating Tripwire: A publicly available security tool
-
Kim G.H., and Spafford E.H. Writing, supporting, and evaluating Tripwire: A publicly available security tool. Proceedings of the USENIX UNIX Applications Development Symposium, Toronto, Canada (1994) 88-107
-
(1994)
Proceedings of the USENIX UNIX Applications Development Symposium, Toronto, Canada
, pp. 88-107
-
-
Kim, G.H.1
Spafford, E.H.2
-
52
-
-
0022581573
-
An experimental evaluation of the assumptions of independence in multiversion programming
-
Knight J.C., and Leveson N.G. An experimental evaluation of the assumptions of independence in multiversion programming. IEEE Transactions on Software Engineering 12 1 (1986) 96-109
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 96-109
-
-
Knight, J.C.1
Leveson, N.G.2
-
53
-
-
84942246436
-
Towards a rigorous definition of information system survivability
-
Knight J.C., Strunk E.A., and Sullivan K.J. Towards a rigorous definition of information system survivability. DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC (April 22-24, 2003)
-
(2003)
DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC
-
-
Knight, J.C.1
Strunk, E.A.2
Sullivan, K.J.3
-
56
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Lee W., Stoflo S.J., Chan P.K., Eskin E., Fan W., Miller M., Hershkop S., and Zhang J. Real time data mining-based intrusion detection. DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA
-
-
Lee, W.1
Stoflo, S.J.2
Chan, P.K.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
58
-
-
0012249167
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann R., Haines J.W., Fried D.J., Korba J., and Das K. The 1999 DARPA off-line intrusion detection evaluation. Recent Advances in Intrusion Detection (RAID), Toulouse, France (October 2-4, 2000)
-
(2000)
Recent Advances in Intrusion Detection (RAID), Toulouse, France
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
60
-
-
77956759303
-
-
In conjunction with the ACM International Conference on Computer and Communications Security (CCS-10)
-
Liu P., and Pal P. Workshop on Survivable and Self-Regenerative Systems (October 31, 2003) In conjunction with the ACM International Conference on Computer and Communications Security (CCS-10)
-
(2003)
Workshop on Survivable and Self-Regenerative Systems
-
-
Liu, P.1
Pal, P.2
-
67
-
-
84942253601
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
Papadopoulos C., Lindell R., Mehringer J., Hussain A., and Govindan R. COSSACK: Coordinated Suppression of Simultaneous Attacks. DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC (April 22-24, 2003)
-
(2003)
DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
70
-
-
0004145058
-
-
Network Associates Inc
-
Ptacek T.H., and Newsham T.N. Insertion, Evation, and Denial of Service: Eluding Network Intrusion Detection, Report (January 1998), Network Associates Inc. http://www.nai.com/products/security/advisory/papers/ids-html/doc001.asp
-
(1998)
Insertion, Evation, and Denial of Service: Eluding Network Intrusion Detection, Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
71
-
-
0028257391
-
Critical system properties: Survey and taxonomy
-
Rushby J. Critical system properties: Survey and taxonomy. Reliability Engineering and System Safety 43 2 (1994) 189-219
-
(1994)
Reliability Engineering and System Safety
, vol.43
, Issue.2
, pp. 189-219
-
-
Rushby, J.1
-
72
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer J.H., and Schroeder M.D. The protection of information in computer systems. Proceedings of the IEEE 63 9 (November 1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
73
-
-
0035361712
-
Network support for IP traceback
-
Savage S., Wetherall D., Karlin A., and Anderson T. Network support for IP traceback. IEEE/ACM Transactions on Networking 9 3 (June 2001) 226-237
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.3
, pp. 226-237
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
74
-
-
84964469507
-
Preventing the execution of unauthorized Win32 applications
-
Schmid M., Hill F., Ghosh A.K., and Bloch J.T. Preventing the execution of unauthorized Win32 applications. DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA
-
-
Schmid, M.1
Hill, F.2
Ghosh, A.K.3
Bloch, J.T.4
-
77
-
-
84889160249
-
-
Song D. Fragroute (May 27, 2002). http://monkey.org/~dugsong/fragroute/
-
(2002)
Fragroute
-
-
Song, D.1
-
78
-
-
84964546164
-
Intrusion tolerant software architectures
-
Stavridou V., Dutertre B., Riemenschneider R.A., and Saldi H. Intrusion tolerant software architectures. DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA (June 12-14, 2001)
-
(2001)
DARPA Information Survivability Conference and Expo (DISCEX II), Anaheim, CA
-
-
Stavridou, V.1
Dutertre, B.2
Riemenschneider, R.A.3
Saldi, H.4
-
79
-
-
0003499635
-
-
Prentice-Hall
-
Strom R.E., Bacon D.F., Goldberg A., Lowry A., Yellin D., and Yemini S.A. Hermes: A Language for Distributed Computing (1991), Prentice-Hall
-
(1991)
Hermes: A Language for Distributed Computing
-
-
Strom, R.E.1
Bacon, D.F.2
Goldberg, A.3
Lowry, A.4
Yellin, D.5
Yemini, S.A.6
-
80
-
-
0022605097
-
Typestate: A programming language concept for enhancing software reliability
-
Strom R.E., and Yemini S.A. Typestate: A programming language concept for enhancing software reliability. IEEE Transactions on Software Engineering 12 1 (January 1986) 157-171
-
(1986)
IEEE Transactions on Software Engineering
, vol.12
, Issue.1
, pp. 157-171
-
-
Strom, R.E.1
Yemini, S.A.2
-
83
-
-
77956736041
-
-
'The PaX Team'. PaX (May 2003). http://pageexec.virtualave.net/
-
(2003)
'The PaX Team'. PaX
-
-
-
85
-
-
34250620174
-
NetBouncer: client-legitimacy-based high-performance DDoS filtering
-
Thomas R., Mark B., Johnson T., and Croall J. NetBouncer: client-legitimacy-based high-performance DDoS filtering. DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC (April 22-24, 2003)
-
(2003)
DARPA Information Survivability Conference and Expo (DISCEX III), Washington, DC
-
-
Thomas, R.1
Mark, B.2
Johnson, T.3
Croall, J.4
-
86
-
-
84960561455
-
On computable numbers with an application to the Entscheidungsproblem
-
Turing A. On computable numbers with an application to the Entscheidungsproblem. Proc. London Math. Society 42 2 (1937) 230-265
-
(1937)
Proc. London Math. Society
, vol.42
, Issue.2
, pp. 230-265
-
-
Turing, A.1
-
88
-
-
84949505015
-
ITS4: A static vulneability scanner for C and C++ code
-
Viega J., Bloch J.T., Kohno T., and McGraw G. ITS4: A static vulneability scanner for C and C++ code. Annual Computer Security Applications Conference (ACSAC), New Orleans, LA (December 2000). http://www.cigital.com/its4/
-
(2000)
Annual Computer Security Applications Conference (ACSAC), New Orleans, LA
-
-
Viega, J.1
Bloch, J.T.2
Kohno, T.3
McGraw, G.4
-
90
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Wagner D., Foster J.S., Brewer E.A., and Aiken A. A first step towards automated detection of buffer overrun vulnerabilities. NDSS (Network and Distributed System Security), San Diego, CA (February 2000)
-
(2000)
NDSS (Network and Distributed System Security), San Diego, CA
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
92
-
-
77956753942
-
Window of opportunity closing for patching
-
Walsh L.M. Window of opportunity closing for patching. Security Wire Digest 5 66 (September 4, 2003). http://infosecuritymag.techtarget.com/ss/0,295812,sid6_iss82,00.html#news2
-
(2003)
Security Wire Digest
, vol.5
, Issue.66
-
-
Walsh, L.M.1
-
93
-
-
33751530872
-
-
Wheeler D. Flawfinder (July 2, 2002). http://www.dwheeler.com/flawfinder/
-
(2002)
Flawfinder
-
-
Wheeler, D.1
-
94
-
-
32344450199
-
Linux security module framework
-
Wright C., Cowan C., Smalley S., Morris J., and Kroah-Hartman G. Linux security module framework. Ottawa Linux Symposium, Ottawa, Canada (June 2002)
-
(2002)
Ottawa Linux Symposium, Ottawa, Canada
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
95
-
-
85084164351
-
Linux security modules: general security support for the Linux kernel
-
Wright C., Cowan C., Smalley S., Morris J., and Kroah-Hartman G. Linux security modules: general security support for the Linux kernel. USENIX Security Symposium, San Francisco, CA (August 2002). http://lsm.immunix.org
-
(2002)
USENIX Security Symposium, San Francisco, CA
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
97
-
-
77956726543
-
Heterogeneous networking: a new survivability paradigm
-
Zhang Y., Dao S.K., Vin H., Alvisi L., and Wenke Lee L.A. Heterogeneous networking: a new survivability paradigm. Proceedings of the New Security Paradigms Workshop, Cloudcroft, NM (September 2001)
-
(2001)
Proceedings of the New Security Paradigms Workshop, Cloudcroft, NM
-
-
Zhang, Y.1
Dao, S.K.2
Vin, H.3
Alvisi, L.4
Wenke Lee, L.A.5
|