-
1
-
-
84878558984
-
Protection in programming-language translations
-
Kim G. Larsen, Sven Skyum, and Glynn Winskel, editors, Springer, Volume 1443 of Lecture Notes in Computer Science
-
Martín Abadi. Protection in programming-language translations. In Kim G. Larsen, Sven Skyum, and Glynn Winskel, editors, Proceedings of the 25th International Colloquium on Automata, Languages and Programming, volume 1443 of Lecture Notes in Computer Science, pages 868-883. Springer, 1998.
-
(1998)
Proceedings of the 25th International Colloquium on Automata, Languages and Programming
, pp. 868-883
-
-
Abadi, M.1
-
2
-
-
72449145808
-
Control-flow integrity: Principles, implementations, and applications
-
Martín Abadi, Mihai Budiu, Ú lfar Erlingsson, and Jay Ligatti. Control-flow integrity: principles, implementations, and applications. ACM Transactions on Information and System Security, 13(1):1-40, 2009.
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.L.3
Ligatti, J.4
-
3
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
Martín Abadi and Phillip Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
14844288825
-
Bypassing PaX ASLR protection
-
Anonymous
-
Anonymous. Bypassing PaX ASLR protection. Phrack, 11(59), 2002.
-
(2002)
Phrack
, vol.11
, Issue.59
-
-
-
6
-
-
16644362894
-
Randomized instruction set emulation
-
Elena Gabriela Barrantes, David H. Ackley, Stephanie Forrest, and Darko Stefanovíc. Randomized instruction set emulation. ACM Transactions on Information and System Security, 8(1):3-40, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovíc, D.4
-
8
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In 12th USENIX Security Symposium, 2003.
-
(2003)
12th USENIX Security Symposium
-
-
Bhatkar, S.1
Duvarney, D.C.2
Sekar, R.3
-
9
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
Sandeep Bhatkar, R. Sekar, and Daniel C. DuVarney. Efficient techniques for comprehensive protection from memory error exploits. In 14th USENIX Security Symposium, 2005.
-
(2005)
14th USENIX Security Symposium
-
-
Bhatkar, S.1
Sekar, R.2
Duvarney, D.C.3
-
12
-
-
38049035512
-
Low-level software security: Attacks and defenses
-
Alessandro Aldini and Roberto Gorrieri, editors, Springer, Volume 4677 of Lecture Notes in Computer Science
-
Ú lfar Erlingsson. Low-level software security: Attacks and defenses. In Alessandro Aldini and Roberto Gorrieri, editors, Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures, volume 4677 of Lecture Notes in Computer Science, pages 92-134. Springer, 2007.
-
(2007)
Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures
, pp. 92-134
-
-
Erlingsson, Ú.L.1
-
21
-
-
0026188821
-
Notions of computation and monads
-
Eugenio Moggi. Notions of computation and monads. Information and Computation, 93(1):55-92, 1991.
-
(1991)
Information and Computation
, vol.93
, Issue.1
, pp. 55-92
-
-
Moggi, E.1
-
22
-
-
0015561577
-
Protection in programming languages
-
James H. Morris, Jr. Protection in programming languages. Communications of the ACM, 16(1):15-21, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris Jr., J.H.1
-
23
-
-
0041525084
-
From System F to typed assembly language
-
Greg Morrisett, David Walker, Karl Crary, and Neal Glew. From System F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):527- 568, 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.21
, Issue.3
, pp. 527-568
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
24
-
-
59449083597
-
Exterminator: Automatically correcting memory errors with high probability
-
Gene Novark, Emery D. Berger, and Benjamin G. Zorn. Exterminator: Automatically correcting memory errors with high probability. Communications of the ACM, 51(12):87-95, 2008.
-
(2008)
Communications of the ACM
, vol.51
, Issue.12
, pp. 87-95
-
-
Novark, G.1
Berger, E.D.2
Zorn, B.G.3
-
25
-
-
77952162164
-
Samurai: Protecting critical data in unsafe languages
-
Karthik Pattabiraman, Vinod Grover, and Benjamin G. Zorn. Samurai: protecting critical data in unsafe languages. In EuroSys, pages 219-232, 2008.
-
(2008)
EuroSys
, pp. 219-232
-
-
Pattabiraman, K.1
Grover, V.2
Zorn, B.G.3
-
26
-
-
33745798878
-
-
PaX Project. The PaX project, 2004. http://pax.grsecurity.net/.
-
(2004)
The PaX Project
-
-
-
28
-
-
14844328033
-
On the effectiveness of address-space randomization
-
Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. On the effectiveness of address-space randomization. In 11th ACM Conference on Computer and Communications Security, pages 298-307, 2004.
-
(2004)
11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
30
-
-
84906818067
-
Where's the FEEB? The effectiveness of instruction set randomization
-
Anna Nora Sovarel, David Evans, and Nathanael Paul. Where's the FEEB? the effectiveness of instruction set randomization. In 14th USENIX Security Symposium, pages 145- 160, 2005.
-
(2005)
14th USENIX Security Symposium
, pp. 145-160
-
-
Sovarel, A.N.1
Evans, D.2
Paul, N.3
|