-
1
-
-
85165857262
-
-
Cssbench: a css benchmark devised by nontroppo
-
Cssbench: a css benchmark devised by nontroppo, http://www.howtocreate. co.uk/csstest.html
-
-
-
-
2
-
-
85165855314
-
-
CUPS: a standards-based, open source printing system developed by Apple Inc.
-
CUPS: a standards-based, open source printing system developed by Apple Inc., http://www.cups.org/
-
-
-
-
3
-
-
85165865047
-
-
Cups' erroneous patch
-
Cups' erroneous patch, http://www.cups.org/str.php?L2974
-
-
-
-
4
-
-
85165836823
-
-
CUPS Vulnerability
-
CUPS Vulnerability, http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE- 2008-1722
-
-
-
-
5
-
-
85165847612
-
-
Cwe-680: Io2bo vulnerabilities
-
Cwe-680: Io2bo vulnerabilities, http://cwe.mitre.org/data/definitions/ 680.html
-
-
-
-
6
-
-
85165847434
-
-
Dillo: a lightweight browser
-
Dillo: a lightweight browser, http://www.dillo.org
-
-
-
-
7
-
-
85165848300
-
-
Discussion between programmers and gcc developers
-
Discussion between programmers and gcc developers, http://gcc.gnu.org/ bugzilla/show-bug.cgi?id=30475#p2
-
-
-
-
8
-
-
85165857228
-
-
Draft of the c99 standard with corrigenda tc1, tc2, and tc3 included
-
Draft of the c99 standard with corrigenda tc1, tc2, and tc3 included, http://www.open-std.org/jtc1/sc22/WG14/www/docs/n1256.pdf
-
-
-
-
9
-
-
85165858877
-
-
FAAD2: A MPEG-4 and MPEG-2 AAC Decoder
-
FAAD2: A MPEG-4 and MPEG-2 AAC Decoder, http://www.audiocoding.com/faad2. html
-
-
-
-
10
-
-
85165836159
-
-
GStreamer: a framework for streaming media applications
-
GStreamer: a framework for streaming media applications, http://gstreamer.freedesktop.org/
-
-
-
-
11
-
-
85165840429
-
-
Intel 64 and ia-32 architectures software developer's manuals
-
Intel 64 and ia-32 architectures software developer's manuals, http://www.intel.com/products/processor/manuals/
-
-
-
-
12
-
-
85165862099
-
-
libtiff: TIFF Library and Utilities
-
libtiff: TIFF Library and Utilities, http://www.libtiff.org/
-
-
-
-
13
-
-
85165859660
-
-
Ming: a library for generating Macromedia Flash files
-
Ming: a library for generating Macromedia Flash files, http://www.libming.org/
-
-
-
-
14
-
-
85165835179
-
-
Mp4point: a source for free mp4/mpeg-4 video movie clips
-
Mp4point: a source for free mp4/mpeg-4 video movie clips, http://www.mp4point.com/
-
-
-
-
15
-
-
85165854645
-
-
National vulnerability database
-
National vulnerability database, http://nvd.nist.gov/
-
-
-
-
16
-
-
85165847987
-
-
oCERT: Open Source Computer Emergency Response Team
-
oCERT: Open Source Computer Emergency Response Team, http://www.ocert. org/
-
-
-
-
17
-
-
85165854737
-
-
Pngsuite: The "official" test-suite for png applications like viewers, converters and editors
-
Pngsuite: The "official" test-suite for png applications like viewers, converters and editors, http://www.schaik.com/pngsuite/
-
-
-
-
18
-
-
85165843660
-
-
Python interpreter suffers from gcc's behavior
-
Python interpreter suffers from gcc's behavior, http://bugs.python.org/ issue1608
-
-
-
-
19
-
-
85165855525
-
-
Secunia: a Danish computer security service provider
-
Secunia: a Danish computer security service provider, http://secunia.com/
-
-
-
-
20
-
-
85165855442
-
-
Vupen: a company providing security intelligence
-
Vupen: a company providing security intelligence, http://www.vupen.com/ english/
-
-
-
-
21
-
-
3042739411
-
The rising threat of vulnerabilities due to integer errors
-
Ahmad, D.: The rising threat of vulnerabilities due to integer errors. IEEE Security and Privacy 1(4), 77-82 (2003)
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 77-82
-
-
Ahmad, D.1
-
22
-
-
0004072686
-
-
2nd edn. Addison-Wesley, Reading
-
Aho, A. V., Lam, M. S., Sethi, R., Ullman, J. D.: Compilers: Princiles, Techniques, and Tools, 2nd edn. Addison-Wesley, Reading (2006)
-
(2006)
Compilers: Princiles, Techniques, and Tools
-
-
Aho, A.V.1
Lam, M.S.2
Sethi, R.3
Ullman, J.D.4
-
23
-
-
79952020076
-
Rich: Automatically protecting against integer-based vulnerabilities
-
Brumley, D., Chiueh, T.c., Johnson, R., Lin, H., Song, D.: Rich: Automatically protecting against integer-based vulnerabilities. In: Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007) (2007)
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 2007)
-
-
Brumley, D.1
Chiueh, T.2
Johnson, R.3
Lin, H.4
Song, D.5
-
24
-
-
85076893888
-
Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs
-
San Diego, CA, USA
-
Cadar, C., Dunbar, D., Engler, D.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008), San Diego, CA, USA (2008)
-
(2008)
USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008)
-
-
Cadar, C.1
Dunbar, D.2
Engler, D.3
-
25
-
-
34547241782
-
Exe: Automatically generating inputs of death
-
Cadar, C., Ganesh, V., Pawlowski, P. M., Dill, D. L., Engler, D. R.: Exe: automatically generating inputs of death. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006 (2006)
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
26
-
-
78049406538
-
Using type qualifiers to analyze untrusted integers and detecting security flaws in c programs
-
Ceesay, E., Zhou, J., Gertz, M., Levitt, K., Bishop, M.: Using type qualifiers to analyze untrusted integers and detecting security flaws in c programs. Detection of Intrusions and Malware & Vulnerability Assessment (2006)
-
(2006)
Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Ceesay, E.1
Zhou, J.2
Gertz, M.3
Levitt, K.4
Bishop, M.5
-
27
-
-
1542359967
-
A data-driven finite state machine model for analyzing security vulnerabilities
-
Chen, S., Kalbarczyk, Z., Xu, J., Iyer, R. K.: A data-driven finite state machine model for analyzing security vulnerabilities. In: IEEE International Conference on Dependable Systems and Networks, pp. 605-614 (2003)
-
(2003)
IEEE International Conference on Dependable Systems and Networks
, pp. 605-614
-
-
Chen, S.1
Kalbarczyk, Z.2
Xu, J.3
Iyer, R.K.4
-
28
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Chen, S., Xu, J., Sezer, E. C., Gauriar, P., Iyer, R. K.: Non-control-data attacks are realistic threats. In: Proceedings of the 14th Conference on USENIX Security Symposium, p. 12 (2005)
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, pp. 12
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
29
-
-
33745670901
-
Archerr: Runtime environment driven program safety
-
Sophia Antipolis
-
Chinchani, R., Iyer, A., Jayaraman, B., Upadhyaya, S.: Archerr: Runtime environment driven program safety. In: 9th European Symposium on Research in Computer Security, Sophia Antipolis (2004)
-
(2004)
9th European Symposium on Research in Computer Security
-
-
Chinchani, R.1
Iyer, A.2
Jayaraman, B.3
Upadhyaya, S.4
-
30
-
-
63549093907
-
-
Cytron, R., Ferrante, J., Rosen, B. K., Wegman, M. N., Zadeck, F. K.: Efficiently computing static single assignment form and the control dependence graph (1991)
-
(1991)
Efficiently Computing Static Single Assignment Form and the Control Dependence Graph
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
31
-
-
17244369093
-
A theory of type qualifiers
-
ACM, New York
-
Foster, J. S., Fähndrich, M., Aiken, A.: A theory of type qualifiers. In: PLDI 1999: Proceedings of the ACM SIGPLAN 1999 Conference on Programming Language Design and Implementation, pp. 192-203. ACM, New York (1999)
-
(1999)
PLDI 1999: Proceedings of the ACM SIGPLAN 1999 Conference on Programming Language Design and Implementation
, pp. 192-203
-
-
Foster, J.S.1
Fähndrich, M.2
Aiken, A.3
-
32
-
-
0036036247
-
Flow-sensitive type qualifiers
-
Berlin, Germany
-
Foster, J. S., Terauchi, T., Aiken, A.: Flow-sensitive type qualifiers. In: PLDI 2002: Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, Berlin, Germany, pp. 1-12 (2002)
-
(2002)
PLDI 2002: Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation
, pp. 1-12
-
-
Foster, J.S.1
Terauchi, T.2
Aiken, A.3
-
33
-
-
31844450371
-
Dart: Directed automated random testing
-
Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. In: PLDI 2005: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 213-223 (2005)
-
(2005)
PLDI 2005: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation
, pp. 213-223
-
-
Godefroid, P.1
Klarlund, N.2
Sen, K.3
-
34
-
-
0242444280
-
-
Master's thesis, Computer Science Dept., University of Illinois at Urbana-Champaign, Urbana, IL, December
-
Lattner, C.: LLVM: An Infrastructure for Multi-Stage Optimization. Master's thesis, Computer Science Dept., University of Illinois at Urbana-Champaign, Urbana, IL (December 2002), http://llvm.cs.uiuc.edu
-
(2002)
LLVM: An Infrastructure for Multi-Stage Optimization
-
-
Lattner, C.1
-
37
-
-
32344447459
-
Cute: A concolic unit testing engine for c
-
Sen, K., Marinov, D., Agha, G.: Cute: a concolic unit testing engine for c. In: ESEC/FSE-13: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 263-272 (2005)
-
(2005)
ESEC/FSE-13: Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering
, pp. 263-272
-
-
Sen, K.1
Marinov, D.2
Agha, G.3
-
39
-
-
81355161883
-
IntScope: Automatically detecting integer overflow vulnerability in X86 binary using symbolic execution
-
San Diego, CA February
-
Wang, T., Wei, T., Lin, Z., Zou, W.: IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium, San Diego, CA (February 2009)
-
(2009)
Proceedings of the 16th Annual Network and Distributed System Security Symposium
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
|