-
2
-
-
36048979278
-
-
Dec
-
"Pax Pageexec Documentation", http://pax.grsecurity.net/docs/ pageexec.txt, Dec. 2006.
-
(2006)
Pax Pageexec Documentation
-
-
-
5
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks", Proc. Seventh USENIX Security Conf., pp. 63-78, http://citeseer.ist.psu.edu/cowan98stackguard.html, 1998.
-
(1998)
Proc. Seventh USENIX Security Conf.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
8
-
-
34247546866
-
A comparison of publicly available tools for dynamic buffer overflow prevention
-
Feb
-
J. Wilander and M. Kamkar, "A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention", Proc. 10th Network and Distributed System Security Symp., pp. 149-162, citeseer.ist.psu.edu/ wilander03comparison.html, Feb. 2003.
-
(2003)
Proc. 10th Network and Distributed System Security Symp.
, pp. 149-162
-
-
Wilander, J.1
Kamkar, M.2
-
9
-
-
0005702886
-
First, draft of a report on the EDVAC
-
reprinted in, second ed., Springer
-
J. von Neumann, "First, Draft of a Report on the EDVAC", 1945, reprinted in, The Origins of Digital Computers Selected Papers, second ed., pp. 355-364, Springer, 1975.
-
(1945)
The Origins of Digital Computers Selected Papers
, pp. 355-364
-
-
Von Neumann, J.1
-
10
-
-
24344453452
-
Hardware-assisted circumvention of self-hashing software tamper resistance
-
Apr
-
P. C. van Oorschot, A. Somayaji, and G. Wurster, "Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance", IEEE Trans. Dependable and Secure Computing, vol. 2, no. 2, pp. 82-92, Apr. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 82-92
-
-
Van Oorschot, P.C.1
Somayaji, A.2
Wurster, G.3
-
11
-
-
33846321458
-
Proposed automatic calculating machine
-
reprinted in, second ed., Springer
-
H. H. Aiken, "Proposed Automatic Calculating Machine", 1937, reprinted in, The Origins of Digital Computers Selected Papers, second ed., pp. 191-198, Springer, 1975.
-
(1937)
The Origins of Digital Computers Selected Papers
, pp. 191-198
-
-
Aiken, H.H.1
-
12
-
-
78149467598
-
The automatic sequence controlled calculator
-
reprinted in, second ed., Springer
-
H. H. Aiken and G. M. Hopper, "The Automatic Sequence Controlled Calculator", 1946, reprinted in, The Origins of Digital Computers Selected Papers, second ed., pp. 199-218, Springer, 1975.
-
(1946)
The Origins of Digital Computers Selected Papers
, pp. 199-218
-
-
Aiken, H.H.1
Hopper, G.M.2
-
13
-
-
78149467214
-
-
Dec
-
"kernelthread.com:SecuringMemory", http://www.kernelthread.com/ publications/security/smemory.html, Dec. 2006.
-
(2006)
Kernelthread.com:SecuringMemory
-
-
-
14
-
-
77957355973
-
Bypassing windows hardware-enforced dep
-
Skape and Skywing, Sept
-
Skape and Skywing, "Bypassing Windows Hardware-Enforced dep", Uninformed, vol. 2, http://www.uninformed.org, Sept. 2005.
-
(2005)
Uninformed
, vol.2
-
-
-
15
-
-
78149471424
-
Hugetlb-large page support in the linux kernel
-
Oct
-
R. Krishnakumar, "Hugetlb-Large Page Support in the Linux Kernel", Linux Gazette, vol. 155, http://linuxgazette.net/155/krishnakumar. html, Oct. 2008.
-
(2008)
Linux Gazette
, vol.155
-
-
Krishnakumar, R.1
-
16
-
-
36049009995
-
-
Dec
-
"Pax aslr Documentation", http://pax.grsecurity.net/docs/aslr. txt, Dec. 2006.
-
(2006)
Pax Aslr Documentation
-
-
-
17
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. C. DuVarney, and R. Sekar, "Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits", Proc. 12th USENIX Security Symp., 2003.
-
(2003)
Proc. 12th USENIX Security Symp.
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
20
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovic, and D. D. Zovi, "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks", Proc. 10th ACM Conf. Computer and Comm. Security (CCS), 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS)
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovic, D.5
Zovi, D.D.6
-
22
-
-
84906497159
-
Building a reactive immune system for software services
-
S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis, "Building a Reactive Immune System for Software Services", Proc. USENIX Ann. Technical Conf., 2005.
-
(2005)
Proc. USENIX Ann. Technical Conf.
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
24
-
-
78149465626
-
-
Mar
-
"Wind River: Vxworks", http://www.windriver.com/vxworks/, Mar. 2007.
-
(2007)
Wind River: Vxworks
-
-
-
25
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
Aug
-
S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. Iyer, "Non-Control-Data Attacks Are Realistic Threats", Proc. USENIX Security Symp., Aug. 2005.
-
(2005)
Proc. USENIX Security Symp.
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.5
-
28
-
-
85094843538
-
Digsig: Run-time authentication of binaries at kernel level
-
A. Apvrille, D. Gordon, S. Hallyn, M. Pourzandi, and V. Roy, "Digsig: Run-Time Authentication of Binaries at Kernel Level", Proc. 18th USENIX Conf. System Administration (LISA'04), pp. 59-66, 2004.
-
(2004)
Proc. 18th USENIX Conf. System Administration (LISA'04)
, pp. 59-66
-
-
Apvrille, A.1
Gordon, D.2
Hallyn, S.3
Pourzandi, M.4
Roy, V.5
-
30
-
-
78149470918
-
-
"Sebek", http://www.honeynet.org/tools/sebek/, 2010.
-
(2010)
Sebek
-
-
-
32
-
-
34748920692
-
Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
-
G. Portokalidis, A. Slowinska, and H. Bos, "Argos: An Emulator for Fingerprinting Zero-Day Attacks for Advertised Honeypots with Automatic Signature Generation", Proc. ACM SIGOPS/European Conf. Computer Systems (EuroSys'06), pp. 15-27, 2006.
-
(2006)
Proc. ACM SIGOPS/European Conf. Computer Systems (EuroSys'06)
, pp. 15-27
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
34
-
-
84856191283
-
-
Dec
-
"Linux/Unix nbench", http://www.tux.org/mayer/linux/bmark.html, Dec. 2006.
-
(2006)
Linux/Unix Nbench
-
-
-
35
-
-
78149469180
-
-
Dec
-
"Unixbench", http://www.tux.org/pub/tux/benchmarks/System/ unixbench/, Dec. 2006.
-
(2006)
Unixbench
-
-
-
36
-
-
33846272389
-
Strengthening software self-checksumming via self-modifying code
-
Dec
-
J. Giffin, M. Christodorescu, and L. Kruger, "Strengthening Software Self-Checksumming via Self-Modifying Code", Proc. 21st IEEE Ann. Computer Security Applications Conf. (ACSAC'05), pp. 18-27, Dec. 2005.
-
(2005)
Proc. 21st IEEE Ann. Computer Security Applications Conf. (ACSAC'05)
, pp. 18-27
-
-
Giffin, J.1
Christodorescu, M.2
Kruger, L.3
-
37
-
-
36049009786
-
An architectural approach to preventing code injection attacks
-
R. Riley, X. Jiang, and D. Xu, "An Architectural Approach to Preventing Code Injection Attacks", Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN'07), pp. 30-40, 2007.
-
(2007)
Proc. 37th Ann. IEEE/IFIP Int'l Conf. Dependable Systems and Networks (DSN'07)
, pp. 30-40
-
-
Riley, R.1
Jiang, X.2
Xu, D.3
|