-
4
-
-
21644433634
-
Xen and the art of virtualization
-
New York, NY, USA
-
BARHAM, P., DRAGOVIC, B., FRASER, K., HAND, S., HARRIS, T., HO, A., NEUGEBAUER, R., PRATT, I., AND WARFIELD, A. Xen and the art of virtualization. In SOSP '03 (New York, NY, USA, 2003), pp. 164-177.
-
(2003)
SOSP '03
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
59249084730
-
Paranoid penguin: An introduction to novell apparmor
-
2006
-
BAUER, M. Paranoid penguin: an introduction to novell apparmor. Linux J 2006, 148(2006), 13.
-
(2006)
Linux J
, vol.148
, pp. 13
-
-
Bauer, M.1
-
6
-
-
85063636742
-
A fast and portable dynamic translator
-
Berkeley, CA, USA
-
BELLARD, F. QEMU, a fast and portable dynamic translator. In ATEC 05 (Berkeley, CA, USA, 2005), pp. 41-41.
-
(2005)
ATEC 05
, pp. 41-41
-
-
Qemu, B.F.1
-
7
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory er ror exploits
-
BHATKAR, E., DUVARNEY, D. C, AND SEKAR, R. Address obfuscation: an efficient approach to combat a broad range of memory er ror exploits. In Proceedings of the 12th USENIX Security Symposium (2003), pp. 105-120.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, E.1
Duvarney, D.C.2
Sekar, R.3
-
8
-
-
84954188728
-
Efficient techniques for comprehensive protection from memory error exploits
-
BHATKAR, S., BHATKAR, E., SEKAR, R., AND DUVARNEY, D. C. Efficient techniques for comprehensive protection from memory error exploits. In Proceedings of the 14th USENIX Security Symposium (2005).
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Bhatkar, S.1
Bhatkar, E.2
Sekar, R.3
Duvarney, D.C.4
-
10
-
-
84943422723
-
An infrastructure for adaptive dynamic optimization
-
Washington, DC, USA
-
BRUENING, D., GARNETT, T., AND AMARASINGHE, S. An infrastructure for adaptive dynamic optimization. In CGO '03 (Washington, DC, USA, 2003), pp. 265-275.
-
(2003)
CGO '03
, pp. 265-275
-
-
Bruening, D.1
Garnett, T.2
Amarasinghe, S.3
-
12
-
-
85084161775
-
Formatguard: Automatic protection from printf format string vulnerabilities
-
COWAN, C., BARRINGER, M., BEATTIE, S., KROAH-HARTMAN, G., FRANTZEN, M., AND LOKIER, J. Formatguard: automatic protection from printf format string vulnerabilities. In SSYM'01: Proceedings of the 10th conference on USENLX Security Symposium (2001).
-
(2001)
SSYM'01: Proceedings of the 10th Conference on USENLX Security Symposium
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
13
-
-
10044275460
-
Subdomain: Parsimonious server security
-
COWAN, C., BEATTIE, S., KROAH-HARTMAN, G., PU, C., WAGLE, P., AND GLIGOR, V. Subdomain: Parsimonious server security. In LISA '00: Proceedings of the 14th USENIX conference on System administration (2000).
-
(2000)
LISA '00: Proceedings of the 14th USENIX Conference on System Administration
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
14
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of bufferoverflow attacks
-
COWAN, C., PU, C., MAIER, D., HINTONY, H., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. Stackguard: automatic adaptive detection and prevention of bufferoverflow attacks. In SSYM'98: Proceedings of the 7th conference on USENIX Security Symposium (1998).
-
(1998)
SSYM'98: Proceedings of the 7th Conference on USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
16
-
-
59249101595
-
Switchblade: Enforcing dynamic personalized system call models
-
New York, NY, USA, ACM
-
FETZER, C., AND SUESSKRAUT, M. Switchblade: enforcing dynamic personalized system call models. In Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008 (New York, NY, USA, 2008), ACM, pp. 273-286.
-
(2008)
Eurosys '08: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
, pp. 273-286
-
-
Fetzer, C.1
Suesskraut, M.2
-
17
-
-
84858758065
-
Vx32: Lightweight user-level sandboxing on the x86
-
Berkeley, CA, USA, USENIX Association
-
FORD, B., AND COX, R. Vx32: lightweight user-level sandboxing on the x86. In ATC'08: USENIX 2008 Annual Technical Conference on Annual Technical Conference (Berkeley, CA, USA, 2008), USENIX Association, pp. 293-306.
-
(2008)
ATC'08: USENIX 2008 Annual Technical Conference on Annual Technical Conference
, pp. 293-306
-
-
Ford, B.1
Cox, R.2
-
18
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
GARFINKEL, T. Traps and pitfalls: Practical problems in system call interposition based security tools. In In Proc. Network and Distributed Systems Security Symposium (2003), pp. 163-176.
-
(2003)
Proc. Network and Distributed Systems Security Symposium
, pp. 163-176
-
-
Garfinkel, T.1
-
22
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the 6th Usenix Security Symposium (1996).
-
(1996)
Proceedings of the 6th Usenix Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
23
-
-
84994781115
-
Managing bounded code caches in dynamic binary optimization systems
-
HAZELWOOD, K., AND SMITH, M. D. Managing bounded code caches in dynamic binary optimization systems. TACO '063,3 (2006), 263-294.
-
(2006)
TACO '063
, vol.3
, pp. 263-294
-
-
Hazelwood, K.1
Smith, M.D.2
-
24
-
-
14844332687
-
Propolice: Improved stacksmashing attack detection
-
(2001-07-25)
-
HIROAKl, E., AND KUNIKAZU, Y. propolice : Improved stacksmashing attack detection. IPSJ SIG Notes 2001, 75 (2001-07-25), 181-188.
-
(2001)
IPSJ SIG Notes
, vol.75
, pp. 181-188
-
-
Hiroaki, E.1
Kunikazu, Y.2
-
25
-
-
79953187526
-
-
Ho, A., FETTERMAN, M., CLARK, C., WARFIELD, A., AND HAND, S. Practical taint-based protection using demand emulation, vol.40, pp. 29-41.
-
Practical Taint-based Protection Using Demand Emulation
, vol.40
, pp. 29-41
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
26
-
-
85084162336
-
Secure execution via program shepherding
-
Berkeley, CA, USA, USENIX Association
-
KIRIANSKY, V., BRUENING, D., AND AMARASINGHE, S. P. Secure execution via program shepherding. In Proceedings of the 11th USENIX Security Symposium (Berkeley, CA, USA, 2002), USENIX Association, pp. 191-206.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 191-206
-
-
Kiriansky, V.1
Bruening, D.2
Amarasinghe, S.P.3
-
27
-
-
60349104471
-
Alcatraz: An isolated environment for experimenting with untrusted software
-
LIANG, Z., SUN, W., VENKATAKRISHNAN, V. N., AND SEKAR, R. Alcatraz: An isolated environment for experimenting with untrusted software. ACM Trans. Inf. Syst. Secur. 12, 3 (2009), 1-37.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
, pp. 1-37
-
-
Liang, Z.1
Sun, W.2
Venkatakrishnan, V.N.3
Sekar, R.4
-
28
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
New York, NY, USA
-
LUK, C.-K., COHN, R., MUTH, R., PATIL, H., KLAUSER, A., LOWNEY, G., WALLACE, S., REDDI, V. J., AND HAZELWOOD, K. Pin: building customized program analysis tools with dynamic instrumentation. In PLDI '05 (New York, NY, USA, 2005), pp. 190-200.
-
(2005)
PLDI '05
, pp. 190-200
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
29
-
-
85072935637
-
Evaluating SFI for a CISC architecture
-
Vancouver, BC, Canada, August 2-4
-
MCCAMANT, S., AND MORRISETT, G. Evaluating SFI for a CISC architecture. In 15th USENIX Security Symposium (Vancouver, BC, Canada, August 2-4, 2006), pp. 209-224.
-
(2006)
15th USENIX Security Symposium
, pp. 209-224
-
-
Mccamant, S.1
Morrisett, G.2
-
30
-
-
79953201464
-
-
PAX-TEAM. PaX ASLR (Address Space Layout Randomization)
-
PAX-TEAM. PaX ASLR (Address Space Layout Randomization). http://pax.grsecurity.net/docs/aslr.txt.
-
-
-
-
32
-
-
79953201823
-
Generating low-overhead dynamic binary translators
-
PAYER, M., AND GROSS, T. R. Generating low-overhead dynamic binary translators. In SYSTOR'10 (2010).
-
(2010)
SYSTOR'10
-
-
Payer, M.1
Gross, T.R.2
-
33
-
-
84878346861
-
Improving host security with system call policies
-
Berkeley, CA, USA, USENIX Association
-
PROVOS, N. Improving host security with system call policies. In SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium (Berkeley, CA, USA, 2003), USENIX Association, pp. 18-18.
-
(2003)
SSYM'03: Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 18-18
-
-
Provos, N.1
-
34
-
-
67650092861
-
Strata: A software dynamic translation infrastructure
-
Charlottesville, VA, USA
-
SCOTT, K., AND DAVIDSON, J. Strata: A software dynamic translation infrastructure. Tech. rep., Charlottesville, VA, USA, 2001.
-
(2001)
Tech. Rep.
-
-
Scott, K.1
Davidson, J.2
-
36
-
-
14844328033
-
On the effectiveness of address-space randomization
-
SHACHAM, H., PAGE, M., PFAFF, B., GOH, E.-J., MODADUGU, N., AND BONEH, D. On the effectiveness of address-space randomization. In CCS'04 (2004), pp. 298-307.
-
(2004)
CCS'04
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
37
-
-
77955005250
-
HDTrans: A low-overhead dynamic translator
-
SRIDHAR, S., SHAPIRO, J. S., AND BUNGALE, P. P. HDTrans: a low-overhead dynamic translator. SIGARCH Comput. Archil News 35, 1 (2007), 135-140.
-
(2007)
SIGARCH Comput. Archil News
, vol.35
, Issue.1
, pp. 135-140
-
-
Sridhar, S.1
Shapiro, J.S.2
Bungale, P.P.3
-
38
-
-
33745963754
-
HDTrans: An open source, low-level dynamic instrumentation system
-
New York, NY, USA
-
SRIDHAR, S., SHAPIRO, J. S., NORTHUP, E., AND BUNGALE, P. P. HDTrans: an open source, low-level dynamic instrumentation system. In VEE '06 (New York, NY, USA, 2006), pp. 175-185.
-
(2006)
VEE '06
, pp. 175-185
-
-
Sridhar, S.1
Shapiro, J.S.2
Northup, E.3
Bungale, P.P.4
-
39
-
-
0027836576
-
Efficient software-based fault isolation
-
New York, NY, USA, ACM
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. Efficient software-based fault isolation. In SOSP'93 (New York, NY, USA, 1993), ACM, pp. 203-216.
-
(1993)
SOSP'93
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
41
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
WRIGHT, C., COWAN, C., SMALLEY, S., MORRIS, J., AND KROAHHARTMAN, G. Linux security modules: General security support for the linux kernel. In Proceedings of the 11th USENIX Security Symposium (2002).
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroahhartman, G.5
-
42
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, J. B., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native client: A sandbox for portable, untrusted x86 native code. IEEE Symposium on Security and Privacy (2009), 79-93.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|