-
1
-
-
0022252695
-
The N-Version approach to fault-tolerant software
-
Dec.
-
A. Avizienis, "The N-Version Approach to Fault-Tolerant Software," IEEE Trans. Software Eng., vol. SE-11, no. 12, pp. 1491-1501, Dec. 1985.
-
(1985)
IEEE Trans. Software Eng.
, vol.SE-11
, Issue.12
, pp. 1491-1501
-
-
Avizienis, A.1
-
2
-
-
0017792448
-
On the implementation of N-Version programming for software fault tolerance during execution
-
A. Avizienis and L. Chen, "On the Implementation of N-Version Programming for Software Fault Tolerance during Execution," Proc. Int'l Computer Software and Applications Conf., pp. 149-155, 1977.
-
(1977)
Proc. Int'l Computer Software and Applications Conf.
, pp. 149-155
-
-
Avizienis, A.1
Chen, L.2
-
3
-
-
18744376889
-
Randomized instruction set emulation to disrupt binary code injection attacks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
E. Barrantes, D. Ackley, T. Palmer, D. Stefanovic, and D. Zovi, "Randomized Instruction Set Emulation to Disrupt Binary Code Injection Attacks," Proc. ACM Conf. Computer and Comm. Security, pp. 281-289, 2003. (Pubitemid 40673810)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 281-289
-
-
Barrantes, E.G.1
Palmer, T.S.2
Ackley, D.H.3
Stefanovic, D.4
Forrest, S.5
Zovi, D.D.6
-
5
-
-
0022318570
-
Replication and fault-tolerance in the ISIS System
-
K. Birman, "Replication and Fault-Tolerance in the ISIS System," ACM SIGOPS Operating Systems Rev., vol. 19, no. 5, pp. 79-86, 1985.
-
(1985)
ACM SIGOPS Operating Systems Rev.
, vol.19
, Issue.5
, pp. 79-86
-
-
Birman, K.1
-
6
-
-
54649083881
-
The voltan application programming environment for fail-silent processes
-
D. Black, C. Low, and S.K. Shrivastava, "The Voltan Application Programming Environment for Fail-Silent Processes," Distributed Systems Eng., vol. 5, pp. 66-77, 1998.
-
(1998)
Distributed Systems Eng.
, vol.5
, pp. 66-77
-
-
Black, D.1
Low, C.2
Shrivastava, S.K.3
-
7
-
-
0030086704
-
Hypervisor-Based fault tolerance
-
T.C. Bressoud and F.B. Schneider, "Hypervisor-Based Fault Tolerance," ACM Trans. Computer Systems, vol. 14, no. 1, pp. 80- 107, 1996.
-
(1996)
ACM Trans. Computer Systems
, vol.14
, Issue.1
, pp. 80-107
-
-
Bressoud, T.C.1
Schneider, F.B.2
-
8
-
-
36348949033
-
Diversified process replic for defeating memory error exploits
-
DOI 10.1109/PCCC.2007.358924, 4197960, 27th IEEE International Performance Computing and Communications Conference, IPCCC 07
-
D. Bruschi, L. Cavallaro, and A. Lanzi, "Diversified Process Replicae for Defeating Memory Error Exploits," Proc. Int'l Workshop Information Assurance, pp. 434-441, 2007. (Pubitemid 350139327)
-
(2007)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 434-441
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
-
9
-
-
85027138133
-
Active replication in delta-4
-
M. Chereque, D. Powell, P. Reynier, J. Richier, and J. Voiron, "Active Replication in Delta-4," Proc. Int'l Symp. Fault-Tolerant Computing, pp. 28-37, 1992.
-
(1992)
Proc. Int'l Symp. Fault-Tolerant Computing
, pp. 28-37
-
-
Chereque, M.1
Powell, D.2
Reynier, P.3
Richier, J.4
Voiron, J.5
-
10
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Dept. of Computer Science, Carnegie Mellon Univ.
-
M. Chew and D. Song, "Mitigating Buffer Overflows by Operating System Randomization," Technical Report CMU-CS-02-197, Dept. of Computer Science, Carnegie Mellon Univ., 2002.
-
(2002)
Technical Report CMU-CS- 02-197
-
-
Chew, M.1
Song, D.2
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. USENIX Security Symp., pp. 63-78, 1998.
-
(1998)
Proc. USENIX Security Symp.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
12
-
-
84886393009
-
N-Variant systems: A secretless framework for security through diversity
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser, "N-Variant Systems: A Secretless Framework for Security through Diversity," Proc. USENIX Security Symp., pp. 105-120, 2006.
-
(2006)
Proc. USENIX Security Symp.
, pp. 105-120
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
14
-
-
0006100649
-
Smashing the stack for fun and profit
-
("Aleph One")
-
E. Levy ("Aleph One"), "Smashing the Stack for Fun and Profit," Phrack, vol. 7, no. 49, 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
Levy, E.1
-
16
-
-
0000596666
-
Purify: Fast detection of memory leaks and access errors
-
R. Hastings and B. Joyce, "Purify: Fast Detection of Memory Leaks and Access Errors," Proc. Winter USENIX Conf., vol. 136, 1992.
-
(1992)
Proc. Winter USENIX Conf.
, vol.136
-
-
Hastings, R.1
Joyce, B.2
-
17
-
-
0043199887
-
Characteristics of I/O traffic in personal computer and server workloads
-
W. Hsu and A. Smith, "Characteristics of I/O Traffic in Personal Computer and Server Workloads," IBM Systems J., vol. 42, pp. 347- 372, 2003.
-
(2003)
IBM Systems J.
, vol.42
, pp. 347-372
-
-
Hsu, W.1
Smith, A.2
-
18
-
-
79957601858
-
-
Intel, Intel Developer Forum
-
Intel, "Paul Otellini Keynote," Intel Developer Forum, 2006.
-
(2006)
Paul Otellini Keynote
-
-
-
19
-
-
78649429703
-
On the effectiveness of multi-variant program execution for vulnerability detection and prevention
-
T. Jackson, B. Salamat, G. Wagner, C. Wimmer, and M. Franz, "On the Effectiveness of Multi-Variant Program Execution for Vulnerability Detection and Prevention," Proc. Int'l Workshop Security Measurements and Metrics (MetriSec), 2010.
-
(2010)
Proc. Int'l Workshop Security Measurements and Metrics (MetriSec)
-
-
Jackson, T.1
Salamat, B.2
Wagner, G.3
Wimmer, C.4
Franz, M.5
-
20
-
-
85077706009
-
Oslo: Improving the security of trusted computing
-
B. Kauer, "Oslo: Improving the Security of Trusted Computing," Proc. USENIX Security Symp., pp. 229-237, 2007.
-
(2007)
Proc. USENIX Security Symp.
, pp. 229-237
-
-
Kauer, B.1
-
21
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
G. Kc, A. Keromytis, and V. Prevelakis, "Countering Code- Injection Attacks with Instruction-Set Randomization," Proc. ACM Conf. Computer and Comm. Security, pp. 272-280, 2003. (Pubitemid 40673809)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
22
-
-
0022581573
-
An experimental evaluation of the assumption of independence in multiversion programming
-
J. Knight and N. Leveson, "An Experimental Evaluation of the Assumption of Independence in Multiversion Programming," IEEE Trans. Software Eng., vol. SE-12, no. 1, pp. 96-109, Jan. 1986. (Pubitemid 16575808)
-
(1986)
IEEE Transactions on Software Engineering
, vol.SE-12
, Issue.1
, pp. 96-109
-
-
Knight John, C.1
Leveson Nancy, G.2
-
23
-
-
51549109037
-
A combination hardware-software debugging system
-
Jan.
-
K. Knowlton, "A Combination Hardware-Software Debugging System," IEEE Trans. Computers, vol. 17, no. 1, pp. 84-86, Jan. 1968.
-
(1968)
IEEE Trans. Computers
, vol.17
, Issue.1
, pp. 84-86
-
-
Knowlton, K.1
-
24
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
C. Ko, G. Fink, and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," Proc. Ann. Computer Security Applications Conf., pp. 134-144, 1994.
-
(1994)
Proc. Ann. Computer Security Applications Conf.
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
26
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
J. McCune, B. Parno, A. Perrig, M. Reiter, and H. Isozaki, "Flicker: An Execution Infrastructure for TCB Minimization," Proc. European Conf. Computer Systems, pp. 315-328, 2008.
-
(2008)
Proc. European Conf. Computer Systems
, pp. 315-328
-
-
McCune, J.1
Parno, B.2
Perrig, A.3
Reiter, M.4
Isozaki, H.5
-
28
-
-
77952329878
-
Improving xen security through disaggregation
-
D. Murray, G. Milos, and S. Hand, "Improving Xen Security through Disaggregation," Proc. Conf. Virtual Execution Environments, pp. 151-160, 2008.
-
(2008)
Proc. Conf. Virtual Execution Environments
, pp. 151-160
-
-
Murray, D.1
Milos, G.2
Hand, S.3
-
29
-
-
0033319231
-
Enforcing determinism for the consistent replication of multithreaded CORBA applications
-
P. Narasimhan, L.E. Moser, and P.M. Melliar-Smith, "Enforcing Determinism for the Consistent Replication of Multithreaded Corba Applications," SRDS '99: Proc. 18th IEEE Symp. Reliable Distributed Systems, pp. 263-273, 1999. (Pubitemid 30520730)
-
(1999)
Proceedings of the IEEE Symposium on Reliable Distributed Systems
, pp. 263-273
-
-
Narasimhan, P.1
Moser, L.E.2
Melliar-Smith, P.M.3
-
30
-
-
79957618600
-
-
Nat'l Inst. of Standards and Technologies
-
Nat'l Inst. of Standards and Technologies, Nat'l Vulnerability Database, http://nvd.nist.gov, 2009.
-
(2009)
Nat'l Vulnerability Database
-
-
-
31
-
-
16244366310
-
Valgrind: A program supervision framework
-
N. Nethercote and J. Seward, "Valgrind: A Program Supervision Framework," Electronic Notes in Theoretical Computer Science, vol. 89, no. 2, pp. 44-66, 2003.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.89
, Issue.2
, pp. 44-66
-
-
Nethercote, N.1
Seward, J.2
-
32
-
-
60749118885
-
A practical mimicry attack against powerful system-call monitors
-
C. Parampalli, R. Sekar, and R. Johnson, "A Practical Mimicry Attack against Powerful System-Call Monitors," Proc. ACM Symp. Information, Computer, and Comm. Security, pp. 156-167, 2008.
-
(2008)
Proc. ACM Symp. Information, Computer, and Comm. Security
, pp. 156-167
-
-
Parampalli, C.1
Sekar, R.2
Johnson, R.3
-
34
-
-
0036931592
-
The design and implementation of an intrusion tolerant system
-
J.C. Reynolds, J.E. Just, E. Lawso, L.A. Clough, R. Maglich, and K.N. Levitt, "The Design and Implementation of an Intrusion Tolerant System," Proc. Int'l Conf. Dependable Systems and Networks, pp. 285-290, 2002.
-
(2002)
Proc. Int'l Conf. Dependable Systems and Networks
, pp. 285-290
-
-
Reynolds, J.C.1
Just, J.E.2
Lawso, E.3
Clough, L.A.4
Maglich, R.5
Levitt, K.N.6
-
35
-
-
0036036816
-
BASE: Using abstraction to improve fault tolerance
-
DOI 10.1145/502059.502037
-
R. Rodrigues, M. Castro, and B. Liskov, "BASE: Using Abstraction to Improve Fault Tolerance," ACM SIGOPS Operating Systems Rev., vol. 35, no. 5, pp. 15-28, 2001. (Pubitemid 33612602)
-
(2001)
Operating Systems Review (ACM)
, vol.35
, Issue.5
, pp. 15-28
-
-
Rodrigues, R.1
Castro, M.2
Liskov, B.3
-
37
-
-
53149125681
-
Multi-Variant program execution: Using multi-core systems to defuse buffer-overflow vulnerabilities
-
Mar.
-
B. Salamat, A. Gal, T. Jackson, K. Manivannan, G. Wagner, and M. Franz, "Multi-Variant Program Execution: Using Multi-Core Systems to Defuse Buffer-Overflow Vulnerabilities," Proc. Int'l Conf. Complex, Intelligent, and Software Intensive Systems, pp. 843- 848, Mar. 2008.
-
(2008)
Proc. Int'l Conf. Complex, Intelligent, and Software Intensive Systems
, pp. 843-848
-
-
Salamat, B.1
Gal, A.2
Jackson, T.3
Manivannan, K.4
Wagner, G.5
Franz, M.6
-
38
-
-
70349127596
-
Orchestra: Intrusion detection using parallel execution and monitoring of program variants in user-space
-
B. Salamat, T. Jackson, A. Gal, and M. Franz, "Orchestra: Intrusion Detection Using Parallel Execution and Monitoring of Program Variants in User-Space," Proc. European Conf. Computer Systems, pp. 33-46, 2009.
-
(2009)
Proc. European Conf. Computer Systems
, pp. 33-46
-
-
Salamat, B.1
Jackson, T.2
Gal, A.3
Franz, M.4
-
39
-
-
79957622288
-
-
technical report, School of Information and Computer Sciences, Univ. of California
-
B. Salamat, C. Wimmer, and M. Franz, "Synchronous Signal Delivery in a Multi-Variant Intrusion Detection System," technical report, School of Information and Computer Sciences, Univ. of California, 2009.
-
(2009)
Synchronous Signal Delivery in A Multi-Variant Intrusion Detection System
-
-
Salamat, B.1
Wimmer, C.2
Franz, M.3
-
40
-
-
0026868479
-
Principal features of the voltan family of reliable node architectures for distributed systems
-
May
-
S. Shrivastava, P. Ezhilchelvan, N. Speirs, S. Tao, and A. Tully, "Principal Features of the Voltan Family of Reliable Node Architectures for Distributed Systems," IEEE Trans. Computers, vol. 41, no. 5, pp. 542-549, May 1992.
-
(1992)
IEEE Trans. Computers
, vol.41
, Issue.5
, pp. 542-549
-
-
Shrivastava, S.1
Ezhilchelvan, P.2
Speirs, N.3
Tao, S.4
Tully, A.5
-
43
-
-
41149146993
-
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling
-
DOI 10.1145/1294261.1294268, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
B. Vandiver, H. Balakrishnan, B. Liskov, and S. Madden, "Tolerating Byzantine Faults in Transaction Processing Systems Using Commit Barrier Scheduling," Proc. Symp. Operating Systems Principles, pp. 59-72, 2007. (Pubitemid 351429369)
-
(2007)
Operating Systems Review (ACM)
, pp. 59-72
-
-
Vandiver, B.1
Balakrishnan, H.2
Liskov, B.3
Madden, S.4
-
44
-
-
27644457078
-
Transparent runtime randomization for security
-
Proceedings - 22nd International Symposium on Reliable Distributed Systems, SRDS 2003
-
J. Xu, Z. Kalbarczyk, and R.K. Iyer, "Transparent Runtime Randomization for Security," Proc. Symp. Reliable Distributed System, pp. 260-269, 2003. (Pubitemid 41550528)
-
(2003)
Proceedings of the IEEE Symposium on Reliable Distributed Systems
, pp. 260-269
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
-
45
-
-
84991934426
-
TightLip: Keeping applications from spilling the beans
-
A. Yumerefendi, B. Mickle, and L. Cox, "TightLip: Keeping Applications from Spilling the Beans," Proc. Symp. Networked Systems Design and Implementation, pp. 159-172, 2007.
-
(2007)
Proc. Symp. Networked Systems Design and Implementation
, pp. 159-172
-
-
Yumerefendi, A.1
Mickle, B.2
Cox, L.3
|