-
1
-
-
84855426722
-
-
CWE
-
CWE. http://cwe.mitre.org/.
-
-
-
-
7
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
CCS
-
H. Yin, D.X. Song, M. Egele, C. Kruegel, E. Kirda, Panorama: capturing system-wide information flow for malware detection and analysis, in: ACM Conference on Computer and Communications Security, CCS, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.X.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
9
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V.J. Reddi, K. Hazelwood, Pin: building customized program analysis tools with dynamic instrumentation, in: PLDI, 2005.
-
(2005)
PLDI
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
11
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
NDSS
-
J. Newsome, D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, in: Network and Distributed System Security Symposium, NDSS, 2005.
-
(2005)
Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
12
-
-
40349087553
-
Lift: A low overhead practical information flow tracking system for detecting security attacks
-
MICRO
-
F. Qin, C. Wang, Z. Li, H.-S. Kim, Y. Zhou, Y. Wu, Lift: a low overhead practical information flow tracking system for detecting security attacks, in: Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO, 2006, pp. 135148.
-
(2006)
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 135-148
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
13
-
-
81355161883
-
Intscope: Automatically detecting integer overflow vulnerability in x86 binary using symbolic execution
-
NDSS
-
T. Wang, T. Wei, Z. Lin, W. Zou, Intscope: automatically detecting integer overflow vulnerability in x86 binary using symbolic execution, in: Network and Distributed System Security Symposium, NDSS, 2009.
-
(2009)
Network and Distributed System Security Symposium
-
-
Wang, T.1
Wei, T.2
Lin, Z.3
Zou, W.4
-
14
-
-
70349870055
-
Rich: Automatically protecting against integer-based vulnerabilities
-
NDSS
-
D. Brumley, D.X. Song, T. cker Chiueh, R. Johnson, H. Lin, Rich: automatically protecting against integer-based vulnerabilities, in: Network and Distributed System Security Symposium, NDSS, 2007.
-
(2007)
Network and Distributed System Security Symposium
-
-
Brumley, D.1
Song, D.X.2
Cker Chiueh, T.3
Johnson, R.4
Lin, H.5
-
15
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, D. Evans, Automatically hardening web applications using precise tainting, in: 20th IFIP International Information Security Conference, 2005.
-
(2005)
20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
17
-
-
40449102639
-
Combining static and dynamic reasoning for bug detection
-
Y. Smaragdakis, C. Csallner, Combining static and dynamic reasoning for bug detection, in: TAP, 2007.
-
(2007)
TAP
-
-
Smaragdakis, Y.1
Csallner, C.2
-
19
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, G. Vigna, Saner: composing static and dynamic analysis to validate sanitization in web applications, in: IEEE Symposium on Security and Privacy, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
20
-
-
67649859970
-
Efficient and extensible security enforcement using dynamic data flow analysis
-
CCS'08 ACM New York, NY, USA
-
W. Chang, B. Streiff, and C. Lin Efficient and extensible security enforcement using dynamic data flow analysis Proceedings of the 15th ACM Conference on Computer and Communications Security CCS'08 2008 ACM New York, NY, USA 39 50
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 39-50
-
-
Chang, W.1
Streiff, B.2
Lin, C.3
-
21
-
-
70450092967
-
Bouncer: Securing software by blocking bad input
-
DOI 10.1145/1294261.1294274, SOSP'07: Proceedings of the 21st ACM Symposium on Operating Systems Principles
-
M. Costa, M. Castro, L. Zhou, L. Zhang, and M. Peinado Bouncer: securing software by blocking bad input Proceedings of Twenty-First ACM SIGOPS Symposium on Operating Systems Principles SOSP'07 2007 ACM New York, NY, USA 117 130 (Pubitemid 351429372)
-
(2007)
Operating Systems Review (ACM)
, pp. 117-130
-
-
Costa, M.1
Castro, M.2
Zhou, L.3
Zhang, L.4
Peinado, M.5
-
22
-
-
58449129985
-
Bitblaze: A new approach to computer security via binary analysis
-
ICISS
-
D.X. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M.G. Kang, Z. Liang, J. Newsome, P. Poosankam, P. Saxena, Bitblaze: a new approach to computer security via binary analysis, in: International Conference on Information Systems Security, ICISS, 2008.
-
(2008)
International Conference on Information Systems Security
-
-
Song, D.X.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.G.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
23
-
-
84855428374
-
-
CVE
-
CVE. http://cve.mitre.org/.
-
-
-
|