-
3
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
August
-
Bhatkar, S., Varney, D.D., Sekar, R.: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: Proc. of the 12th USENIX Security Symposium, pp. 105-120 (August 2003)
-
(2003)
Proc. of the 12th USENIX Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
Varney, D.D.2
Sekar, R.3
-
4
-
-
34547335786
-
TaintTrace: Efficient flow tracing with dynamic binary rewriting
-
Cheng, W., Zhao, Q., Yu, B., Hiroshige, S.: TaintTrace: Efficient flow tracing with dynamic binary rewriting. In: Proc. of the 11th Symposium on Computers and Communications (2006)
-
Proc. of the 11th Symposium on Computers and Communications (2006)
-
-
Cheng, W.1
Zhao, Q.2
Yu, B.3
Hiroshige, S.4
-
6
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: end-to-end containment of internet worms. In: Proc. of SOSP 2005 (2005)
-
Proc. of SOSP 2005 (2005)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
7
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
Cowan, C., Pu, C., Maier, D., Hintony, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: 7th USENIX Security Symposium (1998)
-
7th USENIX Security Symposium (1998)
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hintony, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
9
-
-
35348907867
-
Raksha: A flexible information flow architecture for software security
-
Dalton, M., Kannan, H., Kozyrakis, C.: Raksha: A flexible information flow architecture for software security. In: Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA 2007 (2007)
-
Proceedings of the 34th Annual International Symposium on Computer Architecture, ISCA 2007 (2007)
-
-
Dalton, M.1
Kannan, H.2
Kozyrakis, C.3
-
10
-
-
0017517624
-
Certification of programs for secure information flow
-
ACM
-
Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504-513 (1977)
-
(1977)
Commun
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
84903607772
-
Dynamic Spyware Analysis
-
Egele, M., Kruegel, C., Kirda, E., Yin, H., Song, D.: Dynamic Spyware Analysis. In: ATC 2007: 2007 USENIX Annual Technical Conference (2007)
-
ATC 2007: 2007 USENIX Annual Technical Conference (2007)
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
13
-
-
84857260025
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smart phones
-
Enck, W., Gilbert, P., Chun, B.-G., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smart phones. In: Proceedings of OSDI 2010, Vancouver, BC (October 2010)
-
Proceedings of OSDI 2010, Vancouver, BC (October 2010)
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.4
Jung, J.5
McDaniel, P.6
Sheth, A.7
-
14
-
-
84857354215
-
-
Technical Report UCB/EECS-2010-92, University of California
-
Ermolinskiy, A., Katti, S., Shenker, S., Fowler, L.L., McCauley, M.: Towards practical taint tracking. Technical Report UCB/EECS-2010-92, University of California (2010)
-
(2010)
Towards Practical Taint Tracking
-
-
Ermolinskiy, A.1
Katti, S.2
Shenker, S.3
Fowler, L.L.4
McCauley, M.5
-
15
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
Ho, A., Fetterman, M., Clark, C., Warfield, A., Hand, S.: Practical taint-based protection using demand emulation. In: Proc. ACM SIGOPS EUROSYS 2006 (2006)
-
Proc. ACM SIGOPS EUROSYS 2006 (2006)
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
16
-
-
27544444280
-
Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
-
Newsome, J., Song, D.: Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In: Proc. of NDSS (2005)
-
Proc. of NDSS (2005)
-
-
Newsome, J.1
Song, D.2
-
17
-
-
0006100649
-
Smashing the stack for fun and profit
-
One, A.: Smashing the stack for fun and profit. Phrack 7(49) (1996)
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
18
-
-
84857264621
-
-
PaX
-
PaX. Pax (2000), http://pax.grsecurity.net/
-
(2000)
Pax
-
-
-
22
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
Qin, F., Wang, C., Li, Z., Kim, H.-s., Zhou, Y., Wu, Y.: LIFT: A low-overhead practical information flow tracking system for detecting security attacks. In: Proc. of MICRO (2006)
-
Proc. of MICRO (2006)
-
-
Qin, F.1
Wang, C.2
Li, Z.3
Kim, H.-S.4
Zhou, Y.5
Wu, Y.6
-
23
-
-
84857354224
-
Efficient fine-grained instrumentation with applications to tain-tracking
-
Saxena, P., Sekar, R., Parunik, V.: Efficient fine-grained instrumentation with applications to tain-tracking. In: Proc. of ACM CGO 2008, Boston, MA (April 2008)
-
Proc. of ACM CGO 2008, Boston, MA (April 2008)
-
-
Saxena, P.1
Sekar, R.2
Parunik, V.3
-
24
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: Proceedings of the IEEE Symposium on Security and Privacy, SP 2010 (2010)
-
Proceedings of the IEEE Symposium on Security and Privacy, SP 2010 (2010)
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
26
-
-
48649093823
-
The Age of Data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack
-
Slowinska, A., Bos, H.: The Age of Data: Pinpointing guilty bytes in polymorphic buffer overflows on heap or stack. In: Proc. of ACSAC 2007 (2007)
-
Proc. of ACSAC 2007 (2007)
-
-
Slowinska, A.1
Bos, H.2
-
27
-
-
33745963754
-
Hdtrans: An open source, low-level dynamic instrumentation system
-
Sridhar, S., Shapiro, J.S., Northup, E.: Hdtrans: An open source, low-level dynamic instrumentation system. In: Proc. of VEE 2006 (2006)
-
Proc. of VEE 2006 (2006)
-
-
Sridhar, S.1
Shapiro, J.S.2
Northup, E.3
-
28
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
ACM, New York
-
Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: ASPLOS-XI. ACM, New York (2004)
-
(2004)
ASPLOS-XI
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
29
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Xu, W., Bhatkar, S., Sekar, R.: Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks. In: 15th USENIX Security Symposium (2006)
-
15th USENIX Security Symposium (2006)
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
30
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: CCS 2007 (2007)
-
(2007)
CCS 2007
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
|