-
1
-
-
85077751615
-
-
Published on World-Wide Web at
-
Pax. Published on World-Wide Web at URL http://pageexec.virtualave.net, 2001.
-
(2001)
Pax
-
-
-
2
-
-
84860095094
-
Once upon a free⋯
-
Anonymous. August
-
Anonymous. Once upon a free⋯. Phrack, 11(57), August 2001.
-
(2001)
Phrack
, vol.11
, Issue.57
-
-
-
3
-
-
14844288825
-
Bypassing pax aslr protection
-
Anonymous. July
-
Anonymous. Bypassing pax aslr protection. Phrack, 11(59), July 2002.
-
(2002)
Phrack
, vol.11
, Issue.59
-
-
-
4
-
-
84955621400
-
Tamper-resistant software: An implementation
-
Ross Anderson, editor Cambridge, U.K., May 30-June 1 proceedings, Volume 1174 of Lecture Notes in Computer Science Berlin, Germany /Heidelberg, Germany /London, UK /etc., 1996. Springer-Verlag
-
D. Aucsmith. Tamper-resistant software: An implementation. In Ross Anderson, editor, Information hiding: first international workshop, Cambridge, U.K., May 30-June 1, 1996: proceedings, Volume 1174 of Lecture Notes in Computer Science, pages 317-333, Berlin, Germany /Heidelberg, Germany /London, UK /etc., 1996. Springer-Verlag.
-
(1996)
Information Hiding: First International Workshop
, pp. 317-333
-
-
Aucsmith, D.1
-
5
-
-
84976722683
-
Efficient detection of all pointer and array access errors
-
Orlando, Florida, 20-24 June 1994. SIGPLAN Notices June
-
Todd M. Austin, Scott E. Breach, and Gurindar S. Sohi. Efficient detection of all pointer and array access errors. In Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation (PLDI), pages 290-301, Orlando, Florida, 20-24 June 1994. SIGPLAN Notices 29(6), June 1994.
-
(1994)
Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation (PLDI)
, vol.29
, Issue.6
, pp. 290-301
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
6
-
-
85084160891
-
Transparent run-time defense against stack smashing attacks
-
Berkeley, CA, june
-
Arash Baratloo, Navjot Singh, and Timothy Tsai. Transparent run-time defense against stack smashing attacks. In Proceedings of the 2000 USENIX Annual Technical Conference (USENIX-00), pages 251-262, Berkeley, CA, june 2000.
-
(2000)
Proceedings of the 2000 USENIX Annual Technical Conference (USENIX-00)
, pp. 251-262
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
7
-
-
17644393012
-
Bypassing stackguard and stackshield
-
Bulba and Ki13r. May
-
Bulba and Ki13r. Bypassing stackguard and stackshield. Phrack, 11(56), May 2000.
-
(2000)
Phrack
, vol.11
, Issue.56
-
-
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, jan
-
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, jan 1998.
-
(1998)
Proc. 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
13
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, D.C August
-
Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. Pointguard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, Washington, D.C., August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
14
-
-
84890090975
-
Cleanness checking of string manipulations in C programs via integer analysis
-
Springer Verlag, June
-
Nurit Dor, Michael Rodeh, and Mooly Sagiv. Cleanness checking of string manipulations in C programs via integer analysis. In Static Analysis Symposium, Volume 2126 of Lecture Notes in Computer Science, pages 194-? Springer Verlag, June 2001.
-
(2001)
Static Analysis Symposium, Volume 2126 of Lecture Notes in Computer Science
, pp. 194
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
16
-
-
14944385012
-
-
Published on World-Wide Web at URL June
-
Hiroaki Etoh and Kunikazu Yoda. Protecting from stack-smashing attacks. Published on World-Wide Web at URL http://www.trl.ibm.com/projects/security/ssp/main.html, June 2000.
-
(2000)
Protecting from Stack-smashing Attacks
-
-
Etoh, H.1
Yoda, K.2
-
17
-
-
0030697765
-
Building diverse computer systems
-
Los Alamitos, CA IEEE Computer Society Press
-
Stephanie Forrest, Anil Somayaji, and David H. Ackley. Building diverse computer systems. In 6th Workshop on Hot Topics in Operating Systems, pages 67-72, Los Alamitos, CA, 1997. IEEE Computer Society Press.
-
(1997)
6th Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
18
-
-
17244369093
-
A theory of type qualifiers
-
Atlanta, GA, May
-
Jeffrey S. Foster, Manuel Fähndrich, and Alexander Aiken. A theory of type qualifiers. In ACM SIGPLAN Conference on Programming Language and Design, Atlanta, GA, May 1999.
-
(1999)
ACM SIGPLAN Conference on Programming Language and Design
-
-
Foster, J.S.1
Fähndrich, M.2
Aiken, A.3
-
19
-
-
0000596666
-
Purify: A tool for detecting memory leaks and access errors in C and C++ programs
-
USENIX Association, editor Berkeley, CA, USA, January USENIX
-
Reed Hastings and Bob Joyce. Purify: A tool for detecting memory leaks and access errors in C and C++ programs. In USENIX Association, editor, Proceedings of the Winter 1992 USENIX Conference, pages 125-138, Berkeley, CA, USA, January 1992. USENIX.
-
(1992)
Proceedings of the Winter 1992 USENIX Conference
, pp. 125-138
-
-
Hastings, R.1
Joyce, B.2
-
20
-
-
84859476272
-
Big loop integer protection
-
December
-
Oded Horovitz. Big loop integer protection. Phrack, 11(60), December 2002.
-
(2002)
Phrack
, vol.11
, Issue.60
-
-
Horovitz, O.1
-
21
-
-
85084164164
-
Cyclone: A safe dialect of C
-
Monterey, CA, June
-
Trevor Jim, Greg Morrisett, Dan Grossman, Micheal Hicks, James Cheney, and Yanling Wang. Cyclone: a safe dialect of C. In USENIX Annual Technical Conference, Monterey, CA, June 2002.
-
(2002)
USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
22
-
-
12544250338
-
Backwards-compatible bounds checking for arrays and pointers in C programs
-
M. Kamkar and D. Byers, editors Linkoping University Electronic Press
-
Robert W. M. Jones and Paul H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In M. Kamkar and D. Byers, editors, Third International Workshop on Automated Debugging. Linkoping University Electronic Press, 1997.
-
(1997)
Third International Workshop on Automated Debugging
-
-
Jones, R.W.M.1
Kelly, P.H.J.2
-
23
-
-
14844307465
-
Vudo malloc tricks
-
August
-
Michel Kaempf. Vudo malloc tricks. Phrack, 11(57), August 2001.
-
(2001)
Phrack
, vol.11
, Issue.57
-
-
Kaempf, M.1
-
24
-
-
0005372144
-
Saber-C - An interpreter-based programming environment for the C language
-
USENIX Association, editor Berkeley, CA, USA, Summer USENIX
-
Stephen Kaufer, Russell Lopez, and Sesha Pratap. Saber-C - an interpreter-based programming environment for the C language. In USENIX Association, editor, Summer USENIX Conference Proceedings, pages 161-171, Berkeley, CA, USA, Summer 1988. USENIX.
-
(1988)
Summer USENIX Conference Proceedings
, pp. 161-171
-
-
Kaufer, S.1
Lopez, R.2
Pratap, S.3
-
25
-
-
17644371841
-
Bcc: Run-time checking for c programs
-
El. Cerrito, California, USA USENIX Association
-
Samuel C. Kendall. Bcc: run-time checking for c programs. In Proceedings of the USENIX Summer Conference, El. Cerrito, California, USA, 1983. USENIX Association.
-
(1983)
Proceedings of the USENIX Summer Conference
-
-
Kendall, S.C.1
-
27
-
-
84874953600
-
-
Mudge. Published on World-Wide Web at URL
-
Mudge. How to write buffer overflows. Published on World-Wide Web at URL http://www.insecure.org/stf/mudge-buffer-overflow-tutorial.html, 1997.
-
(1997)
How to Write Buffer Overflows
-
-
-
28
-
-
0036040304
-
CCured: Type-safe retrofitting of legacy code
-
Portland, OR, January
-
George C. Necula, Scott McPeak, and Westley Weimer. CCured: type-safe retrofitting of legacy code. In Symposium on Principles of Programming Languages (POPL '02), pages 128-139, Portland, OR, January 2002.
-
(2002)
Symposium on Principles of Programming Languages (POPL '02)
, pp. 128-139
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
29
-
-
3042642332
-
The advanced return-into-lib(c) exploits
-
Dec
-
Nergal. The advanced return-into-lib(c) exploits. Phrack, 11(58), Dec 2001.
-
(2001)
Phrack
, vol.11
, Issue.58
-
-
Nergal1
-
31
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. November
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), November 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
-
33
-
-
12344323612
-
-
Scut. Published on World-Wide Web March
-
Scut. Exploting format string vulnerabilities. Published on World-Wide Web at URL http://www.team-teso.net/articles/formatstring, March 2001.
-
(2001)
Exploting Format String Vulnerabilities
-
-
-
34
-
-
85077739253
-
-
April Published on World-Wide Web
-
Snort(tm) advisory: Integer overflow in stream4. April 2003. Published on World-Wide Web at URL http://www.kb.cert.org/vuls/id/JPLA-5LPR9S.
-
(2003)
Snort(tm) Advisory: Integer Overflow in Stream4
-
-
-
36
-
-
0026845567
-
Adding run-time checking to the portable c compiler
-
April
-
Joseph L. Steffen. Adding run-time checking to the portable c compiler. Software-Practice and Experience, 22:305-316, April 1992.
-
(1992)
Software-Practice and Experience
, vol.22
, pp. 305-316
-
-
Steffen, J.L.1
-
37
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA
-
David Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, San Diego, CA, 2000.
-
(2000)
Network and Distributed System Security Symposium
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
38
-
-
0035789216
-
Protection of software-based survivability mechanisms
-
Goteborg, Sweeden, July
-
Chenxi Wang, Jack Davidson, Jonathan Hill, and John Knight. Protection of software-based survivability mechanisms. In International Conference on Dependable Systems and Networks, Goteborg, Sweeden, July 2001.
-
(2001)
International Conference on Dependable Systems and Networks
-
-
Wang, C.1
Davidson, J.2
Hill, J.3
Knight, J.4
-
39
-
-
27644457078
-
Transparent runtime randomization for security
-
University of Illinois at Urbana-Champaign, May
-
Jun Xu, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. Transparent runtime randomization for security. Technical Report UILU-ENG-03-2207, Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, May 2003.
-
(2003)
Technical Report UILU-ENG-03-2207, Center for Reliable and High-Performance Computing
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
|