-
1
-
-
84865291817
-
-
October
-
Cve-2010-3962. October 2010. http://cve.mitre.org/cgibin/cvename.cgi? name=CVE-2010-3962.
-
(2010)
Cve-2010-3962
-
-
-
6
-
-
33244470892
-
Improving Software Security with A C Pointer Analysis
-
May
-
D. Avots, M. Dalton, B. V. Livshits, and M. S. Lam. Improving Software Security With A C Pointer Analysis. ICSE, May 2005.
-
(2005)
ICSE
-
-
Avots, D.1
Dalton, M.2
Livshits, B.V.3
Lam, M.S.4
-
7
-
-
78650616819
-
Dangling Pointer - Smashing the Pointer for Fun and Profit
-
July
-
J. Afek and A. Sharabani. Dangling Pointer - Smashing The Pointer For Fun And Profit. BlackHat USA, July 2007.
-
(2007)
BlackHat USA
-
-
Afek, J.1
Sharabani, A.2
-
8
-
-
85076276275
-
Cling: A Memory Allocator to Mitigate Dangling Pointers
-
July
-
P. Akritidis. Cling: A Memory Allocator To Mitigate Dangling Pointers. USENIX Security, July 2010.
-
(2010)
USENIX Security
-
-
Akritidis, P.1
-
9
-
-
0027963879
-
Efficient Detection of All Pointer and Array Access Errors
-
June
-
T. M. Austin, S. E. Breach, and G. S. Sohi. Efficient Detection Of All Pointer And Array Access Errors. PLDI, June 1994.
-
(1994)
PLDI
-
-
Austin, T.M.1
Breach, S.E.2
Sohi, G.S.3
-
11
-
-
84865290323
-
Diehard: Probabilistic Memory Safety for Unsafe Programming Languages
-
June
-
E. D. Berger and B. Zorn. Diehard: Probabilistic Memory Safety For Unsafe Programming Languages. PLDI, June 2006.
-
(2006)
PLDI
-
-
Berger, E.D.1
Zorn, B.2
-
12
-
-
80053153597
-
Exe: A System for Automatically Generating Inputs of Death Using Symbolic Execution
-
Oct.
-
C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler. Exe: A System For Automatically Generating Inputs Of Death Using Symbolic Execution. CCS, Oct. 2006.
-
(2006)
CCS
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
13
-
-
85084160792
-
Understanding Data Lifetime Via Whole System Simulation
-
Aug.
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime Via Whole System Simulation. USENIX Security, Aug. 2004.
-
(2004)
USENIX Security
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
16
-
-
74049095923
-
Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-engineering
-
Nov.
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-engineering. CCS, Nov. 2009.
-
(2009)
CCS
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
17
-
-
78650029404
-
Input Generation Via Decomposition and Re-stitching: Finding Bugs in Malware
-
Oct.
-
J. Caballero, P. Poosankam, S. McCamant, D. Babic, and D. Song. Input Generation Via Decomposition And Re-stitching: Finding Bugs In Malware. CCS, Oct. 2010.
-
(2010)
CCS
-
-
Caballero, J.1
Poosankam, P.2
McCamant, S.3
Babic, D.4
Song, D.5
-
18
-
-
77952403312
-
Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis
-
Oct.
-
J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic Extraction Of Protocol Message Format Using Dynamic Binary Analysis. CCS, Oct. 2007.
-
(2007)
CCS
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
19
-
-
84885679117
-
Vigilante: End-to-end Containment of Internet Worms
-
Oct.
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end Containment Of Internet Worms. SOSP, Oct. 2005.
-
(2005)
SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
20
-
-
33845580061
-
Efficiently Detecting All Dangling Pointer Uses in Production Servers
-
June
-
D. Dhurjati and V. Adve. Efficiently Detecting All Dangling Pointer Uses In Production Servers. DSN, June 2006.
-
(2006)
DSN
-
-
Dhurjati, D.1
Adve, V.2
-
21
-
-
0242612097
-
Memory Safety Without Runtime Checks or Garbage Collection
-
June
-
D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory Safety Without Runtime Checks Or Garbage Collection. LCTES, June 2003.
-
(2003)
LCTES
-
-
Dhurjati, D.1
Kowshik, S.2
Adve, V.3
Lattner, C.4
-
23
-
-
85084164001
-
Flayer: Exposing Application Internals
-
Aug.
-
W. Drewry and T. Ormandy. Flayer: Exposing Application Internals. WOOT, Aug. 2007.
-
(2007)
WOOT
-
-
Drewry, W.1
Ormandy, T.2
-
27
-
-
84865291820
-
-
Nov.
-
Google. Rewarding Web Application Security Research. Nov. 2010. http://googleonlinesecurity.blogspot.com/2010/11/rewarding-webapplication- security.html.
-
(2010)
Rewarding Web Application Security Research
-
-
-
28
-
-
0000596666
-
Purify: Fast Detection of Memory Leaks and Access Errors
-
R. Hastings and B. Joyce. Purify: Fast Detection Of Memory Leaks And Access Errors. USENIX Winter, 1992.
-
(1992)
USENIX Winter
-
-
Hastings, R.1
Joyce, B.2
-
29
-
-
85084164164
-
Cyclone: A Safe Dialect of C
-
June
-
T. Jim, G. J. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A Safe Dialect Of C. USENIX ATC, June 2002.
-
(2002)
USENIX ATC
-
-
Jim, T.1
Morrisett, G.J.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
31
-
-
84865304840
-
Tie: Principled Reverse Engineering of Types in Binary Programs
-
Feb.
-
J. Lee, T. Avgerinos, and D. Brumley. Tie: Principled Reverse Engineering Of Types In Binary Programs. NDSS, Feb. 2011.
-
(2011)
NDSS
-
-
Lee, J.1
Avgerinos, T.2
Brumley, D.3
-
32
-
-
84873352596
-
Automatic Reverse Engineering of Data Structures from Binary Execution
-
Feb.
-
Z. Lin, X. Zhang, and D. Xu. Automatic Reverse Engineering Of Data Structures From Binary Execution. NDSS, Feb. 2010.
-
(2010)
NDSS
-
-
Lin, Z.1
Zhang, X.2
Xu, D.3
-
33
-
-
84893320590
-
Dynamic Test Generation to Find Integer Bugs in X86 Binary Linux Programs
-
Aug.
-
D. Molnar, X. C. Li, and D. A. Wagner. Dynamic Test Generation To Find Integer Bugs In X86 Binary Linux Programs. USENIX Security, Aug. 2009.
-
(2009)
USENIX Security
-
-
Molnar, D.1
Li, X.C.2
Wagner, D.A.3
-
35
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Feb.
-
J. Newsome and D. Song. Dynamic Taint Analysis For Automatic Detection, Analysis, And Signature Generation Of Exploits On Commodity Software. NDSS, Feb. 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
37
-
-
0036040304
-
Ccured: Type-safe Retrofitting of Legacy Code
-
Jan.
-
G. C. Necula, S. McPeak, and W. Weimer. Ccured: Type-safe Retrofitting Of Legacy Code. POPL, Jan. 2002.
-
(2002)
POPL
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
40
-
-
84865304839
-
Howard: A Dynamic Excavator for Reverse Engineering Data Structures
-
Feb.
-
A. Slowinska, T. Stancescu, and H. Bos. Howard: A Dynamic Excavator For Reverse Engineering Data Structures. NDSS, Feb. 2011.
-
(2011)
NDSS
-
-
Slowinska, A.1
Stancescu, T.2
Bos, H.3
-
42
-
-
12844267418
-
Secure Program Execution Via Dynamic Information Flow Tracking
-
Oct.
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution Via Dynamic Information Flow Tracking. ASPLOS, Oct. 2004.
-
(2004)
ASPLOS
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
43
-
-
20344383014
-
An Efficient and Backwards-compatible Transformation to Ensure Memory Safety of C Programs
-
Oct.
-
W. Xu, D. C. DuVarney, and R. Sekar. An Efficient And Backwards-compatible Transformation To Ensure Memory Safety Of C Programs. FSE, Oct. 2004.
-
(2004)
FSE
-
-
Xu, W.1
DuVarney, D.C.2
Sekar, R.3
-
49
-
-
84865290901
-
-
July
-
Page Heap For Chromium. July 2011. http://www.chromium.org/developers/ testing/page-heap-for-chrome.
-
(2011)
-
-
-
52
-
-
84865291821
-
-
July
-
Valgrind. July 2011. http://valgrind.org/.
-
(2011)
-
-
-
53
-
-
84865304844
-
-
Xpcom.https://developer.mozilla.org/en/XPCOM
-
Mozilla Developer Network: Xpcom.https://developer.mozilla.org/en/XPCOM.
-
-
-
|