-
1
-
-
85180624638
-
-
Dynamorio. http://www.cag.lcs.mit.edu/dynamorio/.
-
Dynamorio
-
-
-
2
-
-
85180633598
-
-
Dyninst. www.dyninst.org.
-
Dyninst
-
-
-
3
-
-
85180623231
-
-
Metasploit. http://www.metasploit.org.
-
Metasploit
-
-
-
4
-
-
85084159869
-
Tied, libsafeplus: Tools for runtime buffer overflow protection
-
August
-
K. Avijit, P. Gupta, and D. Gupta. Tied, libsafeplus: Tools for runtime buffer overflow protection. In USENIX Security Symposium, August 2004.
-
(2004)
USENIX Security Symposium
-
-
Avijit, K.1
Gupta, P.2
Gupta, D.3
-
5
-
-
0014621777
-
EXDAMS - extendable debugging and monitoring system
-
R. Balzer. EXDAMS - extendable debugging and monitoring system. Proceedings of the AFIPS SJCC, 34:567–586, 1969.
-
(1969)
Proceedings of the AFIPS SJCC
, vol.34
, pp. 567-586
-
-
Balzer, R.1
-
11
-
-
33845391802
-
Vigilante: End-to-end containment of internet worms
-
Oct
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the twentieth ACM symposium on Operating systems principles (SOSP), Oct. 2005.
-
(2005)
Proceedings of the twentieth ACM symposium on Operating systems principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
12
-
-
85084160243
-
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beat-tie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beat-tie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
21
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Programming Language Design and Implementation (PLDI), 2005.
-
(2005)
Programming Language Design and Implementation (PLDI)
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V. J.8
Hazelwood, K.9
-
22
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. In IEEE Security and Privacy, volume 1, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
23
-
-
42549098753
-
Bounds-checking entire programs without recompiling
-
Venice, Italy, Jan. (Proceedings not formally published)
-
N. Nethercote and J. Fitzhardinge. Bounds-checking entire programs without recompiling. In Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management (SPACE 2004), Venice, Italy, Jan. 2004. (Proceedings not formally published.).
-
(2004)
Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management (SPACE 2004)
-
-
Nethercote, N.1
Fitzhardinge, J.2
-
25
-
-
85180634219
-
-
Technical Report CMU-CS-05-191, Department of Computer Science, Carnegie Mellon University, May
-
J. Newsome, D. Brumley, D. Song, M. R. Pariente, and T. Kampouris. Efficient and effective self-healing for defending against exploit attacks on commodity software. Technical Report CMU-CS-05-191, Department of Computer Science, Carnegie Mellon University, May 2005.
-
(2005)
Efficient and effective self-healing for defending against exploit attacks on commodity software
-
-
Newsome, J.1
Brumley, D.2
Song, D.3
Pariente, M. R.4
Kampouris, T.5
-
29
-
-
33751040191
-
-
Y. Ramin. ATPhttpd. http://www.redshift.com/∼yramin/atp/atphttpd/.
-
ATPhttpd
-
-
Ramin, Y.1
-
30
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
W. B. Jr
-
M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. B. Jr. Enhancing server availability and security through failure-oblivious computing. In Operating System Design & Implementation (OSDI), 2004.
-
(2004)
Operating System Design & Implementation (OSDI)
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.4
Leu, T.5
-
32
-
-
0031143763
-
Nstrace: A bus-driven instruction trace tool for powerpc microprocessors
-
P. A. Sandon, Y. Liao, T. Cook, D. Schultz, and P. M. de Nicolas. Nstrace: A bus-driven instruction trace tool for powerpc microprocessors. IBM Journal of Research and Development, 41(3), 1997.
-
(1997)
IBM Journal of Research and Development
, vol.41
, Issue.3
-
-
Sandon, P. A.1
Liao, Y.2
Cook, T.3
Schultz, D.4
de Nicolas, P. M.5
-
34
-
-
14844309952
-
-
Technical Report CS2003-0761, University of California, San Diego, August
-
S. Singh, C. Estan, G. Varghese, and S. Savage. The Early-Bird system for real-time detection of unknown worms. Technical Report CS2003-0761, University of California, San Diego, August 2003.
-
(2003)
The Early-Bird system for real-time detection of unknown worms
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
36
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In Proceedings of ASPLOS, 2004.
-
(2004)
Proceedings of ASPLOS
-
-
Suh, G. E.1
Lee, J.2
Devadas, S.3
-
38
-
-
0000990322
-
A survey of program slicing techniques
-
September
-
F. Tip. A survey of program slicing techniques. Journal of programming languages, 3, September 1995.
-
(1995)
Journal of programming languages
, vol.3
-
-
Tip, F.1
-
39
-
-
85180622621
-
-
A. F. Tool. http://httpd.apache.org/test/flood.
-
-
-
Tool, A. F.1
-
40
-
-
27544510809
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
August
-
H. J. Wang, C. Guo, D. Simon, and A. Zugenmaier. Shield: Vulnerability-driven network filters for preventing known vulnerability exploits. In ACM SIGCOMM, August 2004.
-
(2004)
ACM SIGCOMM
-
-
Wang, H. J.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
42
-
-
85180626295
-
-
J. Xu, P. Ning, C. Kil, Y. Zhai, and C. Bookholt. Automatic diagnosis and response to memory corruption vulnerabilities, 2005.
-
(2005)
Automatic diagnosis and response to memory corruption vulnerabilities
-
-
Xu, J.1
Ning, P.2
Kil, C.3
Zhai, Y.4
Bookholt, C.5
-
44
-
-
21644447484
-
AccMon: Automatically detecting memory-related bugs via program counter-based invariants
-
Dec
-
P. Zhou, W. Liu, F. Long, S. Lu, F. Qin, Y. Zhou, S. Midkiff, and J. Torrellas. AccMon: Automatically detecting memory-related bugs via program counter-based invariants. In The Proceedings of 37th Annual IEEE/ACM International Symposium on Micro-architecture (Micro’04), Dec. 2004.
-
(2004)
The Proceedings of 37th Annual IEEE/ACM International Symposium on Micro-architecture (Micro’04)
-
-
Zhou, P.1
Liu, W.2
Long, F.3
Lu, S.4
Qin, F.5
Zhou, Y.6
Midkiff, S.7
Torrellas, J.8
|