-
1
-
-
84893253669
-
-
Amazon Relational Database Service. http://aws.amazon.com/rds/.
-
-
-
-
2
-
-
84893326200
-
-
Attrition.net
-
Attrition.net. Absolute Sownage. http://attrition.org/security/rant/sony- aka-sownage.html, 2011.
-
(2011)
Absolute Sownage
-
-
-
3
-
-
84870297714
-
Guardrails: A data-centric web application security framework
-
J. Burket, P. Mutchler, M. Weaver, M. Zaveri, and D. Evans. Guardrails: A data-centric web application security framework. In WebApps, 2011.
-
(2011)
WebApps
-
-
Burket, J.1
Mutchler, P.2
Weaver, M.3
Zaveri, M.4
Evans, D.5
-
6
-
-
84894039463
-
Nemesis: Preventing authentication & access control vulnerabilities in web applications
-
M. Dalton, N. Zeldovich, and C. Kozyrakis. Nemesis: Preventing authentication & access control vulnerabilities in web applications. In 18th Usenix Security Symposium, 2009.
-
(2009)
18th Usenix Security Symposium
-
-
Dalton, M.1
Zeldovich, N.2
Kozyrakis, C.3
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5): 236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
9
-
-
84893288206
-
-
L. Dignan. Sony's data breach costs. http://www.zdnet.com/blog/btl/sonys- data-breach-costs-likely-to-scream-higher49161, 2011.
-
(2011)
Sony's Data Breach Costs
-
-
Dignan, L.1
-
10
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Oct.
-
W. Enck, P. Gilbert, B. gon Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Symposium on Operating Systems Principles (SOSP), Oct. 2010.
-
(2010)
Symposium on Operating Systems Principles (SOSP)
-
-
Enck, W.1
Gilbert, P.2
Gon Chun, B.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
12
-
-
34548017123
-
From trusted to secure: Building applications that enforce system security
-
Santa Clara, CA, June
-
B. Hicks, S. Rueda, T. Jaeger, and P. McDaniel. From Trusted to Secure: Building Applications that Enforce System Security. In Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, June 2007.
-
(2007)
Proceedings of the USENIX Annual Technical Conference
-
-
Hicks, B.1
Rueda, S.2
Jaeger, T.3
McDaniel, P.4
-
14
-
-
84893335765
-
-
T. Inquirer. Citibank Hacked by altering URLs. http://www.theinquirer. net/inquirer/news/2079431/citibank-hacked-altering-urls, 2011.
-
(2011)
Citibank Hacked by Altering URLs
-
-
-
15
-
-
33947629208
-
Provenance-aware tracing of worm break-in and contaminations: A process coloring approach
-
June
-
X. Jiang, A. Walters, F. Buchholz, D. Xu, Y.-M. Wang, and E. H. Spafford. Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach. In ICDCS, June 2006.
-
(2006)
ICDCS
-
-
Jiang, X.1
Walters, A.2
Buchholz, F.3
Xu, D.4
Wang, Y.-M.5
Spafford, E.H.6
-
16
-
-
70349276980
-
Privacy oracle: A system for finding application leaks with black box differential testing
-
J. Jung, A. Sheth, B. Greenstein, D. Wetherall, and T. K. Gabriel Maganis. Privacy Oracle: a System for Finding Application Leaks with Black Box Differential Testing. In ACM Conference on Computer and Commnications Security, 2008.
-
(2008)
ACM Conference on Computer and Commnications Security
-
-
Jung, J.1
Sheth, A.2
Greenstein, B.3
Wetherall, D.4
Maganis Gabriel, T.K.5
-
18
-
-
47149101814
-
Information flow control for standard os abstractions
-
Stevenson, WA, Oct.
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard os abstractions. In Proc. 21st ACM Symposium on Operating Systems Principles (SOSP), Stevenson, WA, Oct. 2007.
-
(2007)
Proc. 21st ACM Symposium on Operating Systems Principles (SOSP)
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
19
-
-
84883720432
-
Composing software-defined networks
-
C. Monsanto, J. Reich, N. Foster, J. Rexford, and D. Walker. Composing Software-Defined Networks. In USENIX NSDI, 2013.
-
(2013)
USENIX NSDI
-
-
Monsanto, C.1
Reich, J.2
Foster, N.3
Rexford, J.4
Walker, D.5
-
21
-
-
84881361956
-
-
MySQL Proxy. http://forge.mysql.com/wiki/MySQL-Proxy.
-
MySQL Proxy
-
-
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
San Diego, CA
-
J. Newsome and D. X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.X.2
-
23
-
-
84893288954
-
-
OpenFlow Switch Consortium. http://www.openflowswitch.org/, 2008.
-
(2008)
-
-
-
27
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
Oakland, CA, May
-
B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig. CLAMP: Practical prevention of large-scale data leaks. In Proc. IEEE Symposium on Security and Privacy, Oakland, CA, May 2009.
-
(2009)
Proc. IEEE Symposium on Security and Privacy
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
-
28
-
-
1442263220
-
Scrash: A system for generating security crash information
-
Washington, DC, Aug.
-
P. Broadwell, M. Harren, N. Sastry. Scrash: A system for generating security crash information. In Proc. 12th USENIX Security Symposium, Washington, DC, Aug. 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
-
-
Broadwell, P.1
Harren, M.2
Sastry, N.3
-
29
-
-
82655162816
-
Cryptdb: Protecting conïňA̧dentiality with encrypted query processing
-
Cascais, Portugal, Oct.
-
R. A. Popa, C. M. S. RedïňA̧eld, N. Zeldovich, and H. Balakrishnan. Cryptdb: Protecting conïňA̧dentiality with encrypted query processing. In Proc. 23nd ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, Oct. 2011.
-
(2011)
Proc. 23nd ACM Symposium on Operating Systems Principles (SOSP)
-
-
Popa, R.A.1
Redïňa̧eld, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
31
-
-
84893287530
-
-
Redis. http://redis.io/.
-
-
-
-
32
-
-
84893338234
-
-
Redis Benchmarks. https://code.google.com/p/redis/wiki/Benchmarks.
-
Redis Benchmarks
-
-
-
33
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, DC, Aug.
-
U. Shankar, K. Talwar, J. Foster, D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proc. 10th USENIX Security Symposium, Washington, DC, Aug. 2001.
-
(2001)
Proc. 10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.3
Wagner, D.4
-
34
-
-
37049002830
-
Labels and event processes in the asbestos operating system
-
Dec.
-
S. VanDeBogart, P. Efstathopoulos, E. Kohler, M. Krohn, C. Frey, D. Ziegler, F. Kaashoek, R. Morris, and D. Mazieres. Labels and event processes in the Asbestos operating system. ACM Transactions on Computer Systems, 25(4): 1-43, Dec. 2007.
-
(2007)
ACM Transactions on Computer Systems
, vol.25
, Issue.4
, pp. 1-43
-
-
VanDeBogart, S.1
Efstathopoulos, P.2
Kohler, E.3
Krohn, M.4
Frey, C.5
Ziegler, D.6
Kaashoek, F.7
Morris, R.8
Mazieres, D.9
-
35
-
-
0028380781
-
Authentication in the taos operating system
-
E. Wobber, M. Abadi, and M. Burrows. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1): 3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
-
36
-
-
85084164351
-
Linux security modules: General security support for the linux kernel
-
San Francisco, CA, Aug.
-
C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In Proc. 11th USENIX Security Symposium, San Francisco, CA, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security Symposium
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
37
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Alexandria, VA, Oct.
-
H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: capturing system-wide information flow for malware detection and analysis. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct. 2007.
-
(2007)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
39
-
-
84888352157
-
Making information flow explicit in HiStar
-
Seattle, WA, Nov.
-
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres. Making Information Flow Explicit in HiStar. In Proc. 7th USENIX OSDI, Seattle, WA, Nov. 2006.
-
(2006)
Proc. 7th USENIX OSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazieres, D.4
-
40
-
-
85094632142
-
Securing distributed systems with information flow control
-
San Francisco, CA, Apr.
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazieres. Securing Distributed Systems with Information Flow Control. In Proc. 5th USENIX NSDI, San Francisco, CA, Apr. 2008.
-
(2008)
Proc. 5th USENIX NSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazieres, D.3
-
41
-
-
77952354362
-
Neon: System support for derived data management
-
Mar.
-
Q. Zhang, J. McCullough, J. Ma, N. Schear, M. Vrable, A. C. Snoeren, G. M. Voelker, S. Savage, and A. Vahdat. Neon: System Support for Derived Data Management. In ACM Conference on Virtual Execution Environments, Mar. 2010.
-
(2010)
ACM Conference on Virtual Execution Environments
-
-
Zhang, Q.1
McCullough, J.2
Ma, J.3
Schear, N.4
Vrable, M.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
Vahdat, A.9
|