-
3
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Springer-Verlag, August
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology (CRYPTO'01), Volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer-Verlag, August 2001.
-
(2001)
Advances in Cryptology (CRYPTO'01), Volume 2139 of Lecture Notes in Computer Science
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
0030092390
-
Checking for race conditions in file accesses
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2), 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
-
-
Bishop, M.1
Dilger, M.2
-
5
-
-
4143130116
-
-
(Last accessed: 3 February 2003)
-
CERT Coordination Center. Denial of service attacks, 2001. http://www.cert.org/tech-tips/denial-of-service.html (Last accessed: 3 February 2003).
-
(2001)
Denial of Service Attacks
-
-
-
10
-
-
0023294949
-
Computer viruses: Theory and experiments
-
F. Cohen. Computer viruses: Theory and experiments. Computers and Security, 6:22-35, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
11
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
The University of Auckland, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, Department of Computer Sciences, The University of Auckland, July 1997.
-
(1997)
Technical Report 148, Department of Computer Sciences
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
12
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
ACM Press, January
-
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98). ACM Press, January 1998.
-
(1998)
Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
ACM Press
-
J. Corbett, M. Dwyer, J. Hatcliff, C. Pasareanu, Robby, S. Laubach, and H. Zheng. Bandera: Extracting finite-state models from Java source code. In Proceedings of the 22nd International Conference on Software Engineering (ICSE'00), pages 439-448. ACM Press, 2000.
-
(2000)
Proceedings of the 22nd International Conference on Software Engineering (ICSE'00)
, pp. 439-448
-
-
Corbett, J.1
Dwyer, M.2
Hatcliff, J.3
Pasareanu, C.4
Laubach, R.S.5
Zheng, H.6
-
18
-
-
84944409009
-
Efficient algorithms for model checking pushdown systems
-
Springer-Verlag, July
-
J. Esparza, D. Hansel, P. Rossmanith, and S. Schwoon. Efficient algorithms for model checking pushdown systems. In Proceedings of the 12th International Conference on Computer-Aided Verification (CAV'00), Volume 1855 of Lecture Notes in Computer Science, pages 232-247. Springer-Verlag, July 2000.
-
(2000)
Proceedings of the 12th International Conference on Computer-Aided Verification (CAV'00), Volume 1855 of Lecture Notes in Computer Science
, pp. 232-247
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
22
-
-
0003620778
-
-
Addison Wesley
-
J.E. Hopcroft, R. Motwani, and J.D. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 2001.
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
23
-
-
0025228221
-
Interprocedural slicing using dependence graphs
-
January
-
S. Horwitz, T. Reps, and D. Binkley. Interprocedural slicing using dependence graphs. ACM Transactions on Programming Languages and Systems (TOPLAS), 12(1):26-60, January 1990.
-
(1990)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.12
, Issue.1
, pp. 26-60
-
-
Horwitz, S.1
Reps, T.2
Binkley, D.3
-
24
-
-
85077734778
-
-
(Last accessed: 3 February 2003)
-
GrammaTech Inc. Codesurfer - code analysis and understanding tool. http://www.grammatech.com/products/codesurfer/index.html (Last accessed: 3 February 2003).
-
Codesurfer - Code Analysis and Understanding Tool
-
-
-
26
-
-
33644569366
-
-
chapter Ways of Infection: Viruses without an Entry Point. Kaspersky Labs (Last accessed: 3 February 2003)
-
E. Kaspersky. Virus List Encyclopaedia, chapter Ways of Infection: Viruses without an Entry Point. Kaspersky Labs, 2002. http://www.viruslist.com/eng/viruslistbooks.asp?id=32&key=0000100007000020000100003 (Last accessed: 3 February 2003).
-
(2002)
Virus List Encyclopaedia
-
-
Kaspersky, E.1
-
27
-
-
85077740931
-
-
(Last accessed: 3 February 2003)
-
Kaspersky Labs. http://www.kasperskylabs.com (Last accessed: 3 February 2003).
-
-
-
-
29
-
-
0029488806
-
MCF: A malicious code filter
-
R.W. Lo, K.N. Levitt, and R.A. Olsson. MCF: A malicious code filter. Computers & Society, 14(6):541-566, 1995.
-
(1995)
Computers & Society
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
30
-
-
0034269416
-
Attacking malicious code: Report to the infosec research council
-
September/October
-
G. McGraw and G. Morrisett. Attacking malicious code: Report to the Infosec research council. IEEE Software, 17(5):33-41 September/October 2000.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
31
-
-
0242314805
-
-
(Last accessed: 3 February 2003)
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the Sapphire/Slammer worm. http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html (Last accessed: 3 February 2003).
-
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
32
-
-
84956968251
-
Stack-based typed assembly language
-
Xavier Leroy and Atsushi Ohori, editors Springer-Verlag, March
-
G. Morrisett, K. Crary, N. Glew, and D. Walker. Stack-based Typed Assembly Language. In Xavier Leroy and Atsushi Ohori, editors, 1998 Workshop on Types in Compilation, Volume 1473 of Lecture Notes in Computer Science, pages 28-52. Springer-Verlag, March 1998.
-
(1998)
1998 Workshop on Types in Compilation, Volume 1473 of Lecture Notes in Computer Science
, pp. 28-52
-
-
Morrisett, G.1
Crary, K.2
Glew, N.3
Walker, D.4
-
33
-
-
0031679751
-
From system F to typed assembly language
-
ACM Press, January
-
G. Morrisett, D. Walker, K. Crary, and N. Glew. From System F to Typed Assembly Language. In Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98), pages 85-97. ACM Press, January 1998.
-
(1998)
Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'98)
, pp. 85-97
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
39
-
-
84957365826
-
PVS: Combining specification, proof checking, and model checking
-
Springer-Verlag, August
-
S. Owre, S. Rajan, J. Rushby, N. Shankar, and M. Srivas. PVS: Combining specification, proof checking, and model checking. In Proceedings of the 8th International Conference on Computer-Aided Verification (CAV'96), Volume 1102 of Lecture Notes in Computer Science, pages 411-414. Springer-Verlag, August 1996.
-
(1996)
Proceedings of the 8th International Conference on Computer-Aided Verification (CAV'96), Volume 1102 of Lecture Notes in Computer Science
, pp. 411-414
-
-
Owre, S.1
Rajan, S.2
Rushby, J.3
Shankar, N.4
Srivas, M.5
-
41
-
-
20444463170
-
-
chapter W95.CIH. Symantec Antivirus Research Center (Last accessed: 3 February 2003)
-
M. Samamura. Expanded Threat List and Virus Encyclopaedia, chapter W95.CIH. Symantec Antivirus Research Center, 1998. http://securityresponse.symantec.com/avcenter/venc/data/cih.html (Last accessed: 3 February 2003).
-
(1998)
Expanded Threat List and Virus Encyclopaedia
-
-
Samamura, M.1
-
42
-
-
85077747514
-
DataRescue sa/nv
-
(Last accessed: 3 February 2003)
-
DataRescue sa/nv. IDA Pro - interactive disassembler. http://www.datarescue.com/idabase/ (Last accessed: 3 February 2003).
-
IDA pro - Interactive Disassembler
-
-
-
43
-
-
85084162258
-
How to 0wn the internet in your spare time
-
USENIX, USENIX Association, August
-
S. Staniford, V. Paxson, and N. Weaver. How to 0wn the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium (Security'02), pages 149-167. USENIX, USENIX Association, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium (Security'02)
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
45
-
-
33644577975
-
-
(Last accessed: 3 February 2003)
-
TESO. burneye elf encryption program. https://teso.scene.at (Last accessed: 3 February 2003).
-
Burneye Elf Encryption Program
-
-
-
47
-
-
20444460803
-
Flash in the pan?
-
July Virus Analysis Library
-
R. Wang. Flash in the pan? Virus Bulletin, July 1998. Virus Analysis Library.
-
(1998)
Virus Bulletin
-
-
Wang, R.1
-
48
-
-
40549117362
-
-
PhD thesis, University of Wisconsin, Madison
-
Z. Xu. Safety-Checking of Machine Code. PhD thesis, University of Wisconsin, Madison, 2000.
-
(2000)
Safety-Checking of Machine Code
-
-
Xu, Z.1
-
50
-
-
85077739602
-
-
(Last accessed: 3 February 2003)
-
z0mbie. RPME mutation engine. http://z0mbie.host.sk/rpme.zip (Last accessed: 3 February 2003).
-
RPME Mutation Engine
-
-
-
51
-
-
84861266854
-
-
(Last accessed: 3 February 2003)
-
z0mbie. z0mbie's homepage. http://z0mbie.host.sk (Last accessed: 3 February 2003).
-
Z0mbie's Homepage
-
-
|