-
1
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October
-
J. P. Anderson. Computer Security Technology Planning Study, Volume II. Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October 1972.
-
(1972)
Computer Security Technology Planning Study
, vol.2
-
-
Anderson, J.P.1
-
2
-
-
85076291316
-
-
Apache Performance Tuning. http://httpd.apache.org/docs/2.2/misc/perf-tuning.html#symlinks, 2012.
-
(2012)
-
-
-
3
-
-
60649106745
-
Automatic inference and enforcement of kernel data structure invariants
-
Anaheim, California, USA, December IEEE Computer Society Press, Los Alamitos, California, USA
-
A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC'08: Proceedings of the 24th Annual Computer Security Applications Conference, pages 77-86, Anaheim, California, USA, December 2008. IEEE Computer Society Press, Los Alamitos, California, USA.
-
(2008)
ACSAC'08: Proceedings of the 24th Annual Computer Security Applications Conference
, pp. 77-86
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
4
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti et al. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proceedings of the IEEE Symposium on Security and Privacy, 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Balzarotti, D.1
-
6
-
-
85076234531
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Digler. Checking for race conditions in file accesses. Computer Systems, 9(2), Spring 1996.
-
(1996)
Computer Systems
, vol.9
, Issue.2
-
-
Bishop, M.1
Digler, M.2
-
8
-
-
84877714434
-
Exploiting unix file-system races via algorithmic complexity attacks
-
X. Cai et al. Exploiting Unix File-System Races via Algorithmic Complexity Attacks. In IEEE SSP '09, 2009.
-
(2009)
IEEE SSP '09
-
-
Cai, X.1
-
10
-
-
84858757104
-
Where do you want to go today? Escalating privileges by pathname manipulation
-
S. Chari et al. Where do you want to go today? escalating privileges by pathname manipulation. In NDSS '10, 2010.
-
(2010)
NDSS '10
-
-
Chari, S.1
-
11
-
-
85084160959
-
Race-guard: Kernel protection from temporary file race vulnerabilities
-
Berkeley, CA, USA USENIX Association
-
C. Cowan, S. Beattie, C. Wright, and G. Kroah-Hartman. Race-guard: Kernel protection from temporary file race vulnerabilities. In Proceedings of the 10th USENIX Security Symposium, Berkeley, CA, USA, 2001. USENIX Association.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Wright, C.3
Kroah-Hartman, G.4
-
14
-
-
0036041420
-
Bugs As deviant behavior: A general approach to inferring errors in systems code
-
New York, NY, USA ACM
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP'01, pages 57-72, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, SOSP'01
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
15
-
-
0032639445
-
Dynamically discovering likely program invariants to support program evolution
-
New York, NY, USA ACM
-
M. D. Ernst, J. Cockrell, W. G. Griswold, and D. Notkin. Dynamically discovering likely program invariants to support program evolution. In Proceedings of the 21st International Conference on Software Engineering, ICSE'99, pages 213-224, New York, NY, USA, 1999. ACM.
-
(1999)
Proceedings of the 21st International Conference on Software Engineering, ICSE'99
, pp. 213-224
-
-
Ernst, M.D.1
Cockrell, J.2
Griswold, W.G.3
Notkin, D.4
-
16
-
-
0024089972
-
The confused deputy
-
Oct.
-
N. Hardy. The confused deputy. Operating Systems Review, 22(4):36-38, Oct. 1988.
-
(1988)
Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
17
-
-
85077749236
-
Analyzing integrity protection in the SELinux example policy
-
Berkeley, CA, USA USENIX Association
-
T. Jaeger, R. Sailer, and X. Zhang. Analyzing Integrity Protection in the SELinux Example Policy. In SSYM'03: Proceedings of the 12th conference on USENIX Security Symposium, pages 5-5, Berkeley, CA, USA, 2003. USENIX Association.
-
(2003)
SSYM'03: Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 5
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
18
-
-
0016971687
-
Symbolic execution and program testing
-
July
-
J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, July 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
19
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. N. Krohn et al. Information flow control for standard OS abstractions. In SOSP '07, 2007.
-
(2007)
SOSP '07
-
-
Krohn, M.N.1
-
20
-
-
39049160206
-
A general dynamic information flow tracking framework for security applications
-
IEEE Computer Society
-
L. C. Lam and T.-C. Chiueh. A general dynamic information flow tracking framework for security applications. In Proceedings of ACSAC '06, pages 463-472. IEEE Computer Society, 2006.
-
(2006)
Proceedings of ACSAC '06
, pp. 463-472
-
-
Lam, L.C.1
Chiueh, T.-C.2
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
-
J. Newsome et al. Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In NDSS, 2005.
-
(2005)
NDSS
-
-
Newsome, J.1
-
24
-
-
85076287019
-
-
Selinux. http://www.nsa.gov/selinux.
-
Selinux
-
-
-
26
-
-
84904495050
-
Rps: An extension of reference monitor to prevent race-attacks
-
J. Park, G. Lee, S. Lee, and D.-K. Kim. Rps: An extension of reference monitor to prevent race-attacks. In PCM (1) 04, 2004.
-
(2004)
PCM (1) 04
-
-
Park, J.1
Lee, G.2
Lee, S.3
Kim, D.-K.4
-
28
-
-
85077198892
-
Lightweight memory tracing
-
Berkeley, CA, USA USENIX Association
-
M. Payer, E. Kravina, and T. R. Gross. Lightweight memory tracing. In Proceedings of the 2013 USENIX Conference on Annual Technical Conference, USENIX ATC'13, pages 115-126, Berkeley, CA, USA, 2013. USENIX Association.
-
(2013)
Proceedings of the 2013 USENIX Conference on Annual Technical Conference, USENIX ATC'13
, pp. 115-126
-
-
Payer, M.1
Kravina, E.2
Gross, T.R.3
-
29
-
-
85076293544
-
Operating system transactions
-
D. E. Porter et al. Operating system transactions. In SOSP '09, 2009.
-
(2009)
SOSP '09
-
-
Porter, D.E.1
-
30
-
-
85048404745
-
Preventing privilege escalation
-
N. Provos et al. Preventing privilege escalation. In USENIX Security '03, 2003.
-
(2003)
USENIX Security '03
-
-
Provos, N.1
-
31
-
-
40349087553
-
LIFT: A low-overhead practical information flow tracking system for detecting security attacks
-
F. Qin et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In MICRO 39, 2006.
-
(2006)
MICRO 39
-
-
Qin, F.1
-
32
-
-
0031272525
-
Eraser: A dynamic data race detector for multithreaded programs
-
Nov.
-
S. Savage, M. Burrows, G. Nelson, P. Sobalvarro, and T. Anderson. Eraser: A dynamic data race detector for multithreaded programs. ACM Trans. Comput. Syst., 15(4):391-411, Nov. 1997.
-
(1997)
ACM Trans. Comput. Syst.
, vol.15
, Issue.4
, pp. 391-411
-
-
Savage, S.1
Burrows, M.2
Nelson, G.3
Sobalvarro, P.4
Anderson, T.5
-
33
-
-
80053015448
-
An efficient black-box technique for defeating web application attacks
-
R. Sekar. An efficient black-box technique for defeating web application attacks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Sekar, R.1
-
36
-
-
78449299493
-
Portably solving file tocttou races with hardness amplification
-
D. Tsafrir et al. Portably solving file tocttou races with hardness amplification. In USENIX FAST, 2008.
-
(2008)
USENIX FAST
-
-
Tsafrir, D.1
-
38
-
-
33644499445
-
Preventing race condition attacks on file-systems
-
P. Uppuluri, U. Joshi, and A. Ray. Preventing race condition attacks on file-systems. In SAC-05, 2005.
-
(2005)
SAC-05
-
-
Uppuluri, P.1
Joshi, U.2
Ray, A.3
-
41
-
-
84871971635
-
Integrity walls: Finding attack surfaces from mandatory access control policies
-
H. Vijayakumar et al. Integrity walls: Finding attack surfaces from mandatory access control policies. In ASIACCS, 2012.
-
(2012)
ASIACCS
-
-
Vijayakumar, H.1
-
42
-
-
85067179564
-
Capsicum: Practical capabilities for UNIX
-
R. Watson et al. Capsicum: practical capabilities for UNIX. In USENIX Security, 2010.
-
(2010)
USENIX Security
-
-
Watson, R.1
-
43
-
-
36049014300
-
Tocttou vulnerabilities in unix-style file systems: An anatomical study
-
J. Wei et al. Tocttou vulnerabilities in unix-style file systems: an anatomical study. In USENIX FAST '05, 2005.
-
(2005)
USENIX FAST '05
-
-
Wei, J.1
-
45
-
-
84888352157
-
Making information flow explicit in HiStar
-
N. Zeldovich et al. Making information flow explicit in HiStar. In OSDI '06, 2006.
-
(2006)
OSDI '06
-
-
Zeldovich, N.1
|