-
1
-
-
16644362894
-
Randomized instruction set emulation
-
E. G. Barrantes, D. H. Ackley, S. Forrest, and D. Stefanovic. Randomized instruction set emulation. ACM Transactions on Information and System Security (TISSEC), 8(1):3-40, 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
, pp. 3-40
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Stefanovic, D.4
-
2
-
-
33750205459
-
Grid'5000: A large scale and highly reconfigurable experimental grid testbed
-
R. Bolze, F. Cappello, E. Caron, M. Dayde, F. Desprez, E. Jeannot, Y. Jegou, S. Lanteri, J. Leduc, N. Melab, et al. Grid'5000: A large scale and highly reconfigurable experimental grid testbed. International Journal of High Performance Computing Applications, 20(4):481-494, 2006.
-
(2006)
International Journal of High Performance Computing Applications
, vol.20
, Issue.4
, pp. 481-494
-
-
Bolze, R.1
Cappello, F.2
Caron, E.3
Dayde, M.4
Desprez, F.5
Jeannot, E.6
Jegou, Y.7
Lanteri, S.8
Leduc, J.9
Melab, N.10
-
3
-
-
84886394193
-
Automatic recovery from runtime failures
-
IEEE Press
-
A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezze. Automatic recovery from runtime failures. In Proc. of the Int. Conf. on Software Engineering (ICSE), pages 782-791. IEEE Press, 2013.
-
(2013)
Proc. of the Int. Conf. on Software Engineering (ICSE)
, pp. 782-791
-
-
Carzaniga, A.1
Gorla, A.2
Mattavelli, A.3
Perino, N.4
Pezze, M.5
-
4
-
-
84937721003
-
End-to-end software diversification of internet services
-
Springer
-
M. Christodorescu, M. Fredrikson, S. Jha, and J. Giffin. End-to-end software diversification of internet services. In Moving Target Defense, pages 117-130. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 117-130
-
-
Christodorescu, M.1
Fredrikson, M.2
Jha, S.3
Giffin, J.4
-
5
-
-
0027684663
-
Operating system protection through program evolution
-
F. B. Cohen. Operating system protection through program evolution. Computers & Security, 12(6):565-584, 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.B.1
-
6
-
-
36348975941
-
-
B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems a secretless framework for security through diversity. 2006.
-
(2006)
N-variant Systems a Secretless Framework for Security through Diversity
-
-
Cox, B.1
Evans, D.2
Filipi, A.3
Rowanhill, J.4
Hu, W.5
Davidson, J.6
Knight, J.7
Nguyen-Tuong, A.8
Hiser, J.9
-
7
-
-
0017959155
-
Hints on test data selection: Help for the practicing programmer
-
R. A. DeMillo, R. J. Lipton, and F. G. Sayward. Hints on test data selection: Help for the practicing programmer. Computer, 11(4):34-41, 1978.
-
(1978)
Computer
, vol.11
, Issue.4
, pp. 34-41
-
-
De Millo, R.A.1
Lipton, R.J.2
Sayward, F.G.3
-
8
-
-
0032256307
-
Generating diverse software versions with genetic programming: An experimental study
-
R. Feldt. Generating diverse software versions with genetic programming: An experimental study. IEE Proceedings-Software, 145(6):228-236, 1998.
-
(1998)
IEE Proceedings-Software
, vol.145
, Issue.6
, pp. 228-236
-
-
Feldt, R.1
-
9
-
-
0029716418
-
A sense of self for unix processes
-
Proceedings. 1996 IEEE Symposium on, IEEE
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for unix processes. In Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on, pages 120-128. IEEE, 1996.
-
(1996)
Security and Privacy, 1996
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
10
-
-
0030697765
-
Building diverse computer systems
-
IEEE
-
S. Forrest, A. Somayaji, and D. H. Ackley. Building diverse computer systems. In Operating Systems, 1997., The Sixth Workshop on Hot Topics in, pages 67-72. IEEE, 1997.
-
(1997)
Operating Systems, 1997, the Sixth Workshop on Hot Topics in
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
12
-
-
78751541482
-
E unibus pluram: Massive-scale software diversity as a defense mechanism
-
ACM
-
M. Franz. E unibus pluram: massive-scale software diversity as a defense mechanism. In Proceedings of the 2010 workshop on New security paradigms, pages 7-16. ACM, 2010.
-
(2010)
Proceedings of the 2010 Workshop on New Security Paradigms
, pp. 7-16
-
-
Franz, M.1
-
13
-
-
0038108620
-
Motivation of software developers in open source projects: An internet-based survey of contributors to the linux kernel
-
G. Hertel, S. Niedner, and S. Herrmann. Motivation of software developers in open source projects: An internet-based survey of contributors to the linux kernel. Research policy, 32(7):1159-1177, 2003.
-
(2003)
Research Policy
, vol.32
, Issue.7
, pp. 1159-1177
-
-
Hertel, G.1
Niedner, S.2
Herrmann, S.3
-
16
-
-
85008264009
-
Automatic mining of functionally equivalent code fragments via random testing
-
ACM
-
L. Jiang and Z. Su. Automatic mining of functionally equivalent code fragments via random testing. In Proc. of Int. Symp. on Software Testing and Analysis, pages 81-92. ACM, 2009.
-
(2009)
Proc. of Int. Symp. on Software Testing and Analysis
, pp. 81-92
-
-
Jiang, L.1
Su, Z.2
-
19
-
-
84856746279
-
Genprog: A generic method for automatic software repair
-
C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. Genprog: A generic method for automatic software repair. IEEE Tran. on Software Engineering, 38(1):54-72, 2012.
-
(2012)
IEEE Tran. on Software Engineering
, vol.38
, Issue.1
, pp. 54-72
-
-
Le Goues, C.1
Nguyen, T.2
Forrest, S.3
Weimer, W.4
-
20
-
-
70350662027
-
Polymorphing software by randomizing data structure layout
-
Springer
-
Z. Lin, R. D. Riley, and D. Xu. Polymorphing software by randomizing data structure layout. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 107-126. Springer, 2009.
-
(2009)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 107-126
-
-
Lin, Z.1
Riley, R.D.2
Xu, D.3
-
21
-
-
77954745730
-
Quality of service profiling
-
Cape Town, South Africa
-
S. Misailovic, S. Sidiroglou, H. Hoffmann, and M. C. Rinard. Quality of service profiling. In Proc. of the Int. Conf on Software Engineering (ICSE), pages 25-34, Cape Town, South Africa, 2010.
-
(2010)
Proc. of the Int. Conf on Software Engineering (ICSE)
, pp. 25-34
-
-
Misailovic, S.1
Sidiroglou, S.2
Hoffmann, H.3
Rinard, M.C.4
-
22
-
-
84994137883
-
A critical review of \automatic patch generation learned from human-written patches: An essay on the problem statement and the evaluation of automatic software repair
-
Hyderabab, India
-
M. Monperrus. A critical review of \automatic patch generation learned from human-written patches": An essay on the problem statement and the evaluation of automatic software repair. In Proc. of the Int. Conf on Software Engineering (ICSE), Hyderabab, India, 2014.
-
(2014)
Proc. of the Int. Conf on Software Engineering (ICSE)
-
-
Monperrus, M.1
-
24
-
-
80051922262
-
Detecting anomalies in the order of equally-typed method arguments
-
M. Pradel and T. R. Gross. Detecting anomalies in the order of equally-typed method arguments. In Proceedings of ISSTA, pages 232-242, 2011.
-
(2011)
Proceedings of ISSTA
, pp. 232-242
-
-
Pradel, M.1
Gross, T.R.2
-
25
-
-
84863913620
-
Manipulating program functionality to eliminate security vulnerabilities
-
Springer
-
M. Rinard. Manipulating program functionality to eliminate security vulnerabilities. In Moving Target Defense, pages 109-115. Springer, 2011.
-
(2011)
Moving Target Defense
, pp. 109-115
-
-
Rinard, M.1
-
26
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
M. C. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In Proc. of the Operating System Design and Implementation (OSDI), pages 303-316, 2004.
-
(2004)
Proc. of the Operating System Design and Implementation (OSDI)
, pp. 303-316
-
-
Rinard, M.C.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee, W.S.6
-
27
-
-
84905666325
-
Software mutational robustness
-
E. Schulte, Z. P. Fry, E. Fast, W. Weimer, and S. Forrest. Software mutational robustness. Genetic Programming and Evolvable Machines, pages 1-32, 2013.
-
(2013)
Genetic Programming and Evolvable Machines
, pp. 1-32
-
-
Schulte, E.1
Fry, Z.P.2
Fast, E.3
Weimer, W.4
Forrest, S.5
-
28
-
-
14844328033
-
On the effectiveness of address-space randomization
-
ACM
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address-space randomization. In Proceedings of the 11th ACM conference on Computer and communications security, pages 298-307. ACM, 2004.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
29
-
-
33745650701
-
Cots diversity based intrusion detection and application to web servers
-
Springer
-
E. Totel, F. Majorczyk, and L. Me. Cots diversity based intrusion detection and application to web servers. In Recent Advances in Intrusion Detection, pages 43-62. Springer, 2006.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 43-62
-
-
Totel, E.1
Majorczyk, F.2
Me, L.3
|