-
7
-
-
0006100649
-
Smashing the stack for fun and profit
-
Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
One, A.1
-
10
-
-
17644393012
-
Bypassing StackGuard and StackShield
-
May
-
Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 5(56), May 2000.
-
(2000)
Phrack
, vol.5
, Issue.56
-
-
Bulba1
Kilr2
-
11
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.
-
Proceedings of the 7th USENIX Security Symposium, January 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
12
-
-
84978401615
-
ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), December 2002.
-
Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), December 2002
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
23
-
-
0038524497
-
-
January
-
M. Conover and w00w00 Security Team. w00w00 on heap overflows. http://www.w00w00.org/files/articles/heaptut.txt, January 1999.
-
(1999)
W00w00 on Heap Overflows
-
-
Conover, M.1
-
24
-
-
0027631586
-
The Denotational Semantics of a Functional Tree-Manipulation Language
-
A. J. Malton. The Denotational Semantics of a Functional Tree-Manipulation Language. Computer Languages, 19(3):157-168, 1993.
-
(1993)
Computer Languages
, vol.19
, Issue.3
, pp. 157-168
-
-
Malton, A.J.1
-
27
-
-
0030736223
-
Computer Virus - Coevolution
-
C. Nachenberg. Computer Virus - Coevolution. Communications of the ACM, 50(1):46-51, 1997.
-
(1997)
Communications of the ACM
, vol.50
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
29
-
-
0036931592
-
The Design and Implementation of an Intrusion Tolerant System
-
J. Reynolds, J. Just, E. Lawson, L. Clough, and R. Maglich. The Design and Implementation of an Intrusion Tolerant System. In Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 2002.
-
Proceedings of the International Conference on Dependable Systems and Networks (DSN), June 2002
-
-
Reynolds, J.1
Just, J.2
Lawson, E.3
Clough, L.4
Maglich, R.5
-
30
-
-
0030653560
-
Using the SimOS Machine Simulator to Study Complex Computer Systems
-
M. Rosenblum, E. Bugnion, S. Devine, and S. A. Herrod. Using the SimOS Machine Simulator to Study Complex Computer Systems. Modeling and Computer Simulation, 7(1):78-103, 1997.
-
(1997)
Modeling and Computer Simulation
, vol.7
, Issue.1
, pp. 78-103
-
-
Rosenblum, M.1
Bugnion, E.2
Devine, S.3
Herrod, S.A.4
-
31
-
-
84976720856
-
The "worm" programs - Early experiments with a distributed computation
-
March
-
J. Shoch and J. Hupp. The "worm" programs - early experiments with a distributed computation. Communications of the ACM, 22(3):172-180, March 1982.
-
(1982)
Communications of the ACM
, vol.22
, Issue.3
, pp. 172-180
-
-
Shoch, J.1
Hupp, J.2
-
36
-
-
0013137344
-
Stratego: A Language for Program Transformation Based on Rewriting Strategies
-
E. Visser. Stratego: A Language for Program Transformation Based on Rewriting Strategies. Lecture Notes in Computer Science, 2051, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2051
-
-
Visser, E.1
|