-
1
-
-
0006100649
-
Smashing the Stack for Fun and Profit
-
November
-
A. One, "Smashing the Stack for Fun and Profit." Phrack 49, Vol. 7, Issue 49, November 1996.
-
(1996)
Phrack 49
, vol.7
, Issue.49
-
-
One, A.1
-
3
-
-
85081874807
-
A First Step towards Automated Detection of Buffer Overrun Vulnerabilities
-
February
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken, "A First Step towards Automated Detection of Buffer Overrun Vulnerabilities," in Network and Distributed System Security Symposium, (San Diego, CA), pp. 3-17, February 2000.
-
(2000)
Network and Distributed System Security Symposium, (San Diego, CA)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
4
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," in 7th USENIX Security Symposium, (San Antonio, TX), January 1998.
-
7th USENIX Security Symposium, (San Antonio, TX), January 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
5
-
-
85084161775
-
FormatGuard: Automatic Protection From printf Format String Vulnerabilities
-
C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, and J. Lokier, "FormatGuard: Automatic Protection From printf Format String Vulnerabilities " in 10th USENIX Security Symposium, (Washington DC), August 2001.
-
10th USENIX Security Symposium, (Washington DC), August 2001
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
Frantzen, M.5
Lokier, J.6
-
6
-
-
84946428448
-
Fortran Story - The Real Scoop
-
ACM Committee on Computers and Public Policy
-
M. Brader, "Fortran Story - The Real Scoop." Forum on Risks to the Public in Computer and Related Systems, Vol. 9 #54, ACM Committee on Computers and Public Policy, 1989.
-
(1989)
Forum on Risks to the Public in Computer and Related Systems
, vol.9
, Issue.54
-
-
Brader, M.1
-
8
-
-
84944220091
-
Towards development of secure systems using UML
-
Fundamental Approaches to Software Engineering (FASEiETAPS, International Conference) (H. HutJmann, ed.), Springer
-
J. Jfurjens, "Towards development of secure systems using UML," in Fundamental Approaches to Software Engineering (FASEiETAPS, International Conference) (H. HutJmann, ed.), LNCS, Springer, 2001.
-
(2001)
LNCS
-
-
Jfurjens, J.1
-
9
-
-
35248828504
-
Aspect-oriented programming
-
Berlin, Heidelberg, and New York: Springer-Verlag
-
G. Kiczales. J. Lamping, A. Menhdhekar, C. Maeda, C. Lopes, J.-M. Loingtier, and J. Irwin, "Aspect-oriented programming," in Proceedings European Conference on Object-Oriented Programming, vol. 1241, pp. 220-242, Berlin, Heidelberg, and New York: Springer-Verlag, 1997.
-
(1997)
Proceedings European Conference on Object-Oriented Programming
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Menhdhekar, A.3
Maeda, C.4
Lopes, C.5
Loingtier, J.-M.6
Irwin, J.7
-
12
-
-
0011221302
-
On the expressive power of programming languages
-
(N. Jones, ed.), New York, N.Y.: Springer-Verlag
-
M. Felleisen, "On the expressive power of programming languages," in ESOP '90 3rd European Symposium on Programming, Copenhagen, Denmark (N. Jones, ed.), vol. 432, pp. 134-151, New York, N.Y.: Springer-Verlag, 1990.
-
(1990)
ESOP '90 3rd European Symposium on Programming, Copenhagen, Denmark
, vol.432
, pp. 134-151
-
-
Felleisen, M.1
-
13
-
-
0034298274
-
An empirical comparison of seven programming languages
-
L. Prechelt, "An empirical comparison of seven programming languages," Computer, vol. 33, no. 10, pp. 23-29, 2000.
-
(2000)
Computer
, vol.33
, Issue.10
, pp. 23-29
-
-
Prechelt, L.1
-
15
-
-
84956989228
-
A type-based approach to program security
-
D. M. Volpano and G. Smith, "A type-based approach to program security," in TAPSOFT, pp. 607-621, 1997.
-
(1997)
TAPSOFT
, pp. 607-621
-
-
Volpano, D.M.1
Smith, G.2
-
16
-
-
0012889295
-
A language-based approach to security
-
F. B. Schneider, G. Morrisett, and R. Harper, "A language-based approach to security," Lecture Notes in Computer Science, vol. 2000, pp. 86-??, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2000
, pp. 86
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
17
-
-
0015960104
-
The string-to-string correction problem
-
R. Wagner and M. Fischer, "The string-to-string correction problem," Journal of the ACM (JACM), vol. 21, no. 1, pp. 168-173, 1974.
-
(1974)
Journal of the ACM (JACM)
, vol.21
, Issue.1
, pp. 168-173
-
-
Wagner, R.1
Fischer, M.2
-
19
-
-
0032075067
-
Learning string-edit distance
-
E. S. Ristad and P. N. Yianilos, "Learning string-edit distance," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 5, pp. 522-532, 1998.
-
(1998)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.5
, pp. 522-532
-
-
Ristad, E.S.1
Yianilos, P.N.2
-
20
-
-
84976767774
-
Syntax-directed least-errors analysis for context-free languages: A practical approach
-
G. Lyon, "Syntax-directed least-errors analysis for context-free languages: a practical approach," Communications of the ACM, vol. 17, no. 1, pp. 3-14, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.1
, pp. 3-14
-
-
Lyon, G.1
-
21
-
-
0016578292
-
Practical syntactic error recovery
-
November
-
S. Graham and S. Rhodes, "Practical syntactic error recovery," Communications of the ACM, vol. 18, pp. 639-650, November 1975.
-
(1975)
Communications of the ACM
, vol.18
, pp. 639-650
-
-
Graham, S.1
Rhodes, S.2
-
23
-
-
0034835461
-
A new type system for secure information flow
-
IEEE Computer Society Press, Jun
-
G. Smith, "A new type system for secure information flow," in CSFW14, IEEE Computer Society Press, Jun 2001.
-
(2001)
CSFW14
-
-
Smith, G.1
|