-
1
-
-
84976844361
-
Control flow analysis
-
F. E. Allen. Control flow analysis. ACM Sigplan Notices, 5:1-19, 1970.
-
(1970)
ACM Sigplan Notices
, vol.5
, pp. 1-19
-
-
Allen, F.E.1
-
2
-
-
80955160447
-
That 'Internet of things' thing
-
K. Ashton. That 'Internet of Things' Thing. RFiD Journal, 22:97-114, 2009.
-
(2009)
RFID Journal
, vol.22
, pp. 97-114
-
-
Ashton, K.1
-
3
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito. The Internet of Things: A survey. Computer Networks, 54(15):2787-2805, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
4
-
-
77957599265
-
Proposed security model and threat taxonomy for the internet of things (IoT)
-
Springer
-
S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad. Proposed security model and threat taxonomy for the Internet of Things (IoT). In Recent Trends in Network Security and Applications. Springer, 2010.
-
(2010)
Recent Trends in Network Security and Applications
-
-
Babar, S.1
Mahalle, P.2
Stango, A.3
Prasad, N.4
Prasad, R.5
-
5
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
IEEE
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Symposium on Security and Privacy (S&P). IEEE, 2008.
-
(2008)
Symposium on Security and Privacy (S&P)
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
7
-
-
34547472598
-
MPIPP: An automatic profile-guided parallel process placement toolset for smp clusters and multiclusters
-
ACM
-
H. Chen, W. Chen, J. Huang, B. Robert, and H. Kuhn. MPIPP: An automatic profile-guided parallel process placement toolset for smp clusters and multiclusters. In International Conference on Supercomputing. ACM, 2006.
-
(2006)
International Conference on Supercomputing
-
-
Chen, H.1
Chen, W.2
Huang, J.3
Robert, B.4
Kuhn, H.5
-
9
-
-
78651073393
-
Efficient memory safety for tinyos
-
ACM
-
N. Cooprider, W. Archer, E. Eide, D. Gay, and J. Regehr. Efficient memory safety for tinyos. In Conference on Embedded Networked Sensor Systems (SenSys). ACM, 2007.
-
(2007)
Conference on Embedded Networked Sensor Systems (SenSys)
-
-
Cooprider, N.1
Archer, W.2
Eide, E.3
Gay, D.4
Regehr, J.5
-
10
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
DARPA
-
C. Cowan, F. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Exposition, (DISCEX). DARPA, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition, (DISCEX)
-
-
Cowan, C.1
Wagle, F.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
11
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. Transactions on Programming Languages and Systems, (TOPLAS), 13(4):451-490, 1991.
-
(1991)
Transactions on Programming Languages and Systems, (TOPLAS)
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
12
-
-
77957796156
-
Hardbound: Architectural support for spatial safety of the c programming language
-
J. Devietti, C. Blundell, M. M. Martin, and S. Zdancewic. Hardbound: architectural support for spatial safety of the c programming language. ACM SIGOPS Operating Systems Review, 42(2):103-114, 2008.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.2
, pp. 103-114
-
-
Devietti, J.1
Blundell, C.2
Martin, M.M.3
Zdancewic, S.4
-
16
-
-
70350057475
-
Architectural support for low overhead detection of memory violations
-
IEEE
-
S. Ghose, L. Gilgeous, P. Dudnik, A. Aggarwal, and C. Waxman. Architectural support for low overhead detection of memory violations. In Design, Automation & Test in Europe (DATE). IEEE, 2009.
-
(2009)
Design, Automation & Test in Europe (DATE)
-
-
Ghose, S.1
Gilgeous, L.2
Dudnik, P.3
Aggarwal, A.4
Waxman, C.5
-
17
-
-
83555176391
-
Security challenges in the IP-based internet of things
-
T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and K. Wehrle. Security challenges in the IP-based Internet of Things. Springer Wireless Personal Communications, 61(3):527-542, 2011.
-
(2011)
Springer Wireless Personal Communications
, vol.61
, Issue.3
, pp. 527-542
-
-
Heer, T.1
Garcia-Morchon, O.2
Hummen, R.3
Keoh, S.L.4
Kumar, S.S.5
Wehrle, K.6
-
18
-
-
85014149843
-
Trusted platform module basics: Using TPM in embedded systems
-
S. L. Kinney. Trusted platform module basics: using TPM in embedded systems. Newnes, 2006.
-
(2006)
Newnes
-
-
Kinney, S.L.1
-
19
-
-
83455223535
-
Poster: Securing the internet of things with DTLS
-
ACM
-
T. Kothmayr, W. Hu, C. Schmitt, M. Bruenig, and G. Carle. Poster: Securing the internet of things with DTLS. In Conference on Embedded Networked Sensor Systems, (SenSys). ACM, 2011.
-
(2011)
Conference on Embedded Networked Sensor Systems, (SenSys)
-
-
Kothmayr, T.1
Hu, W.2
Schmitt, C.3
Bruenig, M.4
Carle, G.5
-
22
-
-
84864839734
-
Watchdog: Hardware for safe and secure manual memory management and full memory safety
-
S. Nagarakatte, M. M. Martin, and S. Zdancewic. Watchdog: Hardware for safe and secure manual memory management and full memory safety. Computer Architecture News, 40(3):189-200, 2012.
-
(2012)
Computer Architecture News
, vol.40
, Issue.3
, pp. 189-200
-
-
Nagarakatte, S.1
Martin, M.M.2
Zdancewic, S.3
-
26
-
-
53149126145
-
Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
IEEE
-
L. Oliveira, M. Scott, J. Lopez, and R. Dahab. Tinypbc: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. In International Conference on Networked Sensing Systems, (INSS)., pages 173-180. IEEE, 2008.
-
(2008)
International Conference on Networked Sensing Systems, (INSS)
, pp. 173-180
-
-
Oliveira, L.1
Scott, M.2
Lopez, J.3
Dahab, R.4
-
27
-
-
84963624364
-
The program dependence web: A representation supporting control-, data-, and demand-driven interpretation of imperative languages
-
ACM
-
K. J. Ottenstein, R. A. Ballance, and A. B. MacCabe. The program dependence web: a representation supporting control-, data-, and demand-driven interpretation of imperative languages. In Conference on Programming Language Design and Implementation, (PLDI). ACM, 1990.
-
(1990)
Conference on Programming Language Design and Implementation, (PLDI)
-
-
Ottenstein, K.J.1
Ballance, R.A.2
MacCabe, A.B.3
-
30
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Also in MobiCom'01
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, 2002. Also in MobiCom'01.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
31
-
-
55849125865
-
Detecting patterns in mpi communication traces
-
ICPP
-
R. Preissl, T. Köckerbauer, M. Schulz, D. Kranzlmüller, B. R. d. Supinski, and D. J. Quinlan. Detecting patterns in mpi communication traces. In International Conference on Parallel Processing (ICPP). ICPP, 2008.
-
(2008)
International Conference on Parallel Processing (ICPP)
-
-
Preissl, R.1
Köckerbauer, T.2
Schulz, M.3
Kranzlmüller, D.4
Supinski, B.R.D.5
Quinlan, D.J.6
-
33
-
-
77954523986
-
Kleenet: Discovering insidious interaction bugs in wireless sensor networks before deployment
-
ACM
-
R. Sasnauskas, O. Landsiedel, M. H. Alizai, C. Weise, S. Kowalewski, and K. Wehrle. Kleenet: discovering insidious interaction bugs in wireless sensor networks before deployment. In International Conference on Information Processing in Sensor Networks (IPSN). ACM, 2010.
-
(2010)
International Conference on Information Processing in Sensor Networks (IPSN)
-
-
Sasnauskas, R.1
Landsiedel, O.2
Alizai, M.H.3
Weise, C.4
Kowalewski, S.5
Wehrle, K.6
-
34
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
IEEE
-
E. J. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Symposium on Security and Privacy (S&P). IEEE, 2010.
-
(2010)
Symposium on Security and Privacy (S&P)
-
-
Schwartz, E.J.1
Avgerinos, T.2
Brumley, D.3
-
37
-
-
81455159309
-
F4F: Taint analysis of framework-based web applications
-
ACM
-
M. Sridharan, S. Artzi, M. Pistoia, S. Guarnieri, O. Tripp, and R. Berg. F4F: taint analysis of framework-based web applications. In Conference on Object-Oriented Programming (OOPSLA). ACM, 2011.
-
(2011)
Conference on Object-Oriented Programming (OOPSLA)
-
-
Sridharan, M.1
Artzi, S.2
Pistoia, M.3
Guarnieri, S.4
Tripp, O.5
Berg, R.6
-
38
-
-
70450242742
-
TAJ: Effective taint analysis of web applications
-
ACM
-
O. Tripp, M. Pistoia, S. J. Fink, M. Sridharan, and O. Weisman. TAJ: Effective taint analysis of web applications. In Conference on Programming Language Design and Implementation (PLDI). ACM, 2009.
-
(2009)
Conference on Programming Language Design and Implementation (PLDI)
-
-
Tripp, O.1
Pistoia, M.2
Fink, S.J.3
Sridharan, M.4
Weisman, O.5
|