-
1
-
-
72449145808
-
Control flow integrity: Principles, implementations and applications
-
M. Abadi, M. Budiu, U. Erlingsson and J. Ligatti, Control flow integrity: Principles, implementations and applications, ACM Transactions on Information and System Security, vol. 13(1), pp. 4:1–40, 2009.
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
, pp. 1-40
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
78751512625
-
VM-based security overkill: A lament for applied systems security research
-
S. Bratus, M. Locasto, A. Ramaswamy and S. Smith, VM-based security overkill: A lament for applied systems security research, Proceedings of the New Security Paradigms Workshop, pp. 51–60, 2010.
-
(2010)
Proceedings of the New Security Paradigms Workshop
, pp. 51-60
-
-
Bratus, S.1
Locasto, M.2
Ramaswamy, A.3
Smith, S.4
-
4
-
-
84958826466
-
-
W32.Stuxnet Dossier, Symantec, Mountain View, California
-
N. Falliere, L. O’Murchu and E. Chien, W32.Stuxnet Dossier, Symantec, Mountain View, California (www.symantec.com/content/en/us/enterprise/media/security response/whitepapers/w32stuxnetdossier.pdf), 2011.
-
(2011)
-
-
Falliere, N.1
O’Murchu, L.2
Chien, E.3
-
5
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. Hofmeyr, A. Somayaji and T. Longstaff, A sense of self for Unix processes, Proceedings of the IEEE Symposium on Security and Privacy, pp. 120–128, 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
7
-
-
84958826467
-
-
Institute of Electrical and Electronics Engineers, IEEE 1646-2004 Standard: Communication Delivery Time Performance Requirements for Electric Power Substation Automation, Piscataway, New Jersey
-
Institute of Electrical and Electronics Engineers, IEEE 1646-2004 Standard: Communication Delivery Time Performance Requirements for Electric Power Substation Automation, Piscataway, New Jersey, 2004.
-
(2004)
-
-
-
9
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. Comparetti, C. Kruegel, E. Kirda, X. Zhou and X. Wang, Effective and efficient malware detection at the end host, Proceedings of the Eighteenth USENIX Security Symposium, pp. 351–366, 2009.
-
(2009)
Proceedings of the Eighteenth USENIX Security Symposium
, pp. 351-366
-
-
Kolbitsch, C.1
Comparetti, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
14
-
-
38149080457
-
Probing the guts of Kprobes
-
A. Mavinakayanahalli, P. Panchamukhi, J. Keniston, A. Keshavamurthy and M. Hiramatsu, Probing the guts of Kprobes, Proceedings of the Linux Symposium, vol. 2, pp. 109–124, 2006.
-
(2006)
Proceedings of the Linux Symposium
, vol.2
, pp. 109-124
-
-
Mavinakayanahalli, A.1
Panchamukhi, P.2
Keniston, J.3
Keshavamurthy, A.4
Hiramatsu, M.5
-
16
-
-
84958826468
-
-
Exploiting gresecurity/PaX with Dan Rosenberg and Jon Oberheide, May 18
-
T. Mittner, Exploiting gresecurity/PaX with Dan Rosenberg and Jon Oberheide (resources.infosecinstitute.com/exploiting-gresecuritypax), May 18, 2011.
-
(2011)
-
-
Mittner, T.1
-
17
-
-
84958826469
-
-
NX (No eXecute) support for x86, 2.6.7-rc2-bk2, Linux Kernel Mailing List, June 2
-
I. Molnar, NX (No eXecute) support for x86, 2.6.7-rc2-bk2, Linux Kernel Mailing List (lkml.org/lkml/2004/6/2/228), June 2, 2004.
-
(2004)
-
-
Molnar, I.1
-
18
-
-
84969338763
-
-
Motorola Solutions, ACE3600 Specifications Sheet, Schaumburg, Illinois (www.motorola.com/web/Business/Products/SCADA%20Products/ACE3600/%5FDocuments/Static%20Files/ACE3600%20Specifications%20Sheet.pdf?pLibItem=1), 2009.
-
(2009)
ACE3600 Specifications Sheet, Schaumburg, Illinois
-
-
-
19
-
-
84958826471
-
-
Openwall, Linux kernel patch from the Openwall Project
-
Openwall, Linux kernel patch from the Openwall Project (www.openwall.com/linux).
-
-
-
-
20
-
-
84958826472
-
-
PaX Team, Homepage
-
PaX Team, Homepage (pax.grsecurity.net).
-
-
-
-
21
-
-
50249101677
-
Lares: An architecture for secure active monitoring using virtualization
-
B. Payne, M. Carbone, M. Sharif and W. Lee, Lares: An architecture for secure active monitoring using virtualization, Proceedings of the IEEE Symposium on Security and Privacy, pp. 233–247, 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 233-247
-
-
Payne, B.1
Carbone, M.2
Sharif, M.3
Lee, W.4
-
22
-
-
85084162914
-
Copilot – A coprocessorbased kernel runtime integrity monitor
-
N. Petroni, T. Fraser, J. Molina and W. Arbaugh, Copilot – A coprocessorbased kernel runtime integrity monitor, Proceedings of the Thirteenth USENIX Security Symposium, pp. 179–194, 2004.
-
(2004)
Proceedings of the Thirteenth USENIX Security Symposium
, pp. 179-194
-
-
Petroni, N.1
Fraser, T.2
Molina, J.3
Arbaugh, W.4
-
24
-
-
84958826473
-
-
Phrack, no. 50, April 9
-
phrack.org, Phrack, no. 50 (www.phrack.org/issues.html?issue=50), April 9, 2007.
-
(2007)
-
-
-
25
-
-
84958826474
-
-
pragmatic/THC, (Nearly) complete Linux loadable kernel modules
-
pragmatic/THC, (Nearly) complete Linux loadable kernel modules (dl.pac ketstormsecurity.net/docs/hack/LKM HACKING.html), 1999.
-
(1999)
-
-
-
26
-
-
34547423144
-
Locating system problems using dynamic instrumentation
-
V. Prasad, W. Cohen, F. Eigler, M. Hunt, J. Keniston and B. Chen, Locating system problems using dynamic instrumentation, Proceedings of the Linux Symposium, pp. 49–64, 2005.
-
(2005)
Proceedings of the Linux Symposium
, pp. 49-64
-
-
Prasad, V.1
Cohen, W.2
Eigler, F.3
Hunt, M.4
Keniston, J.5
Chen, B.6
-
28
-
-
78751540942
-
-
Department of Computer Science, Dartmouth College, Hanover, New Hampshire
-
A. Ramaswamy, Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing, Master’s Thesis, Department of Computer Science, Dartmouth College, Hanover, New Hampshire, 2009.
-
(2009)
Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing, Master’s Thesis
-
-
Ramaswamy, A.1
-
30
-
-
84958826475
-
-
Schweitzer Engineering Laboratories, Home, Pullman, Washington
-
Schweitzer Engineering Laboratories, Home, Pullman, Washington (www.selinc.com).
-
-
-
-
31
-
-
84958826476
-
-
Schweitzer Engineering Laboratories, SEL-3354 Embedded Automation Computing Platform Data Sheet, Pullman, Washington
-
Schweitzer Engineering Laboratories, SEL-3354 Embedded Automation Computing Platform Data Sheet, Pullman, Washington (www.selinc.com/WorkArea/DownloadAsset.aspx?id=6196), 2011.
-
(2011)
-
-
-
32
-
-
84869398221
-
-
Technical Report, Center for Embedded Network Sensing, University of California at Los Angeles, Los Angeles, California
-
D. Singh and W. Kaiser, The Atom LEAP Platform for Energy-Efficient Embedded Computing, Technical Report, Center for Embedded Network Sensing, University of California at Los Angeles, Los Angeles, California, 2010.
-
(2010)
The Atom LEAP Platform for Energy-Efficient Embedded Computing
-
-
Singh, D.1
Kaiser, W.2
-
33
-
-
84958826477
-
-
Tools and Projects
-
s0ftpr0ject Team, Tools and Projects (www.s0ftpj.org/en/tools.html).
-
-
-
-
35
-
-
84958826478
-
-
SourceForge.net, Linux Test Project
-
SourceForge.net, Linux Test Project (ltp.sourceforge.net).
-
-
-
-
36
-
-
84958826479
-
-
Standard Performance Evaluation Corporation, SPEC CPU2000 Benchmark Suite, Gainesville, Florida
-
Standard Performance Evaluation Corporation, SPEC CPU2000 Benchmark Suite, Gainesville, Florida (www.spec.org/cpu2000), 2007.
-
(2007)
-
-
-
37
-
-
84958826480
-
-
udis86 Disassembler Library for x86 and x86-64
-
V. Thampi, udis86 Disassembler Library for x86 and x86-64 (udis86.sf.net), 2009.
-
(2009)
-
-
Thampi, V.1
-
38
-
-
84958826481
-
-
Transmission and Distribution World, About 212 million “smart” electric meters in 2014, says ABI Research, February 3
-
Transmission and Distribution World, About 212 million “smart” electric meters in 2014, says ABI Research (tdworld.com/smart gridautomation/abi-research-smart-meters-0210), February 3, 2010.
-
(2010)
-
-
-
39
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Z. Wang, X. Jiang, W. Cui and P. Ning, Countering kernel rootkits with lightweight hook protection, Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp. 545–554, 2009.
-
(2009)
Proceedings of the Sixteenth ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
|