-
3
-
-
44249126961
-
SANE: A Protection Architecture for Enterprise Networks
-
July
-
M. Casado, T. Garfinkel, A. Akella, M. J. Freedman, D. Boneh, N. McKeown, and S. Shenker. SANE: A Protection Architecture for Enterprise Networks. In Proceedings of the 15th USENIX Security Symposium, July 2006.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M. J.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
6
-
-
85084160792
-
Understanding Data Lifetime via Whole System Simulation
-
August
-
J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proceedings of the 13th USENIX Security Symposium, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Chow, J.1
Pfaff, B.2
Garfinkel, T.3
Christopher, K.4
Rosenblum, M.5
-
7
-
-
33845391802
-
Vigilante: End-to-End Containment of Internet Worms
-
October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP), October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
9
-
-
0004035649
-
The TLS protocol
-
Internet RFC 2246, January
-
T. Dierks. The TLS protocol. Internet RFC 2246, January 1999.
-
(1999)
-
-
Dierks, T.1
-
10
-
-
84885664275
-
Labels and Event Processes in the Asbestos Operating System
-
October
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Maziéres, F. Kaashoek, and R. Morris. Labels and Event Processes in the Asbestos Operating System. In Proceedings of the Twentieth ACM Symposium on Operating Systems Principles, October 2005.
-
(2005)
Proceedings of the Twentieth ACM Symposium on Operating Systems Principles
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Maziéres, D.7
Kaashoek, F.8
Morris, R.9
-
13
-
-
34748845128
-
Practical Taint-based Protection using Demand Emulation
-
April
-
A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical Taint-based Protection using Demand Emulation. In Proceedings of the First EuroSys Conference, April 2006.
-
(2006)
Proceedings of the First EuroSys Conference
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
15
-
-
85094326789
-
ChoicePoint Fined $15m Over Data Security Breach
-
January 27
-
J. Leyden. ChoicePoint Fined $15m Over Data Security Breach. The Register, January 27, 2006.
-
(2006)
The Register
-
-
Leyden, J.1
-
16
-
-
85094325969
-
HK Police Complaints Data Leak Puts City on Edge
-
March 28
-
J. Leyden. HK Police Complaints Data Leak Puts City on Edge. The Register, March 28, 2006.
-
(2006)
The Register
-
-
Leyden, J.1
-
20
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
February
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
22
-
-
84885898913
-
Miami University Warns Students of Privacy Breach
-
September 16
-
A. Press. Miami University Warns Students of Privacy Breach. Akron Beacon Journal, September 16, 2005.
-
(2005)
Akron Beacon Journal
-
-
Press, A.1
-
23
-
-
84906487819
-
Enhancing Server Availability and Security Through Failure-Oblivious Computing
-
December
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI), December 2004.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D. M.4
Leu, T.5
Beebee, W. S.6
-
24
-
-
0037251378
-
Language-based Information-flow Security. Selected Areas in Communications
-
January
-
A. Sabelfeld and A. C. Myers. Language-based Information-flow Security. Selected Areas in Communications, IEEE Journal on, 21(1), January 2003.
-
(2003)
IEEE Journal on
, vol.21
, Issue.1
-
-
Sabelfeld, A.1
Myers, A. C.2
-
25
-
-
33748870010
-
InfoShield: A Security Architecture for Protecting Information Usage in Memory
-
February
-
W. Shi, J. B. Fryman, G. Gu, H. H. S. Lee, Y. Zhang, and J. Yang. InfoShield: A Security Architecture for Protecting Information Usage in Memory. In Proceedings of the 12th International Symposium on High-Performance Computer Architecture (HPCA), February 2006.
-
(2006)
Proceedings of the 12th International Symposium on High-Performance Computer Architecture (HPCA)
-
-
Shi, W.1
Fryman, J. B.2
Gu, G.3
Lee, H. H. S.4
Zhang, Y.5
Yang, J.6
-
27
-
-
0036652569
-
Pentium 4 Performance Monitoring Features
-
July-August
-
B. Sprunt. Pentium 4 Performance Monitoring Features. IEEE Micro, July-August 2002.
-
(2002)
IEEE Micro
-
-
Sprunt, B.1
-
29
-
-
21644475650
-
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
-
December
-
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In Proceedings of the 37th Annual IEEE/ACM International Symposium on Microarchitecture (Micro), December 2004.
-
(2004)
Proceedings of the 37th Annual IEEE/ACM International Symposium on Microarchitecture (Micro)
-
-
Vachharajani, N.1
Bridges, M. J.2
Chang, J.3
Rangan, R.4
Ottoni, G.5
Blome, J. A.6
Reis, G. A.7
Vachharajani, M.8
August, D. I.9
-
31
-
-
55349129769
-
-
Technical Report CS-2006-7, Computer Science Department, Duke University, April
-
A. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping Applications from Spilling the Beans. Technical Report CS-2006-7, Computer Science Department, Duke University, April 2006.
-
(2006)
TightLip: Keeping Applications from Spilling the Beans
-
-
Yumerefendi, A.1
Mickle, B.2
Cox, L. P.3
-
32
-
-
0036036793
-
Untrusted Hosts and Confidentiality: Secure Program Partitioning
-
Banff, Canada, October
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted Hosts and Confidentiality: Secure Program Partitioning. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), Banff, Canada, October 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP)
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A. C.4
|