-
5
-
-
33646767376
-
Control-flow Integrity: Principles, implementations, and applications
-
Nov
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. Control-flow Integrity: Principles, implementations, and applications. In ACM CCS (Nov. 2005).
-
(2005)
ACM CCS
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
6
-
-
33750410092
-
A theory of secure control flow
-
July
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. A theory of secure control flow. In ICFEM (July 2005).
-
(2005)
ICFEM
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
7
-
-
0004072686
-
-
Addison Wesley
-
AHO, A. V., SETHI, R., AND ULLMAN, J. D. Compilers: Principles, Techniques and Tools. Addison Wesley, 1986.
-
(1986)
Compilers: Principles, Techniques and Tools
-
-
Aho, A.V.1
Sethi, R.2
Ullman, J.D.3
-
8
-
-
78649430843
-
Data dependence analysis of assembly code
-
Oct
-
AMME, W., BRAUN, P., ZEHENDNER, E., AND THOMASSET, F. Data dependence analysis of assembly code. In PACT (Oct. 1998).
-
(1998)
PACT
-
-
Amme, W.1
Braun, P.2
Zehendner, E.3
Thomasset, F.4
-
12
-
-
33244470892
-
Improving software security with a C pointer analysis
-
May
-
AVOTS, D., DALTON, M., LIVSHITS, V. B., AND LAM, M. S. Improving software security with a C pointer analysis. In ICSE (May 2005).
-
(2005)
ICSE
-
-
Avots, D.1
Dalton, M.2
Livshits, V.B.3
Lam, M.S.4
-
13
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
July
-
CHEN, S., XU, J., NAKKA, N., KALBARCZYK, Z., AND IYER, R. K. Defeating memory corruption attacks via pointer taintedness detection. In DSN (July 2005).
-
(2005)
DSN
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
14
-
-
85062418620
-
Non-control-data attacks are realistic threats
-
July
-
CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-control-data attacks are realistic threats. In USENIX Security Symposium (July 2005).
-
(2005)
USENIX Security Symposium
-
-
Chen, S.1
Xu, J.2
Sezer, E.C.3
Gauriar, P.4
Iyer, R.K.5
-
15
-
-
33646042112
-
Can we contain Internet worms?
-
Nov
-
COSTA, M., CROWCROFT, J., CASTRO, M., AND ROWSTRON, A. Can we contain Internet worms? In HotNets (Nov. 2004).
-
(2004)
HotNets
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
-
16
-
-
84885679117
-
Vigilante: End-to-end containment of Internet worms
-
Oct
-
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: End-to-end containment of Internet worms. In SOSP (Oct. 2005).
-
(2005)
SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
17
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
Aug
-
COWAN, C., BEATTIE, S., JOHANSEN, J., AND WAGLE, P. Pointguard: Protecting pointers from buffer overflow vulnerabilities. In USENIX Security Symposium (Aug. 2003).
-
(2003)
USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
18
-
-
85084160243
-
StackGuard: Automatic detection and prevention of buffer-overrun attacks
-
Jan
-
COWAN, C., PU, C., MAIER, D., HINTON, H., WADPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. Stackguard: Automatic detection and prevention of buffer-overrun attacks. In USENIX Security Symposium (Jan. 1998).
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Wadpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
19
-
-
21644482450
-
Minos: Control data attack prevention orthogonal to memory model
-
Dec
-
CRANDALL, J. R., AND CHONG, F. T. Minos: Control data attack prevention orthogonal to memory model. In MICRO-37 (Dec. 2004).
-
(2004)
MICRO-37
-
-
Crandall, J.R.1
Chong, F.T.2
-
20
-
-
0031648445
-
Alias analysis of executable code
-
Jan
-
DEBRAY, S. K., MUTH, R., AND WEIPPERT, M. Alias analysis of executable code. In POPL (Jan. 1998).
-
(1998)
POPL
-
-
Debray, S.K.1
Muth, R.2
Weippert, M.3
-
21
-
-
0034832870
-
Ultra-fast Aliasing Analysis using CLA: A million lines of C code in a second
-
June
-
HEINTZE, N., AND TARDIEU, O. Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second. In PLDI (June 2001).
-
(2001)
PLDI
-
-
Heintze, N.1
Tardieu, O.2
-
22
-
-
34748845128
-
Practical taint-based protection using demand emulation
-
Apr
-
HO, A., FETTERMAN, M., CLARK, C., WARFIELD, A., AND HAND, S. Practical taint-based protection using demand emulation. In EuroSys (Apr. 2006).
-
(2006)
EuroSys
-
-
Ho, A.1
Fetterman, M.2
Clark, C.3
Warfield, A.4
Hand, S.5
-
23
-
-
85076735834
-
-
I B M. Purify. http://www-306.ibm.com/software/awdtools/ purify.
-
-
-
Purify, I.B.M.1
-
24
-
-
85084164164
-
Cyclone: A safe dialect of C
-
June
-
JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference (June 2002).
-
(2002)
USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
26
-
-
17644371841
-
BCC: Run–time checking for C programs
-
June
-
KENDALL, S. Bcc: run–time checking for C programs. In USENIX Summer Conference (June 1983).
-
(1983)
USENIX Summer Conference
-
-
Kendall, S.1
-
29
-
-
84869297317
-
-
M I C RO S O F T. Phoenix compiler framework. http://research.microsoft.com/phoenix/phoenixrdk.aspx.
-
Phoenix Compiler Framework
-
-
-
30
-
-
33646032658
-
Ccured: Type-safe retrofitting of legacy software
-
May
-
NECULA, G., CONDIT, J., HARREN, M., MCPEAK, S., AND WEIMER, W. CCured: Type-Safe Retrofitting of Legacy Software. ACM Transactions on Programming Languages and Systems 27, 3 (May 2005).
-
(2005)
ACM Transactions on Programming Languages and Systems
, vol.27
, pp. 3
-
-
Necula, G.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
31
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software
-
Feb
-
NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis and signature generation of exploits on commodity software. In NDSS (Feb. 2005).
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.2
-
32
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov
-
ONE, A. Smashing the stack for fun and profit. Phrack 7, 49 (Nov. 1996).
-
(1996)
Phrack
, vol.7
, pp. 49
-
-
One, A.1
-
33
-
-
33750325871
-
Argos: An emulator for fingerprinting zero-day attacks
-
Apr
-
PORTOKALIDIS, G., SLOWINSKA, A., AND BOS, H. Argos: an emulator for fingerprinting zero-day attacks. In EuroSys (Apr. 2006).
-
(2006)
EuroSys
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
34
-
-
77954504457
-
A practical dynamic buffer overflow detector
-
Feb
-
RUWASE, O., AND LAM, M. A practical dynamic buffer overflow detector. In NDSS (Feb. 2004).
-
(2004)
NDSS
-
-
Ruwase, O.1
Lam, M.2
-
35
-
-
85180409373
-
Dira: Automatic detection, identification, and repair of control-hijacking attacks
-
Feb
-
SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification, and repair of control-hijacking attacks. In NDSS (Feb. 2005).
-
(2005)
NDSS
-
-
Smirnov, A.1
Chiueh, T.2
-
36
-
-
0026845567
-
Adding run-time checking to the portable C compiler
-
Apr
-
STEFFEN, J. L. Adding run-time checking to the portable C compiler. Software - Practice and Experience 22, 4 (Apr. 1992), 305–306.
-
(1992)
Software - Practice and Experience
, vol.22
, Issue.4
, pp. 305-306
-
-
Steffen, J.L.1
-
37
-
-
12844267418
-
Secure program execution via dynamic information flow tracking
-
Oct
-
SUH, G. E., LEE, J., AND DEVADAS, S. Secure program execution via dynamic information flow tracking. In ASPLOS XI (Oct. 2004).
-
(2004)
ASPLOS XI
-
-
Suh, G.E.1
Lee, J.2
Devadas, S.3
-
38
-
-
0002946830
-
A first step towards automated detection of buffer overrun vulnerabilities
-
Feb
-
WAGNER, D., FOSTER, J. S., BREWER, E. A., AND AIKEN, A. A first step towards automated detection of buffer overrun vulnerabilities. In NDSS (Feb. 2000).
-
(2000)
NDSS
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
39
-
-
85105238769
-
Efficient software-based fault isolation
-
Dec
-
WAHBE, R., LUCCO, S., ANDERSON, T. E., AND GRAHAM, S. L. Efficient software-based fault isolation. In SOSP (Dec. 1993).
-
(1993)
SOSP
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
40
-
-
34247546866
-
A comparison of publicly available tools for dynamic buffer overflow prevention
-
Feb
-
WILANDER, J., AND KAMKAR, M. A comparison of publicly available tools for dynamic buffer overflow prevention. In NDSS (Feb. 2003).
-
(2003)
NDSS
-
-
Wilander, J.1
Kamkar, M.2
-
41
-
-
59449105095
-
Using replication and partitioning to build secure distributed systems
-
May
-
ZHENG, L., CHONG, S., MYERS, A. C., AND ZDANCEWIC, S. Using Replication and Partitioning to Build Secure Distributed Systems. In IEEE Symposium on Security and Privacy (May 2003).
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Zheng, L.1
Chong, S.2
Myers, A.C.3
Zdancewic, S.4
|