-
1
-
-
0003400251
-
-
Technical Report MTR-2547,. MITRE Corp., Bedford, MA
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Bell, D.E.1
LaPadula, L.J.2
-
2
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
August
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In USENIX Security Symposium, August 2003.
-
(2003)
USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
3
-
-
84962259930
-
Building survivable systems: An integrated approach based on intrusion detection and damage containment
-
T. Bowen, D. Chee, M. Segal, R. Sekar, T. Shanbhag, and P. Uppuluri. Building survivable systems: An integrated approach based on intrusion detection and damage containment. In DIS-CEX, 2000.
-
(2000)
DIS-CEX
-
-
Bowen, T.1
Chee, D.2
Segal, M.3
Sekar, R.4
Shanbhag, T.5
Uppuluri, P.6
-
5
-
-
27544498541
-
Defeating memory corruption attacks via pointer taintedness detection
-
S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer. Defeating memory corruption attacks via pointer taintedness detection. In IEEE International Conference on Dependable Systems and Networks (DSN), 2005.
-
(2005)
IEEE International Conference on Dependable Systems and Networks (DSN)
-
-
Chen, S.1
Xu, J.2
Nakka, N.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
7
-
-
0001853616
-
Automatic detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. Automatic detection and prevention of buffer-overflow attacks. In USENIX Security Symposium, 1998.
-
(1998)
USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Communications of the ACM, 20(7):504–513, July 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
10
-
-
0016382977
-
Memoryless subsystems
-
May
-
J. S. Fenton. Memoryless subsystems. Computing Journal, 17(2):143–147, May 1974.
-
(1974)
Computing Journal
, vol.17
, Issue.2
, pp. 143-147
-
-
Fenton, J.S.1
-
13
-
-
0024089972
-
The confused deputy: (or why capabilities might have been invented)
-
October
-
N. Hardy. The confused deputy: (or why capabilities might have been invented). ACM SIGOPS Operating Systems Review, 22(4):36–38, October 1988.
-
(1988)
ACM SIGOPS Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
14
-
-
19944365247
-
Securing web application code by static analysis and runtime protection
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In International World Wide Web Conference, 2004.
-
(2004)
International World Wide Web Conference
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D.5
Kuo, S.-Y.6
-
17
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
V. B. Livshits and M. S. Lam. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Livshits, V.B.1
Lam, M.S.2
-
18
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
May
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In IEEE Symposium on Security and Privacy, pages 79–93, May 1994.
-
(1994)
IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
22
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS)
-
-
Newsome, J.1
Song, D.2
-
23
-
-
84871349041
-
Automatically hardening web applications using precise tainting
-
A. Nguyen-Tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically hardening web applications using precise tainting. In 20th IFIP International Information Security Conference, 2005.
-
(2005)
20th IFIP International Information Security Conference
-
-
Nguyen-Tuong, A.1
Guarnieri, S.2
Greene, D.3
Shirley, J.4
Evans, D.5
-
28
-
-
12344330740
-
Secure program execution via dynamic information flow tracking
-
Boston, MA, USA
-
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In International Conference on Architectural Support for Programming Languages and Operating Systems, pages 85–96, Boston, MA, USA, 2004.
-
(2004)
International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 85-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
30
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167–187, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
32
-
-
84910681237
-
Static detection of security vulnerabilities in scripting languages
-
Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Xie, Y.1
Aiken, A.2
-
33
-
-
78649462172
-
-
Technical Report SECLAB-05-04, Department of Computer Science, Stony Brook University, May
-
W. Xu, S. Bhatkar, and R. Sekar. Practical dynamic taint analysis for countering input validation attacks on web applications. Technical Report SECLAB-05-04, Department of Computer Science, Stony Brook University, May 2005.
-
(2005)
Practical Dynamic Taint Analysis for Countering Input Validation Attacks on Web Applications
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
|