-
2
-
-
0006100649
-
Smashing the stack for fun and profit
-
Nov
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(7), Nov. 1996.
-
(1996)
Phrack Magazine
, vol.49
, Issue.7
-
-
One, A.1
-
3
-
-
85077585531
-
-
The Apache Software Foundation. http://www.apache.org/
-
-
-
-
6
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
Washington, DC, August
-
S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of 12th USENIX Security Symposium. Washington, DC, August 2003.
-
(2003)
Proceedings of 12th USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.2
Sekar, R.3
-
8
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
Washington, DC, August
-
C. Cowan, M. Barringer, S. Beattie, and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities. In Proceedings of the 10th USENIX Security Symposium, Washington, DC, August 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
9
-
-
85009448253
-
Pointguard: Protecting pointers from buffer overflow vulnerabilities
-
Washington, DC, August
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium. Washington, DC, August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
14
-
-
85084160243
-
Automatic detection and prevention of buffer-overflow attacks
-
San Antonio, TX, January
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Automatic detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
15
-
-
0036931376
-
Modeling and analyzing the security threat of firewall data corruption caused by instruction transient errors
-
Washington DC, June
-
S. Chen, J. Xu, R. K. Iyer, and K. Whisnant. Modeling and analyzing the security threat of firewall data corruption caused by instruction transient errors, In Proceedings of the IEEE International Conf. on Dependable Systems and Networks, Washington DC, June 2002.
-
(2002)
Proceedings of the IEEE International Conf. On Dependable Systems and Networks
-
-
Chen, S.1
Xu, J.2
Iyer, R.K.3
Whisnant, K.4
-
16
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
Jan/Feb
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, Jan/Feb 2002
-
(2002)
IEEE Software
-
-
Evans, D.1
Larochelle, D.2
-
17
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
May
-
H. Feng, J. Giffin, Y. Huang, S. Jha, W. Lee, and B. Miller. Formalizing sensitivity in static analysis for intrusion detection. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, May 2004.
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Giffin, J.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.6
-
24
-
-
85084164164
-
Cyclone: A safe dialect of c
-
Monterey, CA, June
-
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In Proceedings of USENIX Annual Technical Conference. Monterey, CA, June 2002.
-
(2002)
Proceedings of USENIX Annual Technical Conference
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.4
Cheney, J.5
Wang, Y.6
-
30
-
-
67650832220
-
-
Perl Security. http://www.perldoc.com/perl5.6/pod/perlsec.html
-
Perl Security
-
-
-
35
-
-
85180409373
-
Dira: Automatic detection, identification and repair of control-data attacks
-
San Diego, CA, February 3-4
-
A. Smirnov and T. Chiueh. DIRA: Automatic detection, identification and repair of control-data attacks. In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 3-4, 2005.
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium (NDSS)
-
-
Smirnov, A.1
Chiueh, T.2
-
41
-
-
85077517892
-
-
Solar Designer
-
Solar Designer. StackPatch. http://www.openwall.com/linux
-
StackPatch
-
-
-
43
-
-
14844328033
-
On the effectiveness of address space randomization
-
Washington, DC. Oct
-
H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness of address space randomization. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). Washington, DC. Oct. 2004.
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.-J.4
Modadugu, N.5
Boneh, D.6
-
45
-
-
0012781111
-
Undermining an anomaly-based intrusion detection system using common exploits
-
K.M.C. Tan, K.S. Killourhy and R.A. Maxion. Undermining an anomaly-based intrusion detection system using common exploits. RAID, 2002.
-
(2002)
RAID
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
47
-
-
39049102020
-
-
United States Computer Emergency Readiness Team. Technical Cyber Security Alerts, http://www.uscert.gov/cas/techalerts/
-
Technical Cyber Security Alerts
-
-
-
50
-
-
0035789487
-
An experimental study of security vulnerabilities caused by errors
-
Göteborg, Sweden, July 01-04
-
J. Xu, S. Chen, Z. Kalbarczyk, R. K. Iyer, An experimental study of security vulnerabilities caused by errors. In Proceedings of the IEEE International Conf. on Dependable Systems and Networks, Göteborg, Sweden, July 01-04, 2001.
-
(2001)
Proceedings of the IEEE International Conf. On Dependable Systems and Networks
-
-
Xu, J.1
Chen, S.2
Kalbarczyk, Z.3
Iyer, R.K.4
-
51
-
-
27644457078
-
Transparent runtime randomization for security
-
Florence, Italy, October 6-8
-
J. Xu, Z. Kalbarczyk and R. K. Iyer. Transparent Runtime Randomization for Security. In Proceedings of Symposium on Reliable and Distributed Systems (SRDS), Florence, Italy, October 6-8, 2003.
-
(2003)
Proceedings of Symposium on Reliable and Distributed Systems (SRDS)
-
-
Xu, J.1
Kalbarczyk, Z.2
Iyer, R.K.3
|