메뉴 건너뛰기




Volumn , Issue , 2002, Pages

Cyclone: A safe dialect of C

Author keywords

[No Author keywords available]

Indexed keywords

SEMANTICS; STORMS;

EID: 85084164164     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (547)

References (34)
  • 4
    • 85084160891 scopus 로고    scopus 로고
    • Transparent run-time defense against stack-smashing attacks
    • San Diego, California, June
    • Arash Baratloo, Navjot Singh, and Timothy Tsai. Transparent run-time defense against stack-smashing attacks. In USENIX Annual 2000 Technical Conference, San Diego, California, June 2000.
    • (2000) USENIX Annual 2000 Technical Conference
    • Baratloo, A.1    Singh, N.2    Tsai, T.3
  • 5
    • 0033688092 scopus 로고    scopus 로고
    • A static analyzer for finding dynamic programming errors
    • William R. Bush, Jonathan D. Pincus, and David J. Sielaff. A static analyzer for finding dynamic programming errors. Software, Practice, and Experience, 30(7):775–802, 2000.
    • (2000) Software, Practice, and Experience , vol.30 , Issue.7 , pp. 775-802
    • Bush, W.R.1    Pincus, J.D.2    Sielaff, D.J.3
  • 6
    • 0011224227 scopus 로고    scopus 로고
    • CERT. Advisory CA–1996–26, December 18
    • CERT. Denial-of-service attack via ping. Advisory CA–1996–26, December 18, 1996. http://www.cert.org/advisories/CA-1996-26.html.
    • (1996) Denial-of-Service Attack Via Ping
  • 7
    • 85077319070 scopus 로고    scopus 로고
    • CERT. Advisory CA–2002–07, March 12
    • CERT. Double free bug in zlib compression library. Advisory CA–2002–07, March 12, 2002. http://www.cert.org/advisories/CA-2002-07.html.
    • (2002) Double Free Bug in Zlib Compression Library
  • 8
    • 85084161775 scopus 로고    scopus 로고
    • FormatGuard: Automatic protection from printf format string vulnerabilities
    • Washington, D.C., August
    • Crispin Cowan, Matt Barringer, Steve Beattie, and Greg Kroah-Hartman. Formatguard: Automatic protection from printf format string vulnerabilities. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) 10th USENIX Security Symposium
    • Cowan, C.1    Barringer, M.2    Beattie, S.3    Kroah-Hartman, G.4
  • 10
    • 85077311137 scopus 로고    scopus 로고
    • Cyclone. http://www.cs.cornell.edu/projects/cyclone/.
    • Cyclone
  • 15
    • 85077308020 scopus 로고    scopus 로고
    • “gdm” remote hole
    • May 22
    • Chris Evans. “gdm” remote hole. Bugtraq mailing list, May 22, 2000. http://www.securityfocus.com/archive/1/61099.
    • (2000) Bugtraq Mailing List
    • Evans, C.1
  • 16
    • 85077318937 scopus 로고    scopus 로고
    • Very interesting traceroute flaw
    • September 28
    • Chris Evans. Very interesting traceroute flaw. Bugtraq mailing list, September 28, 2000. http://www.securityfocus.com/archive/1/136215.
    • (2000) Bugtraq Mailing List
    • Evans, C.1
  • 18
    • 4444381692 scopus 로고    scopus 로고
    • An empirical study of the robustness of windows NT applications using random testing
    • August
    • Justin E. Forrester and Barton P. Miller. An empirical study of the robustness of Windows NT applications using random testing. In 4th USENIX Windows Systems Symposium, August 2000.
    • (2000) 4th USENIX Windows Systems Symposium
    • Forrester, J.E.1    Miller, B.P.2
  • 19
    • 85084163372 scopus 로고    scopus 로고
    • Stackghost: Hardware facilitated stack protection
    • Washington, D.C., August
    • Mike Frantzen and Mike Shuey. Stackghost: Hardware facilitated stack protection. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) 10th USENIX Security Symposium
    • Frantzen, M.1    Shuey, M.2
  • 23
    • 0034273862 scopus 로고    scopus 로고
    • The exception handling effectiveness of POSIX operating systems
    • September
    • Philip Koopman and John DeVale. The exception handling effectiveness of POSIX operating systems. IEEE Transactions on Software Engineering, 26(9), September 2000.
    • (2000) IEEE Transactions on Software Engineering , vol.26 , Issue.9
    • Koopman, P.1    DeVale, J.2
  • 24
    • 85084164558 scopus 로고    scopus 로고
    • Statically detecting likely buffer overflow vulnerabilities
    • Washington, D.C., August
    • David Larochelle and David Evans. Statically detecting likely buffer overflow vulnerabilities. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) 10th USENIX Security Symposium
    • Larochelle, D.1    Evans, D.2
  • 25
    • 85077340547 scopus 로고    scopus 로고
    • Bugtraq mailing list, November 19
    • Elias Levy. Re: rpc.ttdbserverd on solaris 7. Bugtraq mailing list, November 19, 1999. http://www.securityfocus.com/archive/1/35480.
    • (1999) Re: Rpc.Ttdbserverd on Solaris 7
    • Levy, E.1
  • 27
    • 85077327741 scopus 로고    scopus 로고
    • MediaNet. http://www.cs.cornell.edu/people/mhicks/medianet.htm.
    • MediaNet
  • 28
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • December
    • Barton P. Miller, Lars Fredriksen, and Bryan So. An empirical study of the reliability of Unix utilities. Communications of the ACM, 33(12):32–44, December 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 32
    • 85084164620 scopus 로고    scopus 로고
    • Detecting format string vulnerabilities with type qualifiers
    • Washington, D.C., August
    • Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, and David Wagner. Detecting format string vulnerabilities with type qualifiers. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) 10th USENIX Security Symposium
    • Shankar, U.1    Talwar, K.2    Foster, J.S.3    Wagner, D.4
  • 33
    • 85077340914 scopus 로고    scopus 로고
    • Inside risks: The perils of port 80
    • October
    • Stephan Somogyi and Bruce Schneier. Inside risks: The perils of port 80. Communications of the ACM, 44(10), October 2001.
    • (2001) Communications of the ACM , vol.44 , Issue.10
    • Somogyi, S.1    Schneier, B.2
  • 34
    • 85077343618 scopus 로고    scopus 로고
    • Wu-Ftpd remote format string stack overwrite vulnerability
    • tf8. June 22
    • “tf8”. Wu-Ftpd remote format string stack overwrite vulnerability. Bugtraq vulnerability 1387, June 22, 2000. http://www.securityfocus.com/bid/1387.
    • (2000) Bugtraq Vulnerability 1387


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.