-
2
-
-
18844368270
-
Automatic predicate abstraction of c programs
-
June
-
Thomas Ball, Rupak Majumdar, Todd Millstein, and Sriram K. Rajamani. Automatic predicate abstraction of C programs. In Proceedings of the ACM Conference on Programming Language Design and Implementation, pages 203–213, June 2001.
-
(2001)
Proceedings of the ACM Conference on Programming Language Design and Implementation
, pp. 203-213
-
-
Ball, T.1
Majumdar, R.2
Millstein, T.3
Rajamani, S.K.4
-
3
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
Springer-Verlag, May
-
Thomas Ball and Sriram K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN 2001, Workshop on Model Checking of Software, volume 2057 of Lecture Notes in Computer Science, pages 103–122. Springer-Verlag, May 2001.
-
(2001)
SPIN 2001, Workshop on Model Checking of Software, Volume 2057 of Lecture Notes in Computer Science
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
4
-
-
85084160891
-
Transparent run-time defense against stack-smashing attacks
-
San Diego, California, June
-
Arash Baratloo, Navjot Singh, and Timothy Tsai. Transparent run-time defense against stack-smashing attacks. In USENIX Annual 2000 Technical Conference, San Diego, California, June 2000.
-
(2000)
USENIX Annual 2000 Technical Conference
-
-
Baratloo, A.1
Singh, N.2
Tsai, T.3
-
5
-
-
0033688092
-
A static analyzer for finding dynamic programming errors
-
William R. Bush, Jonathan D. Pincus, and David J. Sielaff. A static analyzer for finding dynamic programming errors. Software, Practice, and Experience, 30(7):775–802, 2000.
-
(2000)
Software, Practice, and Experience
, vol.30
, Issue.7
, pp. 775-802
-
-
Bush, W.R.1
Pincus, J.D.2
Sielaff, D.J.3
-
6
-
-
0011224227
-
-
CERT. Advisory CA–1996–26, December 18
-
CERT. Denial-of-service attack via ping. Advisory CA–1996–26, December 18, 1996. http://www.cert.org/advisories/CA-1996-26.html.
-
(1996)
Denial-of-Service Attack Via Ping
-
-
-
7
-
-
85077319070
-
-
CERT. Advisory CA–2002–07, March 12
-
CERT. Double free bug in zlib compression library. Advisory CA–2002–07, March 12, 2002. http://www.cert.org/advisories/CA-2002-07.html.
-
(2002)
Double Free Bug in Zlib Compression Library
-
-
-
8
-
-
85084161775
-
FormatGuard: Automatic protection from printf format string vulnerabilities
-
Washington, D.C., August
-
Crispin Cowan, Matt Barringer, Steve Beattie, and Greg Kroah-Hartman. Formatguard: Automatic protection from printf format string vulnerabilities. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Cowan, C.1
Barringer, M.2
Beattie, S.3
Kroah-Hartman, G.4
-
9
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, January
-
Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In 7th USENIX Security Symposium, San Antonio, Texas, January 1998.
-
(1998)
7th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
10
-
-
85077311137
-
-
Cyclone. http://www.cs.cornell.edu/projects/cyclone/.
-
Cyclone
-
-
-
13
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
October
-
Dawson Engler, Benjamin Chelf, Andy Chou, and Seth Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of the Fourth USENIX Symposium on Operating Systems Design and Implementation, October 2000.
-
(2000)
Proceedings of the Fourth USENIX Symposium on Operating Systems Design and Implementation
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
14
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
October
-
Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou, and Benjamin Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proceedings of Eighteenth ACM Symposium on Operating Systems Principles, October 2001.
-
(2001)
Proceedings of Eighteenth ACM Symposium on Operating Systems Principles
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
15
-
-
85077308020
-
“gdm” remote hole
-
May 22
-
Chris Evans. “gdm” remote hole. Bugtraq mailing list, May 22, 2000. http://www.securityfocus.com/archive/1/61099.
-
(2000)
Bugtraq Mailing List
-
-
Evans, C.1
-
16
-
-
85077318937
-
Very interesting traceroute flaw
-
September 28
-
Chris Evans. Very interesting traceroute flaw. Bugtraq mailing list, September 28, 2000. http://www.securityfocus.com/archive/1/136215.
-
(2000)
Bugtraq Mailing List
-
-
Evans, C.1
-
18
-
-
4444381692
-
An empirical study of the robustness of windows NT applications using random testing
-
August
-
Justin E. Forrester and Barton P. Miller. An empirical study of the robustness of Windows NT applications using random testing. In 4th USENIX Windows Systems Symposium, August 2000.
-
(2000)
4th USENIX Windows Systems Symposium
-
-
Forrester, J.E.1
Miller, B.P.2
-
19
-
-
85084163372
-
Stackghost: Hardware facilitated stack protection
-
Washington, D.C., August
-
Mike Frantzen and Mike Shuey. Stackghost: Hardware facilitated stack protection. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Frantzen, M.1
Shuey, M.2
-
20
-
-
84858846329
-
Scalable certification for typed assembly language
-
Montreal, Canada, September Springer-Verlag
-
Dan Grossman and Greg Morrisett. Scalable certification for typed assembly language. In 3rd International Workshop on Types in Compilation, volume 2071 of Lecture Notes in Computer Science, pages 117–145, Montreal, Canada, September 2000. Springer-Verlag.
-
(2000)
3rd International Workshop on Types in Compilation, Volume 2071 of Lecture Notes in Computer Science
, pp. 117-145
-
-
Grossman, D.1
Morrisett, G.2
-
21
-
-
0036040515
-
Region-based memory management in cyclone
-
ACM, June
-
Dan Grossman, Greg Morrisett, Trevor Jim, Michael Hicks, Yanling Wang, and James Cheney. Region-based memory management in Cyclone. In Proceedings of the ACM Conference on Programming Language Design and Implementation. ACM, June 2002.
-
(2002)
Proceedings of the ACM Conference on Programming Language Design and Implementation
-
-
Grossman, D.1
Morrisett, G.2
Jim, T.3
Hicks, M.4
Wang, Y.5
Cheney, J.6
-
23
-
-
0034273862
-
The exception handling effectiveness of POSIX operating systems
-
September
-
Philip Koopman and John DeVale. The exception handling effectiveness of POSIX operating systems. IEEE Transactions on Software Engineering, 26(9), September 2000.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, Issue.9
-
-
Koopman, P.1
DeVale, J.2
-
24
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Washington, D.C., August
-
David Larochelle and David Evans. Statically detecting likely buffer overflow vulnerabilities. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
25
-
-
85077340547
-
-
Bugtraq mailing list, November 19
-
Elias Levy. Re: rpc.ttdbserverd on solaris 7. Bugtraq mailing list, November 19, 1999. http://www.securityfocus.com/archive/1/35480.
-
(1999)
Re: Rpc.Ttdbserverd on Solaris 7
-
-
Levy, E.1
-
27
-
-
85077327741
-
-
MediaNet. http://www.cs.cornell.edu/people/mhicks/medianet.htm.
-
MediaNet
-
-
-
28
-
-
0025557712
-
An empirical study of the reliability of unix utilities
-
December
-
Barton P. Miller, Lars Fredriksen, and Bryan So. An empirical study of the reliability of Unix utilities. Communications of the ACM, 33(12):32–44, December 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.P.1
Fredriksen, L.2
So, B.3
-
30
-
-
0002642312
-
TaLX86: A realistic typed assembly language
-
Atlanta, GA, Published as INRIA Technical Report 0288, March, 1999
-
Greg Morrisett, Karl Crary, Neal Glew, Dan Grossman, Richard Samuels, Frederick Smith, David Walker, Stephanie Weirich, and Steve Zdancewic. TALx86: A realistic typed assembly language. In Second ACM SIGPLAN Workshop on Compiler Support for System Software, pages 25–35, Atlanta, GA, 1999. Published as INRIA Technical Report 0288, March, 1999.
-
(1999)
Second ACM SIGPLAN Workshop on Compiler Support for System Software
, pp. 25-35
-
-
Morrisett, G.1
Crary, K.2
Glew, N.3
Grossman, D.4
Samuels, R.5
Smith, F.6
Walker, D.7
Weirich, S.8
Zdancewic, S.9
-
31
-
-
0036040304
-
Ccured: Type-safe retrofitting of legacy code
-
Portland, OR, January To appear
-
George C. Necula, Scott McPeak, and Westley Weimer. CCured: Type-safe retrofitting of legacy code. In Twenty-Ninth ACM Symposium on Principles of Programming Languages, Portland, OR, January 2002. To appear.
-
(2002)
Twenty-Ninth ACM Symposium on Principles of Programming Languages
-
-
Necula, G.C.1
McPeak, S.2
Weimer, W.3
-
32
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
Washington, D.C., August
-
Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, and David Wagner. Detecting format string vulnerabilities with type qualifiers. In 10th USENIX Security Symposium, Washington, D.C., August 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
33
-
-
85077340914
-
Inside risks: The perils of port 80
-
October
-
Stephan Somogyi and Bruce Schneier. Inside risks: The perils of port 80. Communications of the ACM, 44(10), October 2001.
-
(2001)
Communications of the ACM
, vol.44
, Issue.10
-
-
Somogyi, S.1
Schneier, B.2
-
34
-
-
85077343618
-
Wu-Ftpd remote format string stack overwrite vulnerability
-
tf8. June 22
-
“tf8”. Wu-Ftpd remote format string stack overwrite vulnerability. Bugtraq vulnerability 1387, June 22, 2000. http://www.securityfocus.com/bid/1387.
-
(2000)
Bugtraq Vulnerability 1387
-
-
|