-
2
-
-
85101086840
-
Basic Architecture volume 1 of Intel Architecture Software Developer?s Manual
-
Basic Architecture, volume 1 of Intel Architecture Software Developer?s Manual. Intel Corporation, 1997.
-
(1997)
Intel Corporation
-
-
-
3
-
-
0006100649
-
Smashing the stack for fun and profit
-
November
-
Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 7(49), November 1996.
-
(1996)
Phrack Magazine
, vol.7
, pp. 49
-
-
One, A.1
-
6
-
-
79961204066
-
FFPF: Fairly Fast Packet Filters
-
San Francisco, CA December
-
H. Bos, W. de Bruijn, M. Cristea, T. Nguyen, and G. Portokalidis. FFPF: Fairly Fast Packet Filters. In Proceedings of OSDI?04, San Francisco, CA, December 2004.
-
(2004)
Proceedings of OSDI?04
-
-
Bos, H.1
De Bruijn, W.2
Cristea, M.3
Nguyen, T.4
Portokalidis, G.5
-
7
-
-
17644393012
-
Bypassing Stackguard and Stackshield
-
January
-
Bulba Kir. Bypassing Stackguard and Stackshield. Phrack Magazine, 10(56), January 2000.
-
(2000)
Phrack Magazine
, vol.10
, pp. 56
-
-
Kir, B.1
-
8
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. of the 7th USENIX Security Symposium, 1998.
-
(1998)
Proc. Of the 7th Usenix Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
14
-
-
78249251033
-
Protocol-independent adaptive replay of application dialog
-
San Diego, CA February
-
W. Cui, V. Paxson, N. Weaver, and R. Katz. Protocol-independent adaptive replay of application dialog. In The 13th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2006.
-
(2006)
The 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.4
-
15
-
-
51849147443
-
HoneyStat: Local worm detection using honeypots
-
D. Dagonand, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine and Henry Owen. HoneyStat: Local worm detection using honeypots. In In Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), 2004.
-
(2004)
Proc. Of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID
-
-
Dagonand, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
16
-
-
18744376889
-
Randomized instruction set emulation to disrupt code injection attacks
-
October
-
E. G. Barrantes, D.H. Ackley, S. Forrest, T. S. Palmer, D. Stefanovix and D.D. Zovi. Randomized instruction set emulation to disrupt code injection attacks. In In Proc. of the 10th ACM Conference on Computer and Communications Security (CCS), pages 281-289, October 2003.
-
(2003)
Proc. Of the 10th Acm Conference on Computer and Communications Security (CCS
, pp. 281-289
-
-
Barrantes, E.G.1
Ackley, D.H.2
Forrest, S.3
Palmer, T.S.4
Stefanovix, D.5
Zovi, D.D.6
-
17
-
-
12344330740
-
Secure program execution via dynamic information flow tracking
-
December SESSION: Security
-
G. E. Suh, J. W. Lee, D. Zhang and S. Devadas. Secure program execution via dynamic information flow tracking. ACM SIGOPS Operating Systems Review, 38(5):86-96, December 2004. SESSION: Security.
-
(2004)
Acm Sigops Operating Systems Review
, vol.38
, Issue.5
, pp. 86-96
-
-
Suh, G.E.1
Lee, J.W.2
Zhang, D.3
Devadas, S.4
-
21
-
-
34748842480
-
Advances in format string exploitation
-
July
-
gera and riq. Advances in format string exploitation. Phrack Magazine, 11(59), July 2002.
-
(2002)
Phrack Magazine
, vol.11
, pp. 59
-
-
Riq, G.1
-
24
-
-
18844437024
-
Detection of injected, dynamically generated, and obfuscated malicious code
-
J. C. Rabek, R. I. Khazan, S. M. Lewandowski and R. K. Cunningham. Detection of injected, dynamically generated, and obfuscated malicious code. In In Proc. of the ACM workshop on Rapid Malcode, 2003.
-
(2003)
Proc. Of the Acm Workshop on Rapid Malcode
-
-
Rabek, J.C.1
Khazan, R.I.2
Lewandowski, S.M.3
Cunningham, R.K.4
-
28
-
-
84885679117
-
Vigilante: End-To-end containment of internet worms
-
Brighton, UK, October
-
M. Costa, J. Crowcroft, M. Castro, A Rowstron, L. Zhou, L. Zhang and P. Barham. Vigilante: End-To-end containment of internet worms. In In Proc. of the 20th ACM Symposium on Operating Systems Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Proc. Of the 20th Acm Symposium on Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
30
-
-
0037702242
-
CSSV: Towards a realistic tool for statically detecting all buffer overlows in C
-
N. Dor, M. Rodeh, and M. Sagiv. CSSV: Towards a realistic tool for statically detecting all buffer overlows in C. In In Proc. of the ACM Conference on Object-Oriented Programming, Systems, Languages and Application, October 2003.
-
(2003)
Proc. Of the Acm Conference on Object-Oriented Programming, Systems, Languages and Application, October
-
-
Dor, N.1
Rodeh, M.2
Sagiv, M.3
-
34
-
-
85101136751
-
Smashing C++ VPTRS
-
rix January
-
rix. Smashing C++ VPTRS. Phrack Magazine, 10(56), January 2000.
-
(2000)
Phrack Magazine
, vol.10
, pp. 56
-
-
-
36
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
August
-
S. Bhatkar, D.C. Du Varney and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In In Proc. of the 12th USENIX Security Symposium, pages 105-120, August 2003.
-
(2003)
Proc. Of the 12th Usenix Security Symposium
, pp. 105-120
-
-
Bhatkar, S.1
Du Varney, D.C.2
Sekar, R.3
-
39
-
-
34748831503
-
Win32 buffer overows (location, exploitation, and prevention)
-
D. Spyrit. Win32 buffer overows (location, exploitation, and prevention). Phrack 55, 1999.
-
(1999)
Phrack
, vol.55
-
-
Spyrit, D.1
-
41
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
August
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In In Proc. of the 10th USENIX Security Symposium, pages 201-216, August 2001.
-
(2001)
Proc. Of the 10th Usenix Security Symposium
, pp. 201-216
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
43
-
-
84948951525
-
Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
-
Las Vegas, Nevada
-
M. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In Proc. of ACSAC Security Conference, Las Vegas, Nevada, 2002.
-
(2002)
Proc. Of Acsac Security Conference
-
-
Williamson, M.M.1
|