-
1
-
-
0006100649
-
Smashing the stack for fun and profit
-
November
-
AlephOne. Smashing the stack for fun and profit. Phrack, 7(49), November 1996.
-
(1996)
Phrack
, vol.7
, Issue.49
-
-
-
5
-
-
0035783965
-
Using aspectc to improve the modularity of path-specific customization in operating system code
-
Vienna University of Technology, Austria, September
-
Y. Coady, G. Kiczales, M. Feeley, and G. Smolyn. Using aspectc to improve the modularity of path-specific customization in operating system code. In 9th ACM SIGSOFT Symposium on the Foundations of Software Engineering, Vienna University of Technology, Austria, September 2001.
-
(2001)
9th ACM SIGSOFT Symposium on the Foundations of Software Engineering
-
-
Coady, Y.1
Kiczales, G.2
Feeley, M.3
Smolyn, G.4
-
6
-
-
0002582136
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: Attacks and defenses for the vulnerability of the decade. In Proceedings of the DARPA Information Survivability Conference and Expo, 1999.
-
(1999)
Proceedings of the DARPA Information Survivability Conference and Expo
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
9
-
-
0011759755
-
Property based testing: A new approach to testing for assurance
-
July
-
G. Fink and M. Bishop. Property based testing: A new approach to testing for assurance. ACM SIGSOFT Software Engineering Notes, 22(4), July 1997.
-
(1997)
ACM SIGSOFT Software Engineering Notes
, vol.22
, Issue.4
-
-
Fink, G.1
Bishop, M.2
-
10
-
-
78649895553
-
-
Technical Report CSE-95-15, University of California, Davis
-
G. Fink, M. Helmke, M. Bishop, and K. Levitt. An interface language between specifications and testing. Technical Report CSE-95-15, University of California, Davis, 1995.
-
(1995)
An interface language between specifications and testing
-
-
Fink, G.1
Helmke, M.2
Bishop, M.3
Levitt, K.4
-
11
-
-
77954890135
-
Toward a property-based testing environment with application to security critical software
-
April
-
G. Fink, C. Ko, M. Archer, and K. Levitt. Toward a property-based testing environment with application to security critical software. In Proceedings of the 4th Irvine Software Symposium, pages 39–48, April 1994.
-
(1994)
Proceedings of the 4th Irvine Software Symposium
, pp. 39-48
-
-
Fink, G.1
Ko, C.2
Archer, M.3
Levitt, K.4
-
12
-
-
0031654007
-
An automated approach for identifying potential vulnerabilities in software
-
May Oakland, CA
-
A. Ghosh, T. O’Connor, and G. McGraw. An automated approach for identifying potential vulnerabilities in software. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 104–114, May 1998. Oakland, CA.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 104-114
-
-
Ghosh, A.1
O’Connor, T.2
McGraw, G.3
-
16
-
-
85084164558
-
Statically detecting likely buffer overflow vulnerabilities
-
Washington, D. C., August
-
D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, Washington, D. C., August 2001.
-
(2001)
USENIX Security Symposium
-
-
Larochelle, D.1
Evans, D.2
-
17
-
-
0025557712
-
Empirical study of the reliability of unix utilities
-
December
-
B. Miller, L. Fredricksen, and B. So. Empirical study of the reliability of unix utilities. Communications of the ACM, 33(12):32–44, December 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.1
Fredricksen, L.2
So, B.3
-
18
-
-
38649139190
-
strlcpy and strlcat - consistent, safe, string copy and concatenation
-
June Monterey, California, USA
-
T. C. Miller and T. de Raadt. strlcpy and strlcat - consistent, safe, string copy and concatenation. In Proceedings of the 1999 USENIX Annual Technical Conference, June 1999. Monterey, California, USA.
-
(1999)
Proceedings of the 1999 USENIX Annual Technical Conference
-
-
Miller, T. C.1
de Raadt, T.2
-
25
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
February San Diego CA
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Symposium on Network and Distributed Systems Security (NDSS’00), pages 3–17, February 2000. San Diego CA.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS’00)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
|