The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques
暂无分享,去创建一个
Calton Pu | Jonathan Walpole | Crispin Cowan | Heather M. Hinton | J. Walpole | C. Pu | Crispin Cowan | H. Hinton
[1] Markus G. Kuhn,et al. Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[2] Wietse Z. Venema,et al. TCP Wrapper: Network Monitoring, Access Control, and Booby Traps , 1992, USENIX Summer.
[3] George C. Necula,et al. Safe kernel extensions without run-time checking , 1996, OSDI '96.
[4] Hilarie K. Orman,et al. Experimental results of covert channel limitation in one-way communication systems , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[5] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[6] Bob Blakley,et al. Some weaknesses of the TCB model , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[7] Matt Bishop,et al. Attack class: address spoofing , 1997 .
[8] Mudge. How to write buffer overflows , 1997 .
[9] Nathan P. Smith,et al. Stack Smashing Vulnerabilities in the UNIX Operating System , 1997 .
[10] Charles Consel,et al. A general approach for run-time specialization and its application to C , 1996, POPL '96.
[11] Charles Consel,et al. Safe Operating System Specialization: the RPC Case Study , 1996 .
[12] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[13] Robert O. Hastings,et al. Fast detection of memory leaks and access errors , 1991 .
[14] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[15] Calton Pu,et al. Optimistic incremental specialization: streamlining a commercial operating system , 1995, SOSP.
[16] David H. Ackley,et al. Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).
[17] Calton Pu,et al. Death, taxes, and imperfect software: surviving the inevitable , 1998, NSPW '98.
[18] Philip Koopman,et al. Comparing the robustness of POSIX operating systems , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).
[19] Stephen Smalley,et al. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .