Low-threat security patches and tools
暂无分享,去创建一个
Markus G. Kuhn | Eugene H. Spafford | Samuel S. Wagstaff | Ganesh Krishnan | Mohd A. Bashar | S. Wagstaff | E. Spafford | M. Kuhn | M. A. Bashar | Ganesh Krishnan
[1] William T. Polk,et al. Automated Tools for Testing Computer System Vulnerability , 1993 .
[2] Douglas Baldwin,et al. Heuristics for Determining Equivalence of Program Mutations. , 1979 .
[3] Steve R. White,et al. ABYSS: ATrusted Architecture for Software Protection , 1987, 1987 IEEE Symposium on Security and Privacy.
[4] Eugene H. Spafford,et al. Authorship analysis: identifying the author of a program , 1997, Comput. Secur..
[5] Ronald L. Rivest,et al. Time-lock Puzzles and Timed-release Crypto , 1996 .
[6] Gary A. Kildall,et al. A unified approach to global program optimization , 1973, POPL.
[7] K. J. Ottenstein,et al. Data-flow graphs as an intermediate program form. , 1978 .
[8] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[9] C. Stoll. Telling the goodguys: disseminating information on security holes , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[10] John J. Marciniak,et al. Encyclopedia of Software Engineering , 1994, Encyclopedia of Software Engineering.