Sciweavers

27 search results - page 1 / 6
» Reflections on UNIX Vulnerabilities
Sort
View
97
Voted
ACSAC
2009
IEEE
15 years 2 months ago
Reflections on UNIX Vulnerabilities
The UNIX operating system was developed in a friendly, collaborative environment without any particular predefined objectives. As it entered less friendly environments, expanded it...
Matt Bishop
88
Voted
ACSAC
2005
IEEE
15 years 4 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
105
Voted
SPE
2002
130views more  SPE 2002»
14 years 10 months ago
Unix tools as visual programming components in a GUI-builder environment
Development environments based on ActiveX controls and JavaBeans are marketed as "visual programming" platforms; in practice their visual dimension is limited to the des...
Diomidis Spinellis
90
Voted
USS
2008
15 years 1 months ago
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voti...
Kevin R. B. Butler, William Enck, Harri Hursti, St...
71
Voted
NDSS
2007
IEEE
15 years 5 months ago
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...