Sciweavers

49 search results - page 5 / 10
» Low-Level Software Security: Attacks and Defenses
Sort
View
CF
2004
ACM
14 years 27 days ago
Repairing return address stack for buffer overflow protection
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is still one of the most prevalent vulnerabilities e...
Yong-Joon Park, Gyungho Lee
CEAS
2006
Springer
13 years 11 months ago
Teaching Spam and Spyware at the University of C@1g4ry
The University of Calgary is attacking the problems of spam and spyware from the angle of education. "Spam and Spyware" is a computer science course offered at both the ...
John Aycock
DSN
2006
IEEE
14 years 1 months ago
Honeypot-Aware Advanced Botnet Construction and Maintenance
Because “botnets” can be used for illicit financial gain, they have become quite popular in recent Internet attacks. “Honeypots” have been successfully deployed in many d...
Cliff Changchun Zou, Ryan Cunningham
CCS
2005
ACM
14 years 28 days ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ICSE
2000
IEEE-ACM
13 years 11 months ago
Software engineering for security: a roadmap
Is there such a thing anymore as a software system that doesn't need to be secure? Almost every softwarecontrolled system faces threats from potential adversaries, from Inter...
Premkumar T. Devanbu, Stuart G. Stubblebine