Computer security

D Gollmann - Wiley Interdisciplinary Reviews: Computational …, 2010 - Wiley Online Library
Computer security encompasses concepts and methods for protecting sensitive resources in
computer systems. Computer security starts from the policies that regulate access to …

Input validation vulnerabilities in web applications: Systematic review, classification, and analysis of the current state-of-the-art

FF Fadlalla, HT Elshoush - IEEE Access, 2023 - ieeexplore.ieee.org
In recent years, huge increase in attacks and data breaches is noticed. Most of the attacks
are performed and focused on the vulnerabilities related to web applications. Hence …

Control-flow integrity principles, implementations, and applications

M Abadi, M Budiu, U Erlingsson, J Ligatti - ACM Transactions on …, 2009 - dl.acm.org
Current software attacks often build on exploits that subvert machine-code execution. The
enforcement of a basic safety property, control-flow integrity (CFI), can prevent such attacks …

AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves

N Weichbrodt, A Kurmus, P Pietzuch… - … Security–ESORICS 2016 …, 2016 - Springer
Abstract Intel's Software Guard Extensions (SGX) provide a new hardware-based trusted
execution environment on Intel CPUs using secure enclaves that are resilient to accesses by …

ReVirt: Enabling intrusion analysis through virtual-machine logging and replay

GW Dunlap, ST King, S Cinar, MA Basrai… - ACM SIGOPS Operating …, 2002 - dl.acm.org
Current system loggers have two problems: they depend on the integrity of the operating
system being logged, and they do not save sufficient information to replay and analyze …

Semantics-aware malware detection

M Christodorescu, S Jha, SA Seshia… - … IEEE symposium on …, 2005 - ieeexplore.ieee.org
A malware detector is a system that attempts to determine whether a program has malicious
intent. In order to evade detection, malware writers (hackers) frequently use obfuscation to …

Bugs as deviant behavior: A general approach to inferring errors in systems code

D Engler, DY Chen, S Hallem, A Chou… - ACM SIGOPS Operating …, 2001 - dl.acm.org
A major obstacle to finding program errors in a real system is knowing what correctness
rules the system must obey. These rules are often undocumented or specified in an ad hoc …

Static analysis of executables to detect malicious patterns

M Christodorescu, S Jha - 12th USENIX Security Symposium (USENIX …, 2003 - usenix.org
Malicious code detection is a crucial component of any defense mechanism. In this paper,
we present a unique viewpoint on malicious code detection. We regard malicious code …

An empirical study of operating systems errors

A Chou, J Yang, B Chelf, S Hallem… - Proceedings of the …, 2001 - dl.acm.org
We present a study of operating system errors found by automatic, static, compiler analysis
applied to the Linux and OpenBSD kernels. Our approach differs from previous studies that …

Static analysis for security

B Chess, G McGraw - IEEE security & privacy, 2004 - ieeexplore.ieee.org
All software projects are guaranteed to have one artifact in common $ source code. Together
with architectural risk analysis, code review for security ranks very high on the list of software …