Defeating Memory Corruption Attacks via Pointer Taintedness Detection, Proceedings of the International Conference on Dependable Systems and Networks (DSN), pp.378-387, 2005. ,
FormatGuard: Automatic Protection from printf Format String Vulnerabilities, Proceedings of the Tenth Usenix Security Symposium, 2001. ,
An expressive aspect language for system applications with Arachne, Proceedings of the Fourth International Conference on Aspect-Oriented Software Development (AOSD), pp.27-38, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00442180
Backward-compatible bounds checking for arrays and pointers in C programs, Proceedings of the 3rd International Workshop on Automated and Algorithmic Debugging (AADEBUG), pp.13-26, 1997. ,
Software Security Patches ? Audit, Deployment and Hot Update, Proceedings of the Fourth AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), pp.25-29, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00441354
The advanced return-into-lib(c) exploits: PaX case study, Phrack, vol.11, issue.58, 2001. ,
Address space layout randomization, 2003. ,
Monster in a box, Wired, vol.8, issue.12, 2000. ,
Enchancing Server Availability and Security through Failure-Oblivious Computing, Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI), pp.303-316, 2004. ,
The spread of the Witty worm, IEEE Security & Privacy, vol.2, issue.4, pp.46-50, 2004. ,
DOI : 10.1109/MSP.2004.59
Getting around non-executable stack (and fix) Bugtraq Mailing List, 1997. ,