Proceedings of the annual conference on USENIX, 2000.
11. S. H. Yong and S. Horwitz, “Protecting C programs from attacks via invalid pointer
dereferences,” ACM SIGSOFT Software Engineering Notes, vol. 28, Sep. 2003, p. 307.
12. C. Cowan, M. Barringer, S. Beattie, G. Kroah-Hartman, M. Frantzen, and J. Lokier,
“FormatGuard: Automatic protection from printf format string vulnerabilities,”
Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, USENIX
Association, 2001, p. 15–15.
13. J. Newsome, “Dynamic taint analysis for automatic detection, analysis, and signature
generation of exploits on commodity software,” Network and Distributed System Security,
2005.
14. R. H. and B. Joyce., “Purify: Fast detection of memory leaks and access errors,” Winter
USENIX Conferenc, San Francisco, California, USA, January: 1992, p. 125--136.
15. N. Dor, “Cleanness checking of string manipulations in C programs via integer analysis,”
Static Analysis, 2001.
16. N. Frykholm, “Countermeasures against buffer overflow attacks,” RSA Tech Note, 2000,
pp. 1-9.
17. S. D. Xenitellis, “Identifying security vulnerabilities through input flow tracing and
analysis,” Information Management & Computer Security, vol. 11, 2003, pp. 195-199.
18. U. Erlingsson, Low-level Software Security : Attacks and Defenses Low-level Software
Security : Attacks and Defenses, Redmond, WA, USA: 2007.
19. J. Wilander and M. Kamkar, “A comparison of publicly available tools for dynamic buffer
overflow prevention,” Proceedings of the 10th Network and Distributed System Security
Symposium, Citeseer, 2003, p. 149–162.
20. H. Shacham, M. Page, B. Pfaff, and E. Goh, “On the effectiveness of address-space
randomization,” ACM conference on, 2004, p. 298.
21. P. Mell, K. Scarfone, and S. Romanosky, “A Complete Guide to the Common Vulnerability
Scoring System Version 2.0,” System, 2007, pp. 1-23.
22. K. Geers, “Live Fire Exercise: Preparing for Cyber War,” 2010.
23. H. Holm, T. Sommestad, J. Almroth, and M. Persson, “A quantitative evaluation of
vulnerability scanning,” Information Management & Computer Security.
24. P. H. Garthwaite, J.B. Kadane, and A. OʼHagan, “Statistical methods for eliciting
probability distributions,” Journal of the American Statistical Association, vol. 100, 2005,
pp. 680-701.
25. R. M. Warner, Applied statistics: From Bivariate through Multivariate Techniques, Sage
Publications, Inc, 2008.
26. D. C. Montgomery, Design and analysis of experiments, John Wiley & Sons Inc, 2008.
27. J. Pincus and B. Baker, “Beyond stack smashing: Recent advances in exploiting buffer
overruns,” Security & Privacy, IEEE, vol. 2, 2004, p. 20–27.
28. H. Einhorn, “Expert judgment: Some necessary conditions and an example,” Journal of
Applied Psychology, 1974.
58