Back to Results
First PageMeta Content



Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d
Add to Reading List

Document Date: 2011-12-01 04:09:18


Open Document

File Size: 174,50 KB

Share Result on Facebook

Company

BBN Technologies / Microsoft / Core Security Technologies / Red Lambda / /

Country

United States / /

/

Facility

University of Iowa / University of Calgary / Northeastern University / Columbia University / Georgia Institute / The College of New Jersey / Dartmouth College / Dartmouth Institute / Yale University / /

IndustryTerm

trustworthy computing systems / secure server / Internet protocols / input-processing routines / everyday systems / input processing / trustworthy systems / real-world computing platforms / application software / sensor network language processing research / e - commerce / computing / multi-component computing systems / targeted computing environment / “processor / /

Organization

Columbia University / Northeastern University / Dartmouth College / Yale University / Computer Science Department / the University of Iowa / Georgia Institute of Tech / College of New Jersey / US Federal Reserve / University of Calgary / Dartmouth Institute for Security / /

Person

Sergey Bratus / Len Sassaman / Dan Geer / Haroon Meer / Thomas Dullien (Halvar Flake) / Dino Dai Zovi / Meredith L. Patterson / Doug Lea / Anna Shubina / Alexander Sotirov / Gerardo (gera) Richarte / Michael E. Locasto / Meredith Patterson / Tim Newsham / Richard A. DeMillo / Dan Kaminsky / Alan J. Perlis / Richard J. Lipton / /

Position

Professor of student in the COSIC research / research associate / assistant professor / programmer / software engineer / /

Product

SQL injection / /

ProgrammingLanguage

SQL / /

ProvinceOrState

New Jersey / Iowa / /

PublishedMedium

The USENIX Magazine / the Good Times / Phrack / /

Technology

PKI / Internet protocols / pdf / ASCII / http / IC chips / virus hoax / /

URL

http /