Exec Shield

Known as: Exec, Exec-shield, ExecShield 
Exec Shield is a project started at Red Hat, Inc in late 2002 with the aim of reducing the risk of worm or other automated remote attacks on Linux… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Traditional execution environments deploy Address Space Layout Randomization (ASLR) to defend against memory corruption attacks… (More)
  • table I
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Given a large graph, like a computer network, which k nodes should we immunize (or monitor, or remove), to make it as robust as… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
2008
2008
S U M M A R Y This paper is concerned with the implications of earthquake depth distributions in the Himalayan–Tibetan collision… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
At four underground sites in Precambrian Shield rocks in Canada and South Africa, hydrocarbon and hydrogen gases exsolving from… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Rapateaceae and Bromeliaceae each have a center of diversity in South America and a single species native to a sandstone area in… (More)
  • figure 1
  • figure 2
  • table 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Large-scale patterns of Amazonian biodiversity have until now been obscured by a sparse and scattered inventory record. Here we… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The thermal thickness of Precambrian lithosphere is modeled and compared with estimates from seismic tomography and xenolith data… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Anomaly detection is a key element of intrusiondetection and other detection systems in which perturbations of normal behavior… (More)
  • figure 5-2
  • figure 5-1
  • figure 6-1
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In autumn 1991 the Geography Department of the Swiss Federal Institute of Technology installed a DFIR (Double Fence… (More)
Is this relevant?