Index of /sites/ftp.wiretapped.net/pub/security/info/papers/secure-programming/
Name Last modified Size
Parent Directory - 1996-sans-tut.pdf 2000-12-29 12:00 1.2M Secure-Programs-HOWTO-all-html.tar.gz 2003-03-03 12:00 270K Secure-Programs-HOWTO.pdf 2003-03-03 12:00 674K bishop-1979-the-transfer-of-information-and-authority-in-a-protection-system.pdf 2003-03-04 12:00 710K bishop-1986-access-control-and-privacy-in-large-distributed-systems.pdf 2003-03-04 12:00 299K bishop-1986-how-to-write-a-setuid-program.pdf 2003-03-04 12:00 37K bishop-1987-sharing-accounts.pdf 2003-03-04 12:00 84K bishop-1991-comparing-authentication-techniques.pdf 2003-03-04 12:00 45K bishop-1992-anatomy-of-a-proactive-password-changer.pdf 2003-03-04 12:00 40K bishop-1993-teaching-computer-security.pdf 2003-03-04 12:00 31K bishop-1995-a-standard-audit-trail-format.pdf 2003-03-04 12:00 51K bishop-1995-improving-system-security-via-proactive-password-checking.pdf 2003-03-04 12:00 57K bishop-1996-writing-secure-programs.pdf 2000-12-29 12:00 1.2M bishop-1997-computer-security-in-introductory-programming-classes.pdf 2003-03-04 12:00 7.8K bishop-1997-property-based-testing-a-new-approach-to-testing-for-assurance.pdf 2003-03-04 12:00 178K bishop-1997-the-state-of-infosec-education-in-academia-present-and-future-directions.pdf 2003-03-04 12:00 40K bishop-1997-writing-safe-setuid-programs.pdf 2001-10-03 12:00 85K bishop-1998-robust-programming.pdf 2000-08-17 12:00 64K bishop-1999-vulnerabilities-analysis.pdf 2003-03-04 12:00 44K bishop-2000-academia-and-education-in-information-security-four-years-later.pdf 2003-03-04 12:00 84K bishop-2000-education-in-information-security.pdf 2003-03-04 12:00 32K bishop-2001-how-attackers-break-programs-and-how-to-write-programs-more-securely.pdf 2003-03-04 12:00 586K bishop-dilger-1996-checking-for-race-conditions-in-file-accesses.pdf 2003-03-04 12:00 53K delivering-signals-for-fun-and-profit.txt 2001-05-28 12:00 20K devanbu-et-al-1998-techniques-for-trusted-software-engineering.pdf 1998-06-07 12:00 360K gilliam-et-al-2000-reducing-software-security-risk-through-an-integrated-approach.pdf 2003-03-04 12:00 76K gilliam-et-al-2001-development-of-a-software-security-assessment-instrument-to-reduce-software-security-risk.pdf 2003-03-04 12:00 76K hashii-et-al-2000-supporting-reconfigurable-security-policies-for-mobile-programs.pdf 2003-03-04 12:00 206K haugh-bishop-2003-testing-c-programs-for-buffer-overflow-vulnerabilities.pdf 2003-02-12 12:00 97K peterson-et-al-2002-a-flexible-containment-mechanism-for-executing-untrusted-code.pdf 2003-03-04 12:00 158K safe-cgi.txt 1997-10-28 12:00 13K secure-unix-programming-faq.txt 2008-02-09 21:26 0