Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Perry Wagle is active.

Publication


Featured researches published by Perry Wagle.


Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems] | 2003

Buffer overflows: attacks and defenses for the vulnerability of the decade

Crispin Cowan; Perry Wagle; Calton Pu; Steve Beattie; Jonathan Walpole

Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain partial or total control of a host. If buffer overflow vulnerabilities could be effectively eliminated, a very large portion of the most serious security threats would also be eliminated. In this paper, we survey the various types of buffer overflow vulnerabilities and attacks, and survey the various defensive measures that mitigate buffer overflow vulnerabilities, including our own StackGuard method. We then consider which combinations of techniques can eliminate the problem of buffer overflow vulnerabilities, while preserving the functionality and performance of existing systems.


ACM Transactions on Computer Systems | 2001

Specialization tools and techniques for systematic optimization of system software

Dylan McNamee; Jonathan Walpole; Calton Pu; Crispin Cowan; Charles Krasic; Ashvin Goel; Perry Wagle; Charles Consel; Gilles Muller; Renauld Marlet

Specialization has been recognized as a powerful technique for optimizing operating systems. However, specialization has not been broadly applied beyond the research community because current techniques based on manual specialization, are time-consuming and error-prone. The goal of the work described in this paper is to help operating system tuners perform specialization more easily. We have built a specialization toolkit that assists the major tasks of specializing operating systems. We demonstrate the effectiveness of the toolkit by applying it to three diverse operating system components. We show that using tools to assist specialization enables significant performance optimizations without error-prone manual modifications. Our experience with the toolkit suggests new ways of designing systems that combine high performance and clean structure.


usenix security symposium | 1998

StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks

Crispin Cowan; Calton Pu; Dave Maier; Heather Hintony; Jonathan Walpole; Peat Bakke; Steve Beattie; Aaron Grier; Perry Wagle; Qian Zhang


usenix security symposium | 2003

Pointguard TM : protecting pointers from buffer overflow vulnerabilities

Crispin Cowan; Steve Beattie; John Johansen; Perry Wagle


usenix large installation systems administration conference | 2002

Timing the Application of Security Patches for Optimal Uptime

Steve Beattie; Seth Arnold; Crispin Cowan; Perry Wagle; Chris Wright; Adam Shostack


usenix large installation systems administration conference | 2000

SubDomain: Parsimonious Server Security

Crispin Cowan; Steve Beattie; Greg Kroah-Hartman; Calton Pu; Perry Wagle; Virgil D. Gligor


Archive | 2002

Pointguard: method and system for protecting programs against pointer corruption attacks

Stanley Crispin Cowan; Seth Richard Arnold; Steven Michael Beattie; Perry Wagle


Archive | 1999

Protecting Systems from Stack Smashing Attacks with StackGuard

Crispin Cowan; Steve Beattie; Ryan Finnin Day; Calton Pu; Perry Wagle; Erik Walthinsen


Archive | 2004

StackGuard: Simple Stack Smash Protection for GCC

Perry Wagle; Crispin Cowan; Immunix


usenix security symposium | 1998

Automatic detection and prevention of buffer-overflow attacks

Crispin Cowan; Calton Pu; David Maier; Jonathan Walpole; P. Bakke; Steve Beattie; Aaron Grier; Perry Wagle; Qing-Yu Zhang; Heather Maria Hinton

Collaboration


Dive into the Perry Wagle's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Calton Pu

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

David Maier

Portland State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Charles Krasic

University of British Columbia

View shared research outputs
Researchain Logo
Decentralizing Knowledge