-
1
-
-
65349145047
-
Using programmer-written compiler extensions to catch security holes
-
K. Ashcraft and D.R. Engler, "Using Programmer-Written Compiler Extensions to Catch Security Holes", IEEE Symposium on Security and Privacy, Oakland, CA, 2002.
-
IEEE Symposium on Security and Privacy, Oakland, CA, 2002
-
-
Ashcraft, K.1
Engler, D.R.2
-
2
-
-
85084160243
-
Stack-Guard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle and Q. Zhang, "Stack-Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks", 7th USENIX Security Symposium, San Antonio, TX, 1998.
-
7th USENIX Security Symposium, San Antonio, TX, 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
-
3
-
-
84946237235
-
Buffer overflows: Attacks and defenses for the vulnerability of the decade
-
C. Cowan, P. Wagle, C. Pu, S. Beattie and J. Walpole, "Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade", DARPA Information Survivability Conference and Expo, Hilton Head Island, SC, 2000.
-
DARPA Information Survivability Conference and Expo, Hilton Head Island, SC, 2000
-
-
Cowan, C.1
Wagle, P.2
Pu, C.3
Beattie, S.4
Walpole, J.5
-
4
-
-
0006921491
-
On the time complexity of the TEIRESIAS algorithm
-
Research Report 98A00290, IBM
-
A. Floratos and I. Rigoutsos, "On the Time Complexity of the TEIRESIAS Algorithm", Research Report 98A00290, IBM, 1998.
-
(1998)
-
-
Floratos, A.1
Rigoutsos, I.2
-
5
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, "A Sense of Self for Unix Processes", IEEE Symposium on Computer Security and Privacy, Los Alamos, CA, pp.120-128, 1996.
-
(1996)
IEEE Symposium on Computer Security and Privacy, Los Alamos, CA
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection", 8th USENIX Security Symposium, pp. 141-151, 1999.
-
(1999)
8th USENIX Security Symposium
, pp. 141-151
-
-
Ghosh, A.1
Schwartzbard, A.2
-
8
-
-
0032313923
-
Intrusion detection system using sequences of system calls
-
S.A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion Detection System Using Sequences of System Calls", Journal of Computer Security, 6(3), pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Somayaji, A.2
Forrest, S.3
-
9
-
-
0003829943
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
PhD thesis, UC Davis
-
C. Ko, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach". PhD thesis, UC Davis, 1996.
-
(1996)
-
-
Ko, C.1
-
10
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
C. Ko, G. Fink and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring", 10th Computer Security Applications Conference, Orlando, Fl, pp. 134-144, 1994.
-
(1994)
10th Computer Security Applications Conference, Orlando, Fl
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
11
-
-
85084163349
-
Data mining approaches for intrusion detection
-
W. Lee and S. Stolfo, "Data Mining Approaches for Intrusion Detection", 7th USENIX Security Symposium, San Antonio, TX, 1998.
-
7th USENIX Security Symposium, San Antonio, TX, 1998
-
-
Lee, W.1
Stolfo, S.2
-
13
-
-
84874268641
-
WebStone benchmark information
-
Mindcraft
-
Mindcraft, "WebStone Benchmark Information", http://www.mindcraft.com/webstone/.
-
-
-
-
14
-
-
0031684427
-
Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm
-
I. Rigoutsos and A. Floratos, "Combinatorial Pattern Discovery in Biological Sequences: The TEIRESIAS Algorithm", Bioinformatics, 14 (1), pp. 55-67, 1998.
-
(1998)
Bioinformatics
, vol.14
, Issue.1
, pp. 55-67
-
-
Rigoutsos, I.1
Floratos, A.2
-
15
-
-
77952265719
-
The process of security
-
April
-
B. Schneier, "The Process of Security", Information Security, April. 2000 http://www.infosecuritymag.com/articles/april00/columns_cryptorphythms.shtml
-
(2000)
Information Security
-
-
Schneier, B.1
-
16
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, P. Bollineni, and D. Dhurjati, "A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors", IEEE Symposium on Security and Privacy, Oakland, CA, 2001.
-
IEEE Symposium on Security and Privacy, Oakland, CA, 2001
-
-
Sekar, R.1
Bendre, M.2
Bollineni, P.3
Dhurjati, D.4
-
17
-
-
0034836394
-
Intrusion detection via static analysis
-
D. Wagner and D. Dean, "Intrusion Detection via Static Analysis", IEEE Symposium on Security and Privacy, Oakland, CA, 2001.
-
IEEE Symposium on Security and Privacy, Oakland, CA, 2001
-
-
Wagner, D.1
Dean, D.2
-
19
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models", IEEE Symposium on Security and Privacy, pp. 133-145, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
20
-
-
84944248021
-
Intrusion detection using variable-length audit trail patterns
-
A. Wespi, M. Dacier and H. Debar, "Intrusion Detection Using Variable-Length Audit Trail Patterns", 3rd International Workshop on the Recent Advances in Intrusion Detection, LNCS 1907, Springer, pp. 110-129, 2000.
-
(2000)
3rd International Workshop on the Recent Advances in Intrusion Detection, LNCS 1907, Springer
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|