-
1
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Marseille, France, Nov.
-
D. Moore and C. Shannon, "Code-Red: a Case Study on the Spread and Victims of an Internet Worm," in Proceedings of the 2002 ACM SICGOMM Internet Measurement Workshop, Marseille, France, Nov. 2002, pp. 273-284.
-
(2002)
Proceedings of the 2002 ACM SICGOMM Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
-
3
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, Jan.
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," in Proceedings of the 7th USENIX Security Conference, San Antonio, Texas, Jan. 1998, pp. 63-78.
-
(1998)
Proceedings of the 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
4
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, Feb.
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken, "A First Step towards Automated Detection of Buffer Overrun Vulnerabilities," in Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, Feb. 2000, pp. 3-17.
-
(2000)
Proceedings of the Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
5
-
-
0030685617
-
Proof-carrying code
-
Paris, France, Jan.
-
G. C. Necula, "Proof-Carrying Code," in Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '97), Paris, France, Jan. 1997, pp. 106-119.
-
(1997)
Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL '97)
, pp. 106-119
-
-
Necula, G.C.1
-
6
-
-
84957039800
-
Principles of a computer immune system
-
Sept.
-
A. Somayaji, S. Hofmeyr, and S. Forrest, "Principles of a Computer Immune System," in New Security Paradigms Workshop, Sept. 1997, pp. 75-82.
-
(1997)
New Security Paradigms Workshop
, pp. 75-82
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
-
8
-
-
0041534189
-
-
Microsoft Corporation, "Microsoft windows update," http://windowsupdate.microsoft.com.
-
Microsoft Windows Update
-
-
-
9
-
-
85084162258
-
How to 0wn the internet in your spare time
-
San Francisco, CA, Aug.
-
S. Staniford, V. Paxson, and N. Weaver, "How to 0wn the Internet in Your Spare Time," in Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, Aug. 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
10
-
-
84976720856
-
The worm programs: Early experience with a distributed computation
-
March
-
J. F. Shoch and J. A. Hupp, "The Worm Programs: Early Experience with a Distributed Computation," Communications of the ACM, vol. 25, no. 3, pp. 172-180, March 1982.
-
(1982)
Communications of the ACM
, vol.25
, Issue.3
, pp. 172-180
-
-
Shoch, J.F.1
Hupp, J.A.2
-
11
-
-
0023294949
-
Computer viruses - Theory and experiments
-
F. Cohen, "Computer viruses - theory and experiments," Computers and Security, vol. 6, pp. 22-35, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
12
-
-
0024684041
-
With microscope and tweezers: The worm from MIT's perspective
-
June
-
J. Rochlis and M. Eichin, "With Microscope and Tweezers: The Worm from MIT's Perspective," Communications of the ACM, vol. 32, no. 6, pp. 689-698, June 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 689-698
-
-
Rochlis, J.1
Eichin, M.2
-
13
-
-
0024681099
-
The internet worm: Crisis and aftermath
-
June
-
E. Spafford, "The Internet Worm: Crisis and Aftermath," Communications of the ACM, vol. 32, no. 6, pp. 678-687, June 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
, pp. 678-687
-
-
Spafford, E.1
-
14
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Aug.
-
D. Moore, G. M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," in Proceedings of the 10th USENIX Security Symposium, Aug. 2001, pp. 9-22.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
15
-
-
0041534274
-
A snapshot of global internet worm activity
-
Nov.
-
D. Song, R. Malan, and R. Stone, "A Snapshot of Global Internet Worm Activity," Arbor Networks, Tech. Rep., Nov. 2001.
-
(2001)
Arbor Networks, Tech. Rep.
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
22
-
-
84949487368
-
On computer viral infection and the effect of immunization
-
New Orleans, LA, Dec
-
C. Wang, J. Knight, and M. Elder, "On Computer Viral Infection and the Effect of Immunization," in Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00), New Orleans, LA, Dec 2000.
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC'00)
-
-
Wang, C.1
Knight, J.2
Elder, M.3
-
23
-
-
0034486891
-
The mathematics of infectious diseases
-
H. W. Hethcote, "The Mathematics of Infectious Diseases," SIAM Review, vol. 42, no. 4, pp. 599-653, 2000.
-
(2000)
SIAM Review
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
24
-
-
0041534186
-
-
Aug.
-
eEye Digital Security, "CodeRedII Worm Analysis," Aug. 2001, http://www.eeye.com/html/Research/Advisories/AL20010804.html.
-
(2001)
CodeRedII Worm Analysis
-
-
-
26
-
-
84855540676
-
-
Symantec, "W32.nimda.a@mm," http://www.symantec.com/avcenter/ venc/data/w32.nimda.a@mm.html.
-
W32.nimda.a@mm
-
-
|