-
1
-
-
84947584994
-
Application-integrated data collection for security monitoring
-
LNCS, Davis, CA, October Springer
-
M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In Proceedings of Recent Advances in Intrusion Detection (RAID), LNCS, pages 22-36, Davis, CA, October 2001. Springer.
-
(2001)
Proceedings of Recent Advances in Intrusion Detection (RAID)
, pp. 22-36
-
-
Almgren, M.1
Lindqvist, U.2
-
4
-
-
84964556643
-
Mobile code security by java bytecode instrumentation
-
Anaheim, CA, June
-
A. Chander, J. C. Mitchell, and I. Shin. Mobile Code Security by Java Bytecode Instrumentation. In DARPA Information Survivability Conference and Exposition (DISCEX II), Anaheim, CA, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition (DISCEX II)
-
-
Chander, A.1
Mitchell, J.C.2
Shin, I.3
-
5
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX, January
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In 7th USENIX Security, pages 63-78, San Antonio, TX, January 1998.
-
(1998)
7th USENIX Security
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
6
-
-
85084160094
-
Profiling and tracing dynamic library usage via interposition
-
Boston, MA
-
T. W. Curry. Profiling and Tracing Dynamic Library Usage Via Interposition. In USENIX Summer 1994 Technical Conference, pages 267-278, Boston, MA, 1994.
-
(1994)
USENIX Summer 1994 Technical Conference
, pp. 267-278
-
-
Curry, T.W.1
-
9
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
San Diego, CA, October
-
D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, San Diego, CA, October 2000.
-
(2000)
Proceedings of the Fourth Symposium on Operating Systems Design and Implementation
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
11
-
-
0032641892
-
Hardening cots software with generic software wrappers
-
Oakland, CA
-
T. Fraser, L. Badger, and M. Feldman. Hardening COTS Software with Generic Software Wrappers. In IEEE Symposium on Security and Privacy, pages 2-16, Oakland, CA, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
15
-
-
0027808377
-
Interposition agents: Transparently interposing user code at the system interface
-
Asheville, NC
-
M. B. Jones. Interposition Agents: Transparently Interposing User Code at the System Interface. In Proceedings of the Symposium on Operating Systems Principles, pages 80-93, Asheville, NC, 1993.
-
(1993)
Proceedings of the Symposium on Operating Systems Principles
, pp. 80-93
-
-
Jones, M.B.1
-
16
-
-
0036090464
-
Using internal sensors and embedded detectors for intrusion detection
-
F. Kerschbaum, E. H. Spafford, and D. Zamboni. Using Internal Sensors and Embedded Detectors for Intrusion Detection. Journal of Computer Security, 10(1-2):23-70, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 23-70
-
-
Kerschbaum, F.1
Spafford, E.H.2
Zamboni, D.3
-
19
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
Oakland, CA, May
-
C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 175-187, Oakland, CA, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
20
-
-
0006062387
-
Generation of application level audit data via library interposition
-
COAST Laboratory, Purdue University, October
-
B. A. Kuperman and E. Spafford. Generation of Application Level Audit Data via Library Interposition. Technical Report CERIAS TR-99-11, COAST Laboratory, Purdue University, October 1999.
-
(1999)
Technical Report
, vol.CERIAS TR-99-11
-
-
Kuperman, B.A.1
Spafford, E.2
-
22
-
-
0032630098
-
Detecting computer and network misuse with the production-based expert system toolset (P-BEST)
-
Oakland, California, May
-
U. Lindqvist and P. Porras. Detecting Computer and Network Misuse with the Production-Based Expert System Toolset (P-BEST). In IEEE Symposium on Security and Privacy, pages 146-161, Oakland, California, May 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.2
-
24
-
-
21644432604
-
Playing inside the black box: Using dynamic instrumentation to create security holes
-
Sante Fe, NM, October
-
B. P. Miller, M. Christodorescu, R. Iverson, T. Kosar, A. Mirgorodskii, and F. Popovici. Playing Inside the Black Box: Using Dynamic Instrumentation to Create Security Holes. In the Second Los Alamos Computer Science Institute Symposium, Sante Fe, NM, October 2001.
-
(2001)
The Second Los Alamos Computer Science Institute Symposium
-
-
Miller, B.P.1
Christodorescu, M.2
Iverson, R.3
Kosar, T.4
Mirgorodskii, A.5
Popovici, F.6
-
27
-
-
0004145058
-
Insertion, evasion and denial of service: Eluding network intrusion detection
-
Secure Networks, January
-
T. Ptacek and T. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.1
Newsham, T.2
-
28
-
-
84978378814
-
Defensive programming: Using an annotation toolkit to build dos-resistant software
-
Boston, MA, December
-
X. Qie, R. Pang, and L. Peterson. Defensive Programming: Using an Annotation Toolkit to Build Dos-Resistant Software. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation, Boston, MA, December 2002.
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation
-
-
Qie, X.1
Pang, R.2
Peterson, L.3
-
29
-
-
0347927191
-
A toolkit and methods for internet firewalls
-
Boston, MA
-
M. J. Ranum and F. M. Avolio. A Toolkit and Methods for Internet Firewalls. In USENIX Conference, pages 37-44, Boston, MA, 1994.
-
(1994)
USENIX Conference
, pp. 37-44
-
-
Ranum, M.J.1
Avolio, F.M.2
-
30
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Seattle, WA, November
-
M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, Seattle, WA, November 1999.
-
(1999)
Proceedings of the USENIX LISA '99 Conference
-
-
Roesch, M.1
-
31
-
-
19944382870
-
Instrumentation and optimization of Win32/intel executables using etch
-
Seattle, WA
-
T. Romer, G. Voelker, D. Lee, A. Wolman, W. Wong, H. Levy, and B. Bershad. Instrumentation and Optimization of Win32/Intel Executables Using Etch. In USENIX Windows NT Workshop, Seattle, WA, 1997.
-
(1997)
USENIX Windows NT Workshop
-
-
Romer, T.1
Voelker, G.2
Lee, D.3
Wolman, A.4
Wong, W.5
Levy, H.6
Bershad, B.7
-
33
-
-
77953188431
-
Detecting malicious java code using virtual machine auditing
-
Washington, DC
-
S. Soman, C. Krintz, and G. Vigna. Detecting Malicious Java Code Using Virtual Machine Auditing. In Proc. of the 12th USENIX Security Symposium, pages 153-168, Washington, DC, 2003.
-
(2003)
Proc. of the 12th USENIX Security Symposium
, pp. 153-168
-
-
Soman, S.1
Krintz, C.2
Vigna, G.3
-
35
-
-
0004042711
-
Multiple bypass: Interposition agents for distributed computing
-
March
-
D. Thain and M. Livny. Multiple Bypass: Interposition Agents for Distributed Computing. Journal of Cluster Computing, 4(1):39-47, March 2001.
-
(2001)
Journal of Cluster Computing
, vol.4
, Issue.1
, pp. 39-47
-
-
Thain, D.1
Livny, M.2
|