-
1
-
-
33847278205
-
Steps for recovering from a UNIX or NT system compromise
-
CERT Coordination Center, April
-
Steps for Recovering from a UNIX or NT System Compromise. Technical report, CERT Coordination Center, April 2000. http://www.cert.org/tech_tips/ win-UNIX-system_compromise.htnil.
-
(2000)
Technical Report
-
-
-
2
-
-
16644379211
-
Detecting signs of intrusion
-
CERT Coordination Center, April
-
Detecting Signs of Intrusion. Technical Report CMU/SEI-SIM-009, CERT Coordination Center, April 2001. http://www.cert.org/security-improvement/modules/m09.html.
-
(2001)
Technical Report
, vol.CMU-SEI-SIM-009
-
-
-
3
-
-
84860972811
-
Sendmail debugger arbitrary code execution vulnerability
-
L-133, Computer Incident Advisory Capability, August
-
L-133: Sendmail Debugger Arbitrary Code Execution Vulnerability. Technical report, Computer Incident Advisory Capability, August 2001. http://www.ciac.org/ciac/bulletins/l-133.shtml.
-
(2001)
Technical Report
-
-
-
4
-
-
0041482634
-
CERT/CC overview incident and vulnerability trends
-
CERT Coordination Center, April
-
CERT/CC Overview Incident and Vulnerability Trends. Technical report, CERT Coordination Center, April 2002. http://www.cert.org/present/cert-overview-trends/.
-
(2002)
Technical Report
-
-
-
5
-
-
16644397156
-
Multiple vulnerabilities in OpenSSL
-
CERT Advisory CA-2002-23, CERT Coordination Center, July
-
Multiple Vulnerabilities In OpenSSL. Technical Report CERT Advisory CA-2002-23, CERT Coordination Center, July 2002. http://www.cert.org/advisories/CA-2002-23.html.
-
(2002)
Technical Report
-
-
-
6
-
-
0036709428
-
Recovery from malicious transactions
-
September
-
Paul Ammann, Sushil Jajodia, and Peng Liu. Recovery from Malicious Transactions. IEEE Transactions on Knowledge and Data Engineering, 14(5): 1167-1185, September 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.5
, pp. 1167-1185
-
-
Ammann, P.1
Jajodia, S.2
Liu, P.3
-
9
-
-
0009016272
-
An evening with Berferd in which a cracker is lured, endured, and studied
-
January
-
Bill Cheswick. An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied. In Proceedings of the Winter 1992 USENIX Technical Conference, pages 163-174, January 1992.
-
(1992)
Proceedings of the Winter 1992 USENIX Technical Conference
, pp. 163-174
-
-
Cheswick, B.1
-
10
-
-
16644367219
-
The Incident Detection, Analysis, and Response (IDAR) project
-
CERT Coordination Center, July
-
Alan M. Christie. The Incident Detection, Analysis, and Response (IDAR) Project. Technical report, CERT Coordination Center, July 2002. http://www.cert.org/idar.
-
(2002)
Technical Report
-
-
Christie, A.M.1
-
11
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Dorothy E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
12
-
-
84978401615
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
December
-
George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza Basrai, and Peter M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), pages 211-224, December 2002.
-
(2002)
Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 211-224
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.4
Chen, P.M.5
-
15
-
-
16644376937
-
Forensic computer analysis: An introduction
-
September
-
Dan Farmer and Wietse Venema. Forensic computer analysis: an introduction. Dr. Dobb's Journal, September 2000.
-
(2000)
Dr. Dobb's Journal
-
-
Farmer, D.1
Venema, W.2
-
23
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
July
-
Leslie Lamport. Time, Clocks, and the Ordering of Events in a Distributed System. Communications of the ACM, 21(7):558-565, July 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
24
-
-
0015672289
-
A note on the confinement problem
-
October
-
Butler W. Lampson. A Note on the Confinement Problem. Communications of the ACM, 16(10):613-615, October 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
26
-
-
0000990322
-
A survey of program slicing techniques
-
Frank Tip
-
Frank Tip. A survey of program slicing techniques. Journal of Programming Languages, 3(3), 1995.
-
(1995)
Journal of Programming Languages
, vol.3
, Issue.3
-
-
Tip, F.1
-
27
-
-
33646828569
-
DERBI: Diagnosis, explanation and recovery from computer break-ins
-
DARPA Project F30602-96-C-0295 Final Report, SRI International, Artificial Intelligence Center, January
-
W. M. Tyson. DERBI: Diagnosis, Explanation and Recovery from Computer Break-ins. Technical Report DARPA Project F30602-96-C-0295 Final Report, SRI International, Artificial Intelligence Center, January 2001. http://www.dougmoran.com/dmoran/publications.html.
-
(2001)
Technical Report
-
-
Tyson, W.M.1
|