-
1
-
-
3042635764
-
Identifying Outliers via Clustering for Anomaly Detection
-
[Arshad and Chan 2003] , Dept. of Computer Science, Florida Institute of Technology
-
[Arshad and Chan 2003] M. Arshad, P. Chan, Identifying Outliers via Clustering for Anomaly Detection, Technical Report CS-2003-19, Dept. of Computer Science, Florida Institute of Technology, 2003.
-
(2003)
Technical Report
, vol.CS-2003-19
-
-
Arshad, M.1
Chan, P.2
-
2
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
-
[Bleichenbacher 1998]
-
[Bleichenbacher 1998] D. Bleichenbacher, Chosen Ciphertext Attacks against Protocols based on the RSA Encryption Standard PKCS#1, Proceedings of CRYPTO'98, pp 1-12, 1998.
-
(1998)
Proceedings of CRYPTO'98
, pp. 1-12
-
-
Bleichenbacher, D.1
-
3
-
-
85032541897
-
Remote timing attacks are practical
-
[Brumley and Boneh 2003]
-
[Brumley and Boneh 2003] D. Brumley, D. Boneh, Remote Timing Attacks are Practical, 12th USENIX Security Symposium, pp. 1-14, 2003.
-
(2003)
12th USENIX Security Symposium
, pp. 1-14
-
-
Brumley, D.1
Boneh, D.2
-
4
-
-
35248836120
-
Password interception in a SSL/TLS channel
-
[Canvel et al. 2003]
-
[Canvel et al. 2003] B. Canvel, A. Hiltgen, S. Vaudenay, M. Vuagnoux, Password Interception in a SSL/TLS Channel, in Proc. of CRYPTO 2003, pp. 583-599, 2003.
-
(2003)
Proc. of CRYPTO 2003
, pp. 583-599
-
-
Canvel, B.1
Hiltgen, A.2
Vaudenay, S.3
Vuagnoux, M.4
-
5
-
-
23844534933
-
OpenSSL servers contain a buffer overflow during the SSL2 handshake process
-
[CERT 2002a] CERT, July 2002
-
[CERT 2002a] CERT, "OpenSSL servers contain a buffer overflow during the SSL2 handshake process", CERT Vulnerability Note #102795, July 2002.
-
CERT Vulnerability Note #102795
-
-
-
6
-
-
23844467959
-
OpenSSL servers contain a remotely exploitable buffer overflow vulner-ability during the SSL3 handshake process
-
[CERT 2002b] CERT, July
-
[CERT 2002b] CERT, "OpenSSL servers contain a remotely exploitable buffer overflow vulner-ability during the SSL3 handshake process", CERT Vulnerability Note #561275, July 2002.
-
(2002)
CERT Vulnerability Note #561275
-
-
-
7
-
-
0032671775
-
A meta-notation for protocol analysis
-
[Cervesato 1999]
-
[Cervesato 1999] I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, A. Scedrov, A Meta-Notation for Protocol Analysis, Proc. 12th IEEE Computer Security Foundations Workshop, pp. 55-69, 1999.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
8
-
-
0020720357
-
On the security of public key protocols
-
[Dolev and Yao 1983], March
-
[Dolev and Yao 1983] D. Dolev, A. Yao, On the Security of Public Key Protocols, IEEE Transactions on Information Theory, 29(2): 198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
9
-
-
0029716418
-
A sense of self for unix processes
-
[Forrest et al. 1996]
-
[Forrest et al. 1996] S. Forrest, S.A. Hofmeyr, A. Somayaji, A Sense of Self for Unix Processes, IEEE Symposium on Security and Privacy, pp. 120-128, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
10
-
-
0001924088
-
A model for secure protocols and their composition
-
[Heintze 1996], January
-
[Heintze 1996] N. Heintze, J.D. Tygar, A Model for Secure Protocols and their Composition, IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
12
-
-
35248848850
-
Attacking RSA-based sessions in SSL/TLS
-
[Klima et al. 2003]
-
[Klima et al. 2003] V. Klima, O. Pokorny, T. Rosa, "Attacking RSA-based Sessions in SSL/TLS," in Proc. of Cryptographic Hardware and Embedded Systems (CHES), 2003, pp. 426-440.
-
(2003)
Proc. of Cryptographic Hardware and Embedded Systems (CHES)
, pp. 426-440
-
-
Klima, V.1
Pokorny, O.2
Rosa, T.3
-
14
-
-
85084163349
-
Data mining approaches for intrusion detection
-
[Lee and Stolfo 1998]
-
[Lee and Stolfo 1998] W. Lee, S. Stolfo, Data mining Approaches for Intrusion Detection, USENIX Security Symposium, 1998, pp. 79-93.
-
(1998)
USENIX Security Symposium
, pp. 79-93
-
-
Lee, W.1
Stolfo, S.2
-
16
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
[Meadows 1992]
-
[Meadows 1992] C. Meadows, Applying Formal Methods to the Analysis of a Key Management Protocol, Journal of Computer Security, 1:5-53, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
17
-
-
0023295108
-
The interrogator: Protocol security analysis
-
[Millen et al. 1987] Feb.
-
[Millen et al. 1987] J.K. Millen, S.C. Clark, S.B. Freedman, The interrogator: Protocol Security Analysis, IEEE Transaction Software Engineering, SE-13(2):274-288, Feb. 1987.
-
(1987)
IEEE Transaction Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
18
-
-
0030705405
-
Automated analysis of cryptographic protocols using mur
-
[Mitchell et al. 1997]
-
[Mitchell et al. 1997] J.C. Mitchell, M. Mitchell, U. Stern, Automated Analysis of Cryptographic Protocols using Mur, Proc. 1997 IEEE Symposium on Security and Privacy, 1997, pp. 141-151.
-
(1997)
Proc. 1997 IEEE Symposium on Security and Privacy
, pp. 141-151
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
19
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
[Needham and Schroeder 1978], December
-
[Needham and Schroeder 1978] R.M. Needham, M.D. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Communications of ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
21
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
[Sekar et al. 2002]
-
[Sekar et al. 2002] R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions, ACM Computer and Communication Security Conference, 2002, pp. 265-274.
-
(2002)
ACM Computer and Communication Security Conference
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
22
-
-
85084164032
-
Automated response using system-call delays
-
[Somayaji and Forrest 2000]
-
[Somayaji and Forrest 2000] A. Somayaji, S. Forrest, Automated Response using System-Call Delays, 9th USENIX Security Symposium, 2000, pp. 185-198.
-
(2000)
9th USENIX Security Symposium
, pp. 185-198
-
-
Somayaji, A.1
Forrest, S.2
-
23
-
-
0032678887
-
Athena - An automatic checker for security protocol analysis
-
[Song 1999]
-
[Song 1999] D. Song, Athena - An Automatic Checker for Security Protocol Analysis, Proc. Computer Security Foundation Workshop, 1999, pp. 192-202.
-
(1999)
Proc. Computer Security Foundation Workshop
, pp. 192-202
-
-
Song, D.1
-
24
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
[Staniford et al. 2002]
-
[Staniford et al. 2002] S. Staniford, J. Hoagland, J. McAlerney, "Practical Automated Detection of Stealthy Portscans," Journal of Computer Security, 10(1/2): 105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
26
-
-
0242456143
-
NATE-network analysis of anomalous traffic events, a low-cost approach
-
[Taylor and Alves-Foss 2001], September
-
[Taylor and Alves-Foss 2001] C. Taylor, J. Alves-Foss, NATE-Network Analysis of Anomalous Traffic Events, A Low-cost Approach, Proceedings of the New Security Paradigms Workshop '01, pp 89-96, September 2001.
-
(2001)
Proceedings of the New Security Paradigms Workshop '01
, pp. 89-96
-
-
Taylor, C.1
Alves-Foss, J.2
-
27
-
-
84946432389
-
Analysis of the SSL 3.0 protocol
-
[Wagner and Schneier 1996], USENIX Press, November
-
[Wagner and Schneier 1996] D. Wagner, B. Schneier, Analysis of the SSL 3.0 Protocol, Proceedings of Second USENIX Workshop on Electronic Commerce, USENIX Press, pp. 29-40., November 1996.
-
(1996)
Proceedings of Second USENIX Workshop on Electronic Commerce
, pp. 29-40
-
-
Wagner, D.1
Schneier, B.2
-
28
-
-
0034593312
-
Dynamic analysis of security protocols
-
[Yasinsac 2000], Sept 18-21, Ballycotton, Ireland
-
[Yasinsac 2000] A. Yasinsac, Dynamic Analysis of Security Protocols, Proceedings of New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland, pp. 77-87, 2000.
-
(2000)
Proceedings of New Security Paradigms 2000 Workshop
, pp. 77-87
-
-
Yasinsac, A.1
-
29
-
-
0036090428
-
An environment for security protocol intrusion detection
-
[Yasinsac 2002]
-
[Yasinsac 2002] A. Yasinsac, An Environment for Security Protocol Intrusion Detection, Journal of Computer Security, 10(1/2): 177-188, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 177-188
-
-
Yasinsac, A.1
|