-
2
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff, "A Sense of Self for Unix Processes," In Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
4
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, P. Bollineni, "A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors," In Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
5
-
-
70349100099
-
Anomaly detection using call stack information
-
May
-
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong, "Anomaly Detection Using Call Stack Information," IEEE Symposium on Security and Privacy, May, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
6
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
Henry H. Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller, "Formalizing Sensitivity in Static Analysis for Intrusion Detection," In Proceedings of the 2004 IEEE Symposium on Security and Privacy, 2004.
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
7
-
-
0031233430
-
Intrusion detection via system call traces
-
A.Kosoresow, S.Hofmeyr, "Intrusion Detection via System Call Traces," IEEE Software, vol. 14, pp. 24-42, 1997.
-
(1997)
IEEE Software
, vol.14
, pp. 24-42
-
-
Kosoresow, A.1
Hofmeyr, S.2
-
9
-
-
85084160767
-
On gray-box program tracking for anomaly detection
-
August
-
Debin Gao, Michael K. Reiter, Dawn Song, "On Gray-Box Program Tracking for Anomaly Detection", 13th USENIX Security Symposium, pages 103-118, August 2004
-
(2004)
13th USENIX Security Symposium
, pp. 103-118
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
10
-
-
14844297052
-
Gray-box extraction of execution graphs for anomaly detection
-
October
-
Debin Gao, Michael K. Reiter and Dawn Song, "Gray-Box Extraction of Execution Graphs for Anomaly Detection", the 11th ACM CCS conf., pages 318-329, October 2004.
-
(2004)
The 11th ACM CCS Conf.
, pp. 318-329
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
11
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Norway
-
C. Krügel, D. Mutz, F. Valeur, G. Vigna, "On the Detection of Anomalous System Call Arguments", In Proceedings of ESORICS 2003, pages 326-343, Norway, 2003.
-
(2003)
Proceedings of ESORICS 2003
, pp. 326-343
-
-
Krügel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
12
-
-
29144513759
-
Hardware supported anomaly detection: Down to the control flow level
-
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke Lee, "Hardware Supported Anomaly Detection: down to the Control Flow Level," Technical Report GIT-CERCS-04-11.
-
Technical Report
, vol.GIT-CERCS-04-11
-
-
Zhang, T.1
Zhuang, X.2
Pande, S.3
Lee, W.4
-
15
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Nov.
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," ASPLOSIX, Nov. 2000.
-
(2000)
ASPLOSIX
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
19
-
-
84877686239
-
-
ISSTA
-
R. Jasper, M. Brennan, K. Williamson, B. Currier, D. Zimmerman, "Test Data Generation and Feasible Path Analysis", ISSTA 1994, pp. 95-107.
-
(1994)
Test Data Generation and Feasible Path Analysis
, pp. 95-107
-
-
Jasper, R.1
Brennan, M.2
Williamson, K.3
Currier, B.4
Zimmerman, D.5
-
22
-
-
85009448253
-
Point-guard: Protecting pointers from buffer overflow vulnerabilities
-
Washington DC, Aug.
-
C. Cowan, S. Beattie, J. Johansen, and P. Wagle, "Point-Guard: Protecting Pointers From Buffer Overflow Vulnerabilities," Proceedings of 12th USENIX Security Symposium, Washington DC, Aug., 2003.
-
(2003)
Proceedings of 12th USENIX Security Symposium
-
-
Cowan, C.1
Beattie, S.2
Johansen, J.3
Wagle, P.4
-
23
-
-
0001853616
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J.Walpole,P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," 7th USENIX Security Conf., pages 63-78.
-
7th USENIX Security Conf.
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
|